Citation: |
[1] |
J. Bierbrauer and J. Fridrich, Constructing good covering codes for applications in steganography, in "Trans. on Data Hiding and Multimedia Security III,'' (2008), 1-22. |
[2] |
J. Borges and J. Rifà, A characterization of 1-perfect additive codes, IEEE Trans. Inform. Theory, 45 (1999), 1688-1697.doi: 10.1109/18.771247. |
[3] |
R. Crandall, Some notes on steganography, available from http://www.dia.unisa.it/~ads/corso-security/www/CORSO-0203/steganografia/LINKS%20LOCALI/matrix-encoding.pdf, 1998. |
[4] |
J. Fridrich and P. Lisoněk, Grid colorings in steganography, IEEE Trans. Inform. Theory, 53 (2007), 1547-1549.doi: 10.1109/TIT.2007.892768. |
[5] |
F. J. MacWilliams and N. J. A. Sloane, "The Theory of Error-Correcting Codes,'' North-Holland Publishing Company, 1977. |
[6] |
P. Moulin and R. Koetter, Data-hiding codes, Proc. IEEE, 93 (2005), 2083-2126.doi: 10.1109/JPROC.2005.859599. |
[7] |
H. Rifà-Pous and J. Rifà, Product perfect codes and steganography, Digit. Signal Process., 19 (2009), 764-769.doi: 10.1016/j.dsp.2008.11.005. |
[8] |
B. Ryabko and D. Ryabko, Asymptotically optimal perfect steganographic systems, Probl. Inform. Transm., 45 (2009), 184-190.doi: 10.1134/S0032946009020094. |
[9] |
A. Westfeld, High capacity despite better steganalysis (F5 - A steganographic algorithm), Lecture Notes in Comput. Sci., 2137 (2001), 289-302.doi: 10.1007/3-540-45496-9_21. |
[10] |
F. M. J. Willems and M. van Dijk, Capacity and codes for embedding information in grayscale signals, IEEE Trans. Inform. Theory, 51 (2005), 1209-1214.doi: 10.1109/TIT.2004.842707. |