Author of the publication

The square root law of steganographic capacity for Markov covers.

, , and . Media Forensics and Security, volume 7254 of SPIE Proceedings, page 725408. SPIE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adapting innocent game models for the Böhm treelambda -theory., , and . Theor. Comput. Sci., 308 (1-3): 333-366 (2003)A Capacity Result for Batch Steganography.. IEEE Signal Process. Lett., 14 (8): 525-528 (2007)Fourth-order structural steganalysis and analysis of cover assumptions.. Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 607203. SPIE, (2006)Resampling and the detection of LSB matching in color bitmaps.. Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 1-15. SPIE, (2005)Optimally weighted least-squares steganalysis.. Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 650506. SPIE, (2007)Batch steganography and the threshold game.. Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 650504. SPIE, (2007)The Square Root Law of Steganography: Bringing Theory Closer to Practice.. IH&MMSec, page 33-44. ACM, (2017)Perturbation Hiding and the Batch Steganography Problem.. Information Hiding, volume 5284 of Lecture Notes in Computer Science, page 45-59. Springer, (2008)Batch Steganography and Pooled Steganalysis.. Information Hiding, volume 4437 of Lecture Notes in Computer Science, page 265-281. Springer, (2006)From Blind to Quantitative Steganalysis., , and . IEEE Trans. Inf. Forensics Secur., 7 (2): 445-454 (2012)