Cited By
View all- Bauer LHowes JMarkelon SBindschaedler VShrimpton TVilela JSchulmann HLi N(2024)Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for "Dead-Drop" DeploymentsProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653264(67-78)Online publication date: 19-Jun-2024
- Likiewicz MReischuk RWlfel U(2017)Security levels in steganography Insecurity does not imply detectabilityTheoretical Computer Science10.1016/j.tcs.2017.06.007692:C(25-45)Online publication date: 5-Sep-2017
- Berndt SLiśkiewicz MPérez-González FBas PIgnatenko TCayre F(2016)Provable Secure Universal Steganography of Optimal RateProceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security10.1145/2909827.2930796(81-92)Online publication date: 20-Jun-2016
- Show More Cited By