Cited By
View all- Enping Li Craver SJun Yu (2015)Capacity Limits of Pseudorandom Channels in Deception ProblemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.242365610:9(1824-1834)Online publication date: 1-Sep-2015
- Ker ABas PBöhme RCogranne RCraver SFiller TFridrich JPevný TPuech WChaumont MDittmann JCampisi P(2013)Moving steganography and steganalysis from the laboratory into the real worldProceedings of the first ACM workshop on Information hiding and multimedia security10.1145/2482513.2482965(45-58)Online publication date: 17-Jun-2013
- Mosunov ASinha VCrawford HAycock JCastro DKumari R(2013)Assured Supraliminal Steganography in Computer GamesRevised Selected Papers of the 14th International Workshop on Information Security Applications - Volume 826710.1007/978-3-319-05149-9_16(245-259)Online publication date: 19-Aug-2013
- Show More Cited By