On the gold standard for security of universal steganography
From MaRDI portal
Publication:1648780
DOI10.1007/978-3-319-78381-9_2zbMath1423.94122arXiv1801.08154OpenAlexW2784812226MaRDI QIDQ1648780
Maciej Liśkiewicz, Sebastian Berndt
Publication date: 9 July 2018
Full work available at URL: https://arxiv.org/abs/1801.08154
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Grey-box steganography
- An information-theoretic model for steganography
- Constructing perfect steganographic systems
- Domain specific high-level constraints for user interface layout
- Upper and lower bounds on black-box steganography
- Salembier's min-tree algorithm turned into breadth first search
- Inf-structuring functions: a unifying theory of connections and connected operators
- Enhancements of trapdoor permutations
- Tiling algebra for constraint-based layout editing
- A one-time stegosystem and applications to efficient covert communication
- Efficient Concurrent Covert Computation of String Equality and Set Intersection
- Security of Symmetric Encryption against Mass Surveillance
- Viscous-Hyperconnected Attribute Filters: A First Algorithm
- A More Cautious Approach to Security Against Mass Surveillance
- Standard Security Does Not Imply Indistinguishability Under Selective Opening
- Hyperconnectivity, Attribute-Space Connectivity and Path Openings: Theoretical Relationships
- Adaptive Trapdoor Functions and Chosen-Ciphertext Security
- Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
- New directions in cryptography
- Efficiency of a Good But Not Linear Set Union Algorithm
- Nonmalleable Cryptography
- A Comparative Review of Component Tree Computation Algorithms
- Provably Secure Steganography
- Connected Morphological Attribute Filters on Distributed Memory Parallel Machines
- Advances in Cryptology - EUROCRYPT 2004
- Broadcast Steganography
- Advances in Cryptology - CRYPTO 2003
- Probability and Computing
- Theory of Cryptography
- Automata, Languages and Programming
- Public Key Cryptography - PKC 2006
This page was built for publication: On the gold standard for security of universal steganography