International audienceIn this survey paper we consider the class of protocols for information-hiding which use randomization to obfuscate the link between the observables and the information to be protected. We focus on the problem of formalizing the notion of information hiding, and verifying that a given protocol achieves the intended degree of protection. Without the pretense of being omni-comprehensive, we review the main approaches that have been explored in literature: possibilistic, probabilistic, information-theoretic, and statistical
International audienceIn this research work, security concepts are formalized in steganography, and ...
International audienceWe address the problem of computing the information leakage of a system in an ...
International audienceRandomized protocols for hiding private information can be regarded as noisy c...
International audienceIn this survey paper we consider the class of protocols for information-hiding...
In this survey paper we consider the class of protocols for information-hiding which use randomizati...
International audienceProtocols for information-hiding often use randomized primitives to obfuscate ...
International audienceSystems concerned with information hiding often use randomization to obfuscate...
International audienceThe quantification of information leakage provides a quantitative evaluation o...
International audienceInformation hiding is a general concept which refers to the goal of preventing...
International audienceIn information-hiding, an adversary that tries to infer the secret information...
In this thesis, we considered different approaches for quantifying information hiding in communicati...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
International audienceIn this research work, security concepts are formalized in steganography, and ...
International audienceWe address the problem of computing the information leakage of a system in an ...
International audienceRandomized protocols for hiding private information can be regarded as noisy c...
International audienceIn this survey paper we consider the class of protocols for information-hiding...
In this survey paper we consider the class of protocols for information-hiding which use randomizati...
International audienceProtocols for information-hiding often use randomized primitives to obfuscate ...
International audienceSystems concerned with information hiding often use randomization to obfuscate...
International audienceThe quantification of information leakage provides a quantitative evaluation o...
International audienceInformation hiding is a general concept which refers to the goal of preventing...
International audienceIn information-hiding, an adversary that tries to infer the secret information...
In this thesis, we considered different approaches for quantifying information hiding in communicati...
International audienceRandomized protocols for hiding private information can fruitfully be regarded...
International audienceIn this research work, security concepts are formalized in steganography, and ...
International audienceWe address the problem of computing the information leakage of a system in an ...
International audienceRandomized protocols for hiding private information can be regarded as noisy c...