THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng | |
---|---|
Số trang | 115 |
Dung lượng | 9,39 MB |
Nội dung
Ngày đăng: 12/03/2018, 10:07
Nguồn tham khảo
Tài liệu tham khảo | Loại | Chi tiết |
---|---|---|
3. Barni, M., Tondi, B.: The source identification game: an information-theoretic perspective. IEEE Trans. Inf. Forensics Secur. 8(3), 450–463 (2013) | Khác | |
5. B¨ ohme, R., Westfeld, A.: Exploiting preserved statistics for steganalysis. In:Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 82–96. Springer, Heidelberg (2004) 6. Chia, P.H., Chuang, J.: Colonel Blotto in the phishing war. In: Baras, J.S., Katz, J., Altman, E. (eds.) GameSec 2011. LNCS, vol. 7037, pp. 201–218. Springer, Heidelberg (2011) | Khác | |
7. Denemark, T., Fridrich, J.: Detection of content adaptive LSB matching: a game theory approach. In: Alattar, A., Memon, N., Heitzenrater, C. (eds.) Proceedings SPIE, Media Watermarking, Security, and Forensics, vol. 9028, p. 902804. SPIE and IS&T (2014) | Khác | |
8. Ettinger, J.M.: Steganalysis and game equilibria. In: Aucsmith, D. (ed.) IH 1998.LNCS, vol. 1525, pp. 319–328. Springer, Heidelberg (1998) | Khác | |
9. Franz, E.: Steganography preserving statistical properties. In: Petitcolas, F.A.P.(ed.) IH 2002. LNCS, vol. 2578, pp. 278–294. Springer, Heidelberg (2003) 10. Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applica-tions. Cambridge University Press, New York (2009) | Khác | |
11. Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganog- raphy in spatial domain. In: Delp, E., Wong, P. (eds.) Proceedings SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 23–34. SPIE (2004) | Khác | |
12. Fridrich, J., Kodovsky, J.: Multivariate Gaussian model for designing additive dis- tortion for steganography. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, BC, pp. 2949–2953, May 2013 | Khác | |
13. Fridrich, J., Du, R.: Secure steganographic methods for palette images. In:Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 47–60. Springer, Heidelberg (2000) | Khác | |
14. Grossklags, J., Christin, N., Chuang, J.: Secure or insure?: A game-theoretic analy- sis of information security games. In: Proceedings of the 17th International World Wide Web Conference (WWW), Beijing, China, pp. 209–218, April 2008 | Khác | |
15. Guo, L., Ni, J., Shi, Y.: Uniform embedding for efficient JPEG steganography.IEEE Trans. Inf. Forensics Secur. 9(5), 814–825 (2014) | Khác | |
16. H´ elou¨ et, L., Zeitoun, M., Degorre, A.: Scenarios and covert channels: another game.Electron. Notes Theor. Comput. Sci. 119(1), 93–116 (2005) | Khác | |
17. Johnson, B., B¨ ohme, R., Grossklags, J.: Security games with market insurance.In: Baras, J.S., Katz, J., Altman, E. (eds.) GameSec 2011. LNCS, vol. 7037, pp | Khác | |
18. Johnson, B., Sch¨ ottle, P., B¨ ohme, R.: Where to hide the bits? In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 1–17. Springer, Heidelberg (2012) | Khác | |
19. Johnson, B., Sch¨ ottle, P., Laszka, A., Grossklags, J., B¨ ohme, R.: Bitspot- ting: detecting optimal adaptive steganography. In: Shi, Y.Q., Kim, H.-J., P´ erez-Gonz´ alez, F. (eds.) IWDW 2013. LNCS, vol. 8389, pp. 3–18. Springer, Heidelberg (2014) | Khác | |
20. Ker, A.: Batch steganography and the threshold game. In: Delp, E., Wong, P.(eds.) Proceedings SPIE, Security, Steganography, and Watermarking of Multime- dia Contents IX, vol. 6505, pp. 0401–0413. SPIE (2007) | Khác | |
21. Laszka, A., Foldes, A.: Modeling content-adaptive steganography with detection costs as a quasi-zero-sum game. Infocomm. J. 5(4), 33–43 (2013) | Khác | |
23. Maill´ e, P., Reichl, P., Tuffin, B.: Interplay between security providers, consumers, and attackers: a weighted congestion game approach. In: Baras, J.S., Katz, J., Altman, E. (eds.) GameSec 2011. LNCS, vol. 7037, pp. 67–86. Springer, Heidelberg (2011) | Khác | |
24. Moulin, P., Ivanovic, A.: The zero-rate spread-spectrum watermarking game. IEEE Trans. Signal Process. 51(4), 1098–1117 (2003) | Khác | |
26. Orsdemir, A., Altun, O., Sharma, G., Bocko, M.: Steganalysis-aware steganogra- phy: statistical indistinguishability despite high distortion. In: Delp, E., Wong, P., Dittmann, J., Memon, N. (eds.) Proceedings SPI, Security, Forensics, Steganog- raphy, and Watermarking of Multimedia Contents X, vol. 6819, p. 681915. SPIE (2008) | Khác | |
27. Petitcolas, F.: Introduction to information hiding. In: Katzenbeisser, S., Petitcolas, F. (eds.) Information Hiding Techniques for Steganography and Dig- ital Watermarking, Recent Titles in the Artech House Computer Security Series, pp. 1–14. Artech House, Boston (2000) | Khác |
TỪ KHÓA LIÊN QUAN
TÀI LIỆU CÙNG NGƯỜI DÙNG
TÀI LIỆU LIÊN QUAN