Sciweavers

120
Voted
TDHMS
2008
15 years 2 months ago
Oracle Channels
In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name orac...
Ilaria Venturini
96
Voted
TDHMS
2008
15 years 3 months ago
Quantization-Based Methods: Additive Attacks Performance Analysis
José-Emilio Vila-Forcén, Sviatoslav ...
135
Voted
TDHMS
2008
15 years 3 months ago
Constructing Good Covering Codes for Applications in Steganography
Application of covering codes to data embedding improves embedding efficiency and security of steganographic schemes. In this paper, we describe several familes of covering codes c...
Jürgen Bierbrauer, Jessica J. Fridrich