共 50 条
- [1] Product Constructions for Perfect Lee Codes [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (11) : 7473 - 7481
- [5] PERMUTATION CODES AND STEGANOGRAPHY [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 2954 - 2958
- [6] Perfect undetectability of network steganography [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2998 - 3010
- [8] Steganography via covering codes [J]. 2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 192 - 192
- [9] Error Codes in and for Network Steganography [J]. ARCHITECTURE OF COMPUTING SYSTEMS, ARCS 2023, 2023, 13949 : 81 - 93
- [10] Using of Polar Codes in Steganography [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND ENGINEERING (CSE 2013), 2013, 42 : 262 - 266