110
click to vote
TDHMS
15 years 1 months ago
2008
Application of covering codes to data embedding improves embedding efficiency and security of steganographic schemes. In this paper, we describe several familes of covering codes c...
TDHMS
14 years 11 months ago
2008
In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name orac...
TDHMS
15 years 1 months ago
2008 |