Sciweavers

TDHMS
2008
14 years 8 months ago
Oracle Channels
In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name orac...
Ilaria Venturini
67
Voted
TDHMS
2008
14 years 10 months ago
Quantization-Based Methods: Additive Attacks Performance Analysis
José-Emilio Vila-Forcén, Sviatoslav ...
87
Voted
TDHMS
2008
14 years 10 months ago
Constructing Good Covering Codes for Applications in Steganography
Application of covering codes to data embedding improves embedding efficiency and security of steganographic schemes. In this paper, we describe several familes of covering codes c...
Jürgen Bierbrauer, Jessica J. Fridrich