共 50 条
- [3] Bounds on the Leakage of the Input's Distribution in Information-Hiding Protocols TRUSTWORTHY GLOBAL COMPUTING, 2009, 5474 : 36 - +
- [7] Compositional methods for information-hiding FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATIONAL STRUCTURES, PROCEEDINGS, 2008, 4962 : 443 - 457
- [8] An information-hiding model for secure communication ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF THEORETICAL AND METHODOLOGICAL ISSUES, 2007, 4681 : 1305 - +
- [9] Computing the Leakage of Information-Hiding Systems TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2010, 6015 : 373 - 389
- [10] Detecting Information-Hiding in WAV Audios 19TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOLS 1-6, 2008, : 1834 - 1837