faucet 发表于 2025-3-28 16:29:50

http://reply.papertrans.cn/47/4651/465068/465068_41.png

完成才会征服 发表于 2025-3-28 19:21:17

0302-9743 eld in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensi

愤慨一下 发表于 2025-3-29 02:02:20

Supraliminal Audio Steganography: Audio Files Tricking Audiophilesarden. Such channels frequently have a very low embedding rate and therefore are unsuitable for more than simply exchanging steganographic public keys. This paper introduces a proof-of-concept supraliminal channel that uses WAV files to provide a high-bitrate method of embedding information in commo

prolate 发表于 2025-3-29 04:11:18

An Epistemological Approach to Steganographylogy to the list and argues that Simmon’s seminal prisoner’s problem has an empirical dimension, which cannot be ignored (or defined away) without simplifying the problem substantially. An introduction to the epistemological perspective on steganography is given along with a structured discussion on

Temporal-Lobe 发表于 2025-3-29 07:50:37

http://reply.papertrans.cn/47/4651/465068/465068_45.png

真实的人 发表于 2025-3-29 14:04:08

http://reply.papertrans.cn/47/4651/465068/465068_46.png

V洗浴 发表于 2025-3-29 15:52:39

http://reply.papertrans.cn/47/4651/465068/465068_47.png

镀金 发表于 2025-3-29 22:00:27

Estimating Steganographic Fisher Information in Real Imagesriments to approximate the distributions of genuine covers. The complete distribution cannot be estimated, but with carefully-chosen algorithms and a large corpus we can make local approximations by considering groups of pixels. A simple estimator for the local quadratic term of Kullback-Leibler div

Ornithologist 发表于 2025-3-30 00:13:26

Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2d episode, the previously existing daily limit of 30 oracle calls per IP address was lifted to allow for sensitivity analysis. Often disrespected because of their extensive oracle use, sensitivity attacks can reveal up to one bit of information about the watermark in each experiment. In this paper w

系列 发表于 2025-3-30 07:14:14

http://reply.papertrans.cn/47/4651/465068/465068_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Hiding; 11th International W Stefan Katzenbeisser,Ahmad-Reza Sadeghi Conference proceedings 2009 Springer-Verlag Berlin Heidelb