Back to Results
First PageMeta Content
Abstract algebra / Steganography / Erasure code / Linear code / Luby transform code / Embedding / Low-density parity-check code / Matrix / Steganalysis / Coding theory / Mathematics / Algebra


Steganography via Codes for Memory with Defective Cells Jessica Fridricha , Miroslav Goljana , and David Soukalb a Department of Electrical and Computer Engineering,
Add to Reading List

Document Date: 2006-04-26 08:10:09


Open Document

File Size: 259,04 KB

Share Result on Facebook

Company

Simmons / /

Currency

pence / /

/

Event

Product Issues / /

IndustryTerm

steganographic applications / real time performance / steganalysis algorithms / data hiding algorithms / steganographic algorithm / Meet-in-the-middle algorithm / typical digital media / linear systems / iterative algorithms / extraction algorithm / /

NaturalFeature

Shannon / /

Organization

Department of Electrical and Computer Engineering / SUNY / /

Person

Bob / Alice / David Soukalb / Miroslav Goljana / Defective Cells Jessica Fridricha / /

Position

warden / /

Product

M-16 / Cells Jessica Fridricha / David Soukalb / memory / Miroslav Goljana / CELLS The / cells / coding / /

ProgrammingLanguage

R / C / /

RadioStation

Fm 2 / /

Technology

decoding algorithms / iterative algorithms / Meet-in-the-middle algorithm / proposed algorithm / existing decoding algorithms / steganographic algorithm / data hiding algorithms / extraction algorithm / known steganalysis algorithms / 1 Meet-in-the-middle algorithm / /

SocialTag