125
Voted
TDHMS
15 years 2 months ago
2008
Application of covering codes to data embedding improves embedding efficiency and security of steganographic schemes. In this paper, we describe several familes of covering codes c...
112
Voted
TDHMS
15 years 1 months ago
2008
In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name orac...
93
Voted
TDHMS
15 years 2 months ago
2008 |