Computer Science ›› 2006, Vol. 33 ›› Issue (6): 140-142.

Previous Articles     Next Articles

  

  • Online:2018-11-17 Published:2018-11-17

Abstract: information-Theoretical methods are applied to analysis Secure Steganographic System in this paper. Shannon entropy and relative entropy are introduced to evaluate a secure Steganographie System separately. And the two methods are compared and some conclu

Key words: Information hiding, Information theory, Entropy, Unconditional security

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!