The Magma Algebra System I: The User Language, Computational algebra and number theory, pp.3-4235, 1993. ,
DOI : 10.1006/jsco.1996.0125
On the inherent intractability of certain coding problems (Corresp.), IEEE Transactions on Information Theory, vol.24, issue.3, pp.24384-386, 1978. ,
DOI : 10.1109/TIT.1978.1055873
Some notes on Steganography, 1998. ,
How Reed-Solomon codes can improve steganographic schemes, EURASIP J. Inf. Secur, pp.1-10, 2009. ,
DOI : 10.1155/2009/274845
URL : https://hal.archives-ouvertes.fr/inria-00504247
Minimizing embedding impact in steganography using trellis-coded quantization. Media Forensics and Security II, p.754105, 2010. ,
A note on the decoding of double-error-correcting binary BCH codes of primitive length (Corresp.), IEEE Transactions on Information Theory, vol.17, issue.6, pp.765-766, 1971. ,
DOI : 10.1109/TIT.1971.1054704
All binary 3-error-correcting BCH codes of length 2 m ? 1 have covering radius 5, IEEE Trans. on Information Theory, pp.24257-258, 1978. ,
DOI : 10.1109/tit.1978.1055847
Fundamentals of error-correcting codes, 2003. ,
DOI : 10.1017/CBO9780511807077
Wet paper codes and the dual distance in steganography, Advances in Mathematics of Communications, 2011. ,
DOI : 10.3934/amc.2012.6.273
URL : https://hal.archives-ouvertes.fr/inria-00584877
Embedding with syndrome coding based on BCH codes, Proceeding of the 8th workshop on Multimedia and security , MM&Sec '06, pp.214-223, 2006. ,
DOI : 10.1145/1161366.1161405
Complete decoding of triple-error-correcting binary BCH codes, IEEE Transactions on Information Theory, vol.22, issue.2, pp.138-147, 1976. ,
DOI : 10.1109/TIT.1976.1055530
F5???A Steganographic Algorithm, Lecture Notes in Computer Science, vol.2137, pp.289-302, 2001. ,
DOI : 10.1007/3-540-45496-9_21
Fast BCH Syndrome Coding for Steganography, Information Hiding, pp.48-58, 2009. ,
DOI : 10.1007/3-540-45496-9_21