On the limits of steganography, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.474-481, 1998. ,
DOI : 10.1109/49.668971
On the inherent intractability of certain coding problems (Corresp.), IEEE Transactions on Information Theory, vol.24, issue.3, pp.384-386, 1978. ,
DOI : 10.1109/TIT.1978.1055873
On Crandall's problem, Personal communication, 2001. ,
Constructing good covering codes for applications in steganography) Transactions on data hiding and multimedia security III, pp.1-22, 2008. ,
Random Krylov Spaces over Finite Fields, SIAM Journal on Discrete Mathematics, vol.16, issue.2, pp.276-287, 2001. ,
DOI : 10.1137/S089548010139388X
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.9351
An Information-Theoretic Model for Steganography, Lecture Notes in Computer Science, vol.1525, pp.306-318, 1998. ,
DOI : 10.1007/3-540-49380-8_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.9769
An information-theoretic model for steganography, Information and Computation, vol.192, issue.1, pp.41-56, 2004. ,
DOI : 10.1016/j.ic.2004.02.003
How to Achieve a McEliece-Based Digital Signature Scheme, ) Advances in Cryptology ASIACRYPT 2001, pp.157-174, 2001. ,
DOI : 10.1007/3-540-45682-1_10
URL : https://hal.archives-ouvertes.fr/inria-00072511
Some notes on steganography, 1998. ,
Wet ZZW construction for steganography, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), pp.131-135, 2009. ,
DOI : 10.1109/WIFS.2009.5386467
Minimizing additive distortion functions with non-binary embedding operation in steganography, 2010 IEEE International Workshop on Information Forensics and Security, p.2010, 2010. ,
DOI : 10.1109/WIFS.2010.5711444
Minimizing additive distortion in steganography unsing syndrome-trellis codes, IEEE Trans. on Information Forensics and Security, 2011. ,
Minimizing embedding impact in steganography using trellis-coded quantization, IS&T/SPIE International Symposium on Electronic Imaging 2010 -Media Forensics and Security II. Proceedings of the SPIE, 2010. ,
How Can Reed-Solomon Codes Improve Steganographic Schemes?, 9th Information Hiding ? IH'07, pp.130-144, 2007. ,
DOI : 10.1007/3-540-45496-9_21
URL : https://hal.archives-ouvertes.fr/inria-00504247
How Reed-Solomon codes can improve steganographic schemes, EURASIP J. Inf. Secur, pp.1-10, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00504247
Asymptotic Behavior of the ZZW Embedding Construction, IEEE Transactions on Information Forensics and Security, vol.4, issue.1, pp.151-153, 2009. ,
DOI : 10.1109/TIFS.2008.2011082
Practical methods for minimizing embedding impact in
steganography, Security, Steganography, and Watermarking of Multimedia Contents IX, 2007. ,
DOI : 10.1117/12.697471
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.641.3687
Writing on wet paper, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3923-3935, 2005. ,
DOI : 10.1109/TSP.2005.855393
Wet Paper Codes With Improved Embedding Efficiency, IEEE Transactions on Information Forensics and Security, vol.1, issue.1, pp.102-110, 2006. ,
DOI : 10.1109/TIFS.2005.863487
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.419.5982
Matrix Embedding for Large Payloads, IEEE Transactions on Information Forensics and Security, vol.1, issue.3, pp.390-395, 2006. ,
DOI : 10.1109/TIFS.2006.879281
Efficient Wet Paper Codes, pp.204-218, 2005. ,
DOI : 10.1007/11558859_16
Information hiding by coverings, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674), pp.151-154, 2003. ,
DOI : 10.1109/ITW.2003.1216717
Coverings, centered codes, and combinatorial steganography, Problems of Information Transmission, vol.45, issue.3, pp.289-297, 2009. ,
DOI : 10.1134/S0032946009030107
Statistically undetectable jpeg steganography: Dead ends, challenges, and opportunities, Proc. of the ACM Multimedia and Security Workshop, pp.3-14, 2007. ,
The complexity of computing the covering radius of a code, IEEE Transactions on Information Theory, vol.30, issue.6, pp.800-804, 1984. ,
DOI : 10.1109/TIT.1984.1056978
Wet paper codes and the dual distance in steganography, Advances in Mathematics of Communications, vol.6, issue.3, 2011. ,
DOI : 10.3934/amc.2012.6.273
URL : https://hal.archives-ouvertes.fr/inria-00584877
A steganography schema and error-correcting codes, Journal of Theoretical and Applied Information Technology, vol.18, issue.1, pp.42-47, 2010. ,
Product perfect Z2Z4-linear codes in steganography, International Symposium on Information Theory and its Applications -ISITA, p.2010, 2010. ,
Product perfect codes and steganography, Digital Signal Processing, vol.19, issue.4, pp.764-769, 2009. ,
DOI : 10.1016/j.dsp.2008.11.005
Less detectable jpeg steganography method based on heuristic optimization and BCH syndrom coding, ACM Multimedia & Se- curity'09, pp.131-139, 2009. ,
Embedding with syndrome coding based on BCH codes, Proceeding of the 8th workshop on Multimedia and security , MM&Sec '06, pp.214-223, 2006. ,
DOI : 10.1145/1161366.1161405
Reducing the Complexity of Syndrome Coding for Embedding, Proc. of the 10th International Worksop on Information Hiding, pp.145-158, 2007. ,
DOI : 10.1007/11558859_16
The Prisoners??? Problem and the Subliminal Channel, Advances in Cryptology ? CRYPTO'83, pp.51-67, 1984. ,
DOI : 10.1007/978-1-4684-4730-9_5
The intractability of computing the minimum distance of a code, IEEE Transactions on Information Theory, vol.43, issue.6, pp.1757-1766, 1997. ,
DOI : 10.1109/18.641542
Algebraic Geometric Codes: Basic Notions (Mathematical Surveys and Monographs), 2007. ,
F5???A Steganographic Algorithm, Lecture Notes in Computer Science, vol.2137, pp.289-302, 2001. ,
DOI : 10.1007/3-540-45496-9_21
Fast BCH Syndrome Coding for Steganography, Lecture Notes in Computer Science, vol.33, issue.2, pp.48-58, 2009. ,
DOI : 10.1007/3-540-45496-9_21
Near-Optimal Codes for Information Embedding in Gray-Scale Signals, IEEE Transactions on Information Theory, vol.56, issue.3, pp.1262-1270, 2010. ,
DOI : 10.1109/TIT.2009.2039087
Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes, Proc. of the 10th International Worksop on Information Hiding, pp.60-71, 2008. ,
DOI : 10.1109/TIT.2003.810639