Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference27 articles.
1. Anderson, R. (Ed.) (1996). Stretching the limits of steganography. In Proceedings of the first international workshop on information hiding, Cambridge, UK, May 30–June 1, 1996 (pp. 39–48). Berlin: Springer.
2. Anderson, R. J., & Petitcolas, F. A. (1998). On the limits of steganography. IEEE Journal on Selected Areas in Communications, 16(4), 474–481.
3. Augot, D., Barbier, M., & Fontaine, C. (2011). Ensuring message embedding in wet paper steganography. In L. Chen (Ed.), Proceedings of the 13th IMA international conference on cryptography and coding, Oxford, UK (pp. 244–258). Berlin: Springer.
4. Barg, A., Krouk, E., & Van Tilborg, H. C. (1999). On the complexity of minimum distance decoding of long linear codes. IEEE Transactions on Information Theory, 45(5), 1392–1405.
5. Barreto, P. S., & Misoczki, R. (2010). A new one-time signature scheme from syndrome decoding. IACR Cryptology ePrint Archive, http://eprint.iacr.org/2010/017.pdf .