Computer Science ›› 2006, Vol. 33 ›› Issue (6): 140-142.
Previous Articles Next Articles
Online:
Published:
Abstract: information-Theoretical methods are applied to analysis Secure Steganographic System in this paper. Shannon entropy and relative entropy are introduced to evaluate a secure Steganographie System separately. And the two methods are compared and some conclu
Key words: Information hiding, Information theory, Entropy, Unconditional security
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2006/V33/I6/140
Cited