Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens
- 13 September 2007
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 14 references indexed in Scilit:
- Translation-Based SteganographyLecture Notes in Computer Science, 2005
- Natural Language Watermarking Using Semantic Substitution for Chinese TextLecture Notes in Computer Science, 2004
- A Method of Linguistic Steganography Based on Collocationally-Verified SynonymyLecture Notes in Computer Science, 2004
- Relational and Kleene-Algebraic Methods in Computer SciencePublished by Springer Science and Business Media LLC ,2004
- Quantitative steganalysis of digital images: estimating the secret message lengthMultimedia Systems, 2003
- Natural Language Watermarking and TamperproofingLecture Notes in Computer Science, 2002
- Secure Human Identification ProtocolsLecture Notes in Computer Science, 2001
- Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept ImplementationLecture Notes in Computer Science, 2001
- On Public-Key Steganography in the Presence of an Active WardenLecture Notes in Computer Science, 1998
- The Prisoners’ Problem and the Subliminal ChannelPublished by Springer Science and Business Media LLC ,1984