Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
DOI10.1109/TIT.2008.921684zbMATH Open1330.94052arXivcs/0702161OpenAlexW3121904864MaRDI QIDQ3604649FDOQ3604649
Authors: Ying Wang, Pierre Moulin
Publication date: 24 February 2009
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/cs/0702161
Recommendations
Coding theorems (Shannon theory) (94A24) Cryptography (94A60) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30)
Cited In (30)
- Provably Secure Steganography and the Complexity of Sampling
- On the universal steganography of optimal rate
- Public Key Cryptography - PKC 2006
- Steganographic schemes from perfect codes on Cayley graphs
- Title not available (Why is that?)
- Steganography using overlapping codebook partition
- Steganography protocols for quantum channels
- Information-theoretic analysis of information hiding
- Constructing perfect steganographic systems
- A precise mimic function
- Optimal \(M\)-PAM spread-spectrum data embedding with precoding
- Asymptotically optimal perfect steganographic systems
- On the gold standard for security of universal steganography
- On noise synchronization analysis in steganography using stochastic modulation
- Steganography based on pattern languages
- On causal and semicausal codes for joint information embedding and source coding
- Fisher Information Determines Capacity of ε-Secure Steganography
- Asymptotically Optimum Perfect Universal Steganography of Finite Memoryless Sources
- Linear codes for high payload steganography
- Steganosis using wavelets conditional probability and primitive polynomials
- Coverings, centered codes, and combinatorial steganography
- Steganographic capacity for one-dimensional Markov cover
- Title not available (Why is that?)
- Title not available (Why is that?)
- An Epistemological Approach to Steganography
- Estimating Steganographic Fisher Information in Real Images
- Supraliminal Audio Steganography: Audio Files Tricking Audiophiles
- Applied Cryptography and Network Security
- Unconditionally Secure Steganography Against Active Attacks
- Title not available (Why is that?)
This page was built for publication: Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3604649)