103
Voted
TDHMS
15 years 11 days ago
2008
Application of covering codes to data embedding improves embedding efficiency and security of steganographic schemes. In this paper, we describe several familes of covering codes c...
90
Voted
TDHMS
14 years 11 months ago
2008
In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name orac...
81
Voted
TDHMS
15 years 11 days ago
2008 |