Author of the publication

Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding.

, , , and . J. Inf. Hiding Multim. Signal Process., 11 (1): 44-57 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital Watermarking under a Filtering and Additive Noise Attack Condition., , , and . MMM-ACNS, volume 2776 of Lecture Notes in Computer Science, page 371-382. Springer, (2003)Audio Watermarking Based on Echo Hiding with Zero Error Probability., , and . Int. J. Comput. Sci. Appl., 10 (1): 1-10 (2013)Channel Traffic Minimizing Key Sharing Protocol Intended for the Use over the Internet and Secure without any Cryptographic Assumptions., , , , and . FRUCT, page 300-307. IEEE, (2022)Cipher Modification Against Steganalysis Based on NIST Tests., , and . FRUCT, page 179-186. IEEE, (2019)Steganalysis Based on Statistical Properties of the Encrypted Messages., , , and . MMM-ACNS, volume 10446 of Lecture Notes in Computer Science, page 288-298. Springer, (2017)Achievability of the Key-Capacity in a Scenario of Key Sharing., , and . MMM-ACNS, volume 2776 of Lecture Notes in Computer Science, page 308-315. Springer, (2003)The Use of Wet Paper Codes With Audio Watermarking Based on Echo Hiding., , and . FedCSIS, page 727-732. (2012)Selective image authentication tolerant to JPEG compression., , and . IISA, page 1-6. IEEE, (2015)Detection of stegosystems using block ciphers for encryption of the embedded messages., , and . FRUCT, page 181-186. IEEE, (2017)A stegosystem with blind decoder based on a noisy channel., , , and . DSP, page 1-5. IEEE, (2013)