Author:
Filler Tomas,Fridrich Jessica
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Information-Theoretic Cryptography and Perfect Secrecy;Perfect Secrecy in IoT;2022
2. Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy;IEEE Signal Processing Letters;2018-06
3. The Square Root Law of Steganography;Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security;2017-06-20
4. A Survey and Taxonomy Aimed at the Detection and Measurement of Covert Channels;Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security;2016-06-20
5. Game Theory and Adaptive Steganography;IEEE Transactions on Information Forensics and Security;2016-04