Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2009_10_a12, author = {E. V. Razinkov and R. Kh. Latypov}, title = {Analysis of perturbed quantization stegosystems}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {26--28}, publisher = {mathdoc}, number = {10}, year = {2009}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2009_10_a12/} }
E. V. Razinkov; R. Kh. Latypov. Analysis of perturbed quantization stegosystems. Prikladnaâ diskretnaâ matematika, no. 10 (2009), pp. 26-28. http://geodesic.mathdoc.fr/item/PDM_2009_10_a12/
[1] Simmons G. J., “The PrisonersṔroblem and the Subliminal Channel”, CRYPTO83 – Advances in Cryptology, Springer, New York, 1984, 51–67 | MR
[2] Wayner P., Disappearing Cryptography, Second Edition – Information Hiding: Steganography and Watermarking, Morgan Kaufmann, San Francisco, 2002, 413 pp.
[3] Fridrich J., Goljan M., Soukal D., “Perturbed Quantization Steganography”, Multimedia Systems, 11:2 (2005), 98–107 | DOI
[4] Fridrich J., Goljan M., Soukal D., “Perturbed Quantization Steganography with Wet Paper Codes”, ACM Multimedia and Security Workshop, ACM Press, New York, 2004, 4–15
[5] Fridrich J., Pevny T., Kodovsky J., “Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities”, ACM Multimedia and Security Workshop, ACM Press, New York, 2007, 3–14
[6] Fridrich J., Goljan M., Lisonek P., Soukal D., “Writing on Wet Paper”, IEEE Trans. on Sig. Proc., 53 (2005), 3923–3935, Special Issue on Media Security | DOI | MR
[7] Sullivan K., Madhow U., Chandrasekaran S., Manjunath B. S., “Steganalysis for Markov cover data with applications to images”, IEEE Transactions on Information Forensics and Security, 1:2 (2006), 275–287 | DOI