Citation: |
[1] |
D. Augot, M. Barbier and C. Fontaine, Ensuring message embedding in wet paper steganography, in "Transactions on Thirteenth IMA International Conference on Cryptography and Coding,'' Springer-Verlag, Berlin, Heidelberg, (2011), 244-258. |
[2] |
J. Brierbrauer and J. Fridrich, Constructing good covering codes for applications in steganography, in "Transactions on Data Hiding and Multimedia Security III,'' Springer-Verlag, (2008), 1-22.doi: 10.1007/978-3-540-69019-1_1. |
[3] |
F. Chai, X. S. Gao and C. Yuan, A characteristic set method for solving Boolean equations and applications in cryptanalysis of stream ciphers, J. Sys. Sci. Compl., 21 (2008), 191-208.doi: 10.1007/s11424-008-9103-0. |
[4] |
C. Cooper, On the rank of random matrices, Random Struc. Algor., 16 (2000), 209-232.doi: 10.1002/(SICI)1098-2418(200003)16:2<209::AID-RSA6>3.0.CO;2-1. |
[5] |
R. Crandall, Some notes on steganography, http://os.inf.tu-dresden.de/ westfeld |
[6] |
C. Fontaine and F. Galand, How Reed-Solomon codes can improve steganographic schemes, in "Information Hiding 9th International Workshop,'' Springer-Verlag, (2007), 130-144. |
[7] |
J. Fridrich, M. Goljan, P. Lisonek and D. Soukal, Writing on wet paper, IEEE Trans. Signal Proc., 53 (2005), 3923-3935.doi: 10.1109/TSP.2005.855393. |
[8] |
J. Fridrich, M. Goljan and D. Soukal, Efficient wet paper codes, in "Proceedings of Information Hiding,'' Springer-Verlag, 2005.doi: 10.1007/b104759. |
[9] |
J. Fridrich, M. Goljan and D. Soukal, Steganography via codes for memory with defective cells, in "Proceedings of the Forty-Third Annual Allerton Conference On Communication, Control and Computing,'' (2005), 1521-1538. |
[10] |
J. Fridrich, M. Goljan and D. Soukal, Wet paper codes with improved embedding efficiency, IEEE Trans. Inform. Forens. Secur., 1 (2006), 102-110.doi: 10.1109/TIFS.2005.863487. |
[11] |
B. J. Hamilton, SINCGARS system improvement program (SIP) specific radio improvement, in "Proceedings of 1996 Tactical Communications Conference,'' (1996), 397-406. |
[12] |
R. W. Hamming, "The Art of Probability for Scientists and Engineers,'' Westview Press, New York, 1994. |
[13] |
A. S. Hedayat, N. J. A. Sloane and J. Stufken, "Orthogonal Arrays: Theory and Applications,'' Springer-Verlag, New York, 1999. |
[14] |
M. Keinänen, "Techniques for Solving Boolean Equation Systems,'' Ph.D thesis, Espoo, Finland, 2006. |
[15] |
V. F. Kolchin, "Random Graphs,'' Cambridge University Press, Cambridge, 1999. |
[16] |
F. J. MacWilliams and N. J. Sloane, "The Theory of Error-Correcting Codes,'' North-Holland Publishing Co., Amsterdam, 1977. |
[17] |
MinT, Online database for optimal parameters of $(t, m, s)$-nets, $(t, s)$-sequences, orthogonal arrays, linear codes, and OOAs, available at http://mint.sbg.ac.at/ |
[18] |
C. Munuera, On the generalized Hamming weights of geometric Goppa codes, IEEE Trans. Inform. Theory, 40 (1994), 2092-2099.doi: 10.1109/18.340488. |
[19] |
M. Nadler, A 32-point $n=12$, $d=5$ code, IRE Trans. Inform. Theory, 8 (1962), 58.doi: 10.1109/TIT.1962.1057670. |
[20] |
D. Schönfeld and A. Winkler, Embedding with syndrome coding based on BCH codes, in "Proceedings 8th ACM Workshop on Multimedia and Security,'' (2006), 214-223. |
[21] |
D. Schönfeld and A. Winkler, Reducing the complexity of syndrome coding for embedding, in "Proceedings 10th ACM Workshop on Information Hiding,'' Springer-Verlag, (2007), 145-158. |
[22] |
B.-Z. Shen, A Justesen construction of binary concatenated codes that asymptotically meet the Zyablov bound for low rate, IEEE Trans. Inform. Theory, 39 (1993), 239-242.doi: 10.1109/18.179365. |
[23] |
D. Stinson, Resilient functions and large sets of orthogonal arrays, Congressus Numerantium, 92 (1993), 105-110. |
[24] |
C. Studholme and I. F. Blake, Random matrices and codes for the erasure channel, Algoritmica, 56 (2010), 605-620.doi: 10.1007/s00453-008-9192-0. |
[25] |
J. H. van Lint, A new description of the Nadler code, IEEE Trans. Inform. Theory, 18 (1972), 825-826.doi: 10.1109/TIT.1972.1054904. |
[26] |
J. H. van Lint, "Introduction to Coding Theory,'' Springer-Verlag, New York, 1982. |
[27] |
V. K. Wei, Generalized Hamming weights for linear codes, IEEE Trans. Inform. Theory, 37 (1991), 1412-1418.doi: 10.1109/18.133259. |
[28] |
W. Zhang, X. Zhang and S. Wang, Maximizing embedding efficiency by combining Hamming codes and wet paper codes, in "Proceedings 10th International Workshop on Information Hiding,'' Springer-Verlag, (2008), 60-71. |