A universal algorithm for homophonic coding
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Information Theory: Coding Theorems for Discrete Memoryless Systems
Information Theory: Coding Theorems for Discrete Memoryless Systems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
An Information-Theoretic Approach to Steganography and Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
The method of types [information theory]
IEEE Transactions on Information Theory
On the limits of steganography
IEEE Journal on Selected Areas in Communications
TAMC'11 Proceedings of the 8th annual conference on Theory and applications of models of computation
Hi-index | 0.00 |
We provide construction of steganographic schemes secure against adaptive chosen stegotext attacks. Our constructions achieve embedding rate equals to the Shannon entropy bound on steganographic channel capacity. Further the covertext distribution can be given as either an integrable probability function or as a random covertext sampler. We also introduce steganographic codes that are of interests in constructing other steganographic protocols such as steganographic secret sharing or steganographic distributed computations.