Sciweavers

103
Voted
TDHMS
2008
15 years 11 days ago
Constructing Good Covering Codes for Applications in Steganography
Application of covering codes to data embedding improves embedding efficiency and security of steganographic schemes. In this paper, we describe several familes of covering codes c...
Jürgen Bierbrauer, Jessica J. Fridrich
90
Voted
TDHMS
2008
14 years 11 months ago
Oracle Channels
In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name orac...
Ilaria Venturini
81
Voted
TDHMS
2008
15 years 11 days ago
Quantization-Based Methods: Additive Attacks Performance Analysis
José-Emilio Vila-Forcén, Sviatoslav ...
Security Privacy
Top of PageReset Settings