Sciweavers

1744 search results - page 3 / 349
» The Steganographic File System
Sort
View
IH
1998
Springer
14 years 3 days ago
An Information-Theoretic Model for Steganography
An information-theoretic model for steganography with passive adversaries is proposed. The adversary's task of distinguishing between an innocent cover message C and a modi e...
Christian Cachin
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 7 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
CORR
2008
Springer
118views Education» more  CORR 2008»
13 years 7 months ago
TrustMAS: Trusted Communication Platform for Multi-Agent Systems
The paper presents TrustMAS
Krzysztof Szczypiorski, Igor Margasinski, Wojciech...
CORR
2008
Springer
129views Education» more  CORR 2008»
13 years 8 months ago
Steganographic Routing in Multi Agent System Environment
: In this paper we present an idea of trusted communication platform for Multi-Agent Systems (MAS) called TrustMAS. Based on analysis of routing protocols suitable for MAS we have ...
Krzysztof Szczypiorski, Igor Margasinski, Wojciech...
IH
1998
Springer
14 years 3 days ago
Modeling the Security of Steganographic Systems
Jan Zöllner, Hannes Federrath, Herbert Kliman...