Author:
Chandramouli Rajarathnam,Kharrazi Mehdi,Memon Nasir
Publisher
Springer Berlin Heidelberg
Reference29 articles.
1. Simmons, G.: The prisoners problem and the subliminal channel. In: CRYPTO, pp. 51–67 (1983)
2. Johnson, N.F., Katzenbeisser, S.: A survay of steganographic techniques. In: Katzenbeisser, S., Petitcolas, F. (eds.) Information Hiding, pp. 43–78. Artech House, Norwood (2000)
3. Lecture Notes in Computer Science;C. Cachin,1998
4. Zollner, J., Federrath, H., Klimant, H., Pfitzman, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic systems. In: 2nd Information Hiding Workshop, April 1998, pp. 345–355 (1998)
5. Chandramouli, R., Memon, N.: Steganography capacity: A steganalysis perspective. To appear in SPIE Security and Watermarking of Multimedia Contents V, vol. 5020 (2003)
Cited by
47 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献