Sciweavers

3 search results - page 1 / 1
» tdhms 2008
Sort
View
86
Voted
TDHMS
2008
15 years 1 months ago
Quantization-Based Methods: Additive Attacks Performance Analysis
José-Emilio Vila-Forcén, Sviatoslav ...
115
Voted
TDHMS
2008
15 years 1 months ago
Constructing Good Covering Codes for Applications in Steganography
Application of covering codes to data embedding improves embedding efficiency and security of steganographic schemes. In this paper, we describe several familes of covering codes c...
Jürgen Bierbrauer, Jessica J. Fridrich
101
Voted
TDHMS
2008
15 years 8 days ago
Oracle Channels
In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name orac...
Ilaria Venturini