Cited By
View all- Li ECraver SYu J(2015)Capacity Limits of Pseudorandom Channels in Deception ProblemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.242365610:9(1824-1834)Online publication date: Sep-2015
- Mosunov ASinha VCrawford HAycock JCastro DKumari R(2013)Assured Supraliminal Steganography in Computer GamesRevised Selected Papers of the 14th International Workshop on Information Security Applications - Volume 826710.1007/978-3-319-05149-9_16(245-259)Online publication date: 19-Aug-2013
- Li ECraver SHeitzenrater CCraver SDittmann J(2011)A square-root law for active wardensProceedings of the thirteenth ACM multimedia workshop on Multimedia and security10.1145/2037252.2037268(87-92)Online publication date: 29-Sep-2011
- Show More Cited By