Back to Results
First PageMeta Content
Algebra / Matrices / Category theory / Differential topology / Embedding / General topology / Steganography / Markov chain / Ergodic theory / Mathematics / Markov models / Topology


COMPLETE CHARACTERIZATION OF PERFECTLY SECURE STEGO-SYSTEMS WITH MUTUALLY INDEPENDENT EMBEDDING OPERATION Tomáš Filler and Jessica Fridrich Department of ECE, SUNY Binghamton, Binghamton, NY, USA {tomas.fill
Add to Reading List

Document Date: 2008-09-29 10:48:56


Open Document

File Size: 96,68 KB

Share Result on Facebook

City

Pittsburgh / Santa Clara / Portland / Springer-Verlag / Dallas / Wiley / San Jose / Oxford / /

Country

United Kingdom / /

Currency

pence / /

/

IndustryTerm

secure systems / trusted media / stego-systems / square root law / steganographic algorithm / secure stego-systems / given embedding algorithm / /

Organization

COMPLETE CHARACTERIZATION OF PERFECTLY SECURE STEGO-SYSTEMS WITH MUTUALLY INDEPENDENT EMBEDDING OPERATION Tomáš Filler and Jessica Fridrich Department of ECE / U.S. Government / Air Force office of Scientific Research / SUNY / U.S. Securities and Exchange Commission / /

Person

Jessica Fridrich / /

Position

SECURITY AND FISHER INFORMATION It / completely captured using Fisher / Fisher information w.r.t. / Fisher / Fisher information condition / embedding zero Fisher / warden / /

Product

Bang & Olufsen Form 2 Headphone/Headset / /

ProvinceOrState

Texas / Pennsylvania / Oregon / New York / California / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

JPEG / embedding algorithm / steganographic algorithm / F5 embedding algorithm / given embedding algorithm / F5 algorithm / /

SocialTag