A graph-theoretic approach to steganography
Saved in:
Published in | Lecture notes in computer science pp. 119 - 128 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
Berlin
Springer
2005
|
Subjects | |
Online Access | Get full text |
ISBN | 9783540287919 3540287914 |
ISSN | 0302-9743 |
Cover
Author | HETZL, Stefan MUTZEL, Petra |
---|---|
Author_xml | – sequence: 1 givenname: Stefan surname: HETZL fullname: HETZL, Stefan organization: Institute of Computer Languages (E185), Vienna University of Technology, Favoritenstrafie 9, 1040 Vienna, Austria – sequence: 2 givenname: Petra surname: MUTZEL fullname: MUTZEL, Petra organization: Institute of Algorithm Engineering, LS11, University of Dortmund, Joseph-von-Fraunhofer Str. 20, 44221 Dortmund, Germany |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17181981$$DView record in Pascal Francis |
BookMark | eNotjLtqwzAUQAVNoGnqf_DSqQiudK3XGEJfEOjSzuHKlmKH1BaSlvx9S9uznOVw7thqXuZwwxpnLKoOpDVOuBXbAILkznR4y5pSzvADCm3Abtjjrj1lSiOvY1hyqFPfUkp5oX5s69KWGk40L7_J9Z6tI11KaP69ZZ_PTx_7V354f3nb7w48CaEq9-CHoDToAB5kcNqDQGUiEWLnLCmMGsD1g8EooxwwGuF8DDoM0sfO4pY9_H0TlZ4uMdPcT-WY8vRF-XoURljhrMBv8jpDLw |
ContentType | Conference Proceeding |
Copyright | 2005 INIST-CNRS |
Copyright_xml | – notice: 2005 INIST-CNRS |
DBID | IQODW |
DatabaseName | Pascal-Francis |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Applied Sciences Engineering Computer Science |
EndPage | 128 |
ExternalDocumentID | 17181981 |
GroupedDBID | -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE ALMA_UNASSIGNED_HOLDINGS EJD F5P FEDTE HVGLF IQODW LAS LDH P2P RIG RNI RSU SVGTG VI1 ~02 |
ID | FETCH-LOGICAL-p115t-b0bde5606e0b02e96b01357faa33498a53f6009cd73f2f2d3f719bfe6ed2bf483 |
ISBN | 9783540287919 3540287914 |
ISSN | 0302-9743 |
IngestDate | Mon Jul 21 09:10:36 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Performance evaluation Statistical method Algorithm performance Combinatorial problem Information protection Audiovisual document First order Order statistic Stéganography Graph theory Algorithm Implementation |
Language | English |
License | CC BY 4.0 |
LinkModel | OpenURL |
MeetingName | CMS 2005 : communications and multimedia security (Salzburg, 9-21 September 2005) |
MergedId | FETCHMERGED-LOGICAL-p115t-b0bde5606e0b02e96b01357faa33498a53f6009cd73f2f2d3f719bfe6ed2bf483 |
PageCount | 10 |
ParticipantIDs | pascalfrancis_primary_17181981 |
PublicationCentury | 2000 |
PublicationDate | 2005 |
PublicationDateYYYYMMDD | 2005-01-01 |
PublicationDate_xml | – year: 2005 text: 2005 |
PublicationDecade | 2000 |
PublicationPlace | Berlin |
PublicationPlace_xml | – name: Berlin |
PublicationTitle | Lecture notes in computer science |
PublicationYear | 2005 |
Publisher | Springer |
Publisher_xml | – name: Springer |
SSID | ssj0000316708 ssj0002792 |
Score | 2.1102343 |
SourceID | pascalfrancis |
SourceType | Index Database |
StartPage | 119 |
SubjectTerms | Applied sciences Cryptography Exact sciences and technology Information, signal and communications theory Signal and communications theory Telecommunications and information theory |
Title | A graph-theoretic approach to steganography |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF60XvSi1orPkoO3Etlk89pjkUgpqXhIpfRSst1db2lp48Vf72yyeVIQvYSwhLDkG2ZmJ_N9g9ATdm2ecPB-jFFhgoW4JqNrz5QQTAQcJzjPdQtmb95k7kwX7qKeMZqzSzL2vP4-yCv5D6qwBrgqluwfkK1eCgtwD_jCFRCGayf5PRhnIl3_TzdZ3laV94erEQ0jHdea9jAe5drUZsVcrOTEVfoJWH8maVO-WkEdxstIt4LJ2opm83gZRrq5d5e06gZup25Q1g1b50lVBIIjFNVeTPOqwGfCqYM03JylHygipqXp3S0x606QqVr_LAiGFlVk-WM_AE96Mg6n0UdVFsOKmY9rwXelb1j8CCo2oek5-SYLXcfGplVja7IH25bFUJJGphBfoEHNoTTeK9Qu0ZFI--hcJ_2Gdql7WCrnapRrfXTWEIm8QqOx0UHOKJEzso3RQm6A5q9h_DIx9YgLcwupeGYyzLiApNMTmGFbUE-VpV1fJgkhDg0Sl0jISOma-0Ta0uZE-hZlUniC20w6AblGvXSTihtkwFfgthonQAlzsBBBQNa24wqIX3ZiYXaLhq2Ps9oWciarEpG73x64R6e1IT2gXrb7Eo-QkmVsqGH8ATJyNjk |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Lecture+notes+in+computer+science&rft.atitle=A+graph-theoretic+approach+to+steganography&rft.au=HETZL%2C+Stefan&rft.au=MUTZEL%2C+Petra&rft.date=2005-01-01&rft.pub=Springer&rft.isbn=9783540287919&rft.issn=0302-9743&rft.spage=119&rft.epage=128&rft.externalDBID=n%2Fa&rft.externalDocID=17181981 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon |