150
click to vote
IH
15 years 10 months ago
2005 Springer
Abstract. Wet paper codes were proposed as a tool for constructing steganographic schemes with an arbitrary selection channel that is not shared between the sender and the recipien...
205
click to vote
IH
15 years 10 months ago
2005 Springer
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
137
click to vote
IH
15 years 10 months ago
2005 Springer
Abstract. In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa’s dirty paper scheme. We quantify th...
138
click to vote
IH
15 years 10 months ago
2005 Springer
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
|