Author:
Anckaert Bertrand,De Sutter Bjorn,Chanet Dominique,De Bosschere Koen
Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. Lecture Notes in Computer Science;R. El-Khalil,2004
2. Collberg, C., Thomborson, C.: Software watermarking: Models and dynamic embeddings. In: ACM SIGPLAN-SIGACT symposium on Principles of Programming Languages, pp. 311–324. ACM Press, New York (1999)
3. Lecture Notes in Computer Science;J. Stern,2000
4. Simmons, G.J.: The prisoners’ problem and the subliminal channel. In: Advances in Cryptology, pp. 51–67 (1984)
5. Kerkhoffs, A.: La cryptographie militaire. Journal de Sciences Militaires 9, 5–38 (1883)
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A federated approach for detecting data hidden in icons of mobile applications delivered via web and multiple stores;Social Network Analysis and Mining;2023-09-14
2. Multi-carrier Steganography Algorithm Based on Executable Program;Lecture Notes in Computer Science;2022
3. Graphs Resemblance based Software Birthmarks through Data Mining for Piracy Control;Programming and Computer Software;2019-12
4. A change would do you good;Proceedings of the Genetic and Evolutionary Computation Conference Companion;2019-07-13
5. Leave It to Weaver;Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop on - SSPREW-8;2018