Login / Signup
Perfectly Secure Steganography Using Minimum Entropy Coupling.
Christian Schröder de Witt
Samuel Sokota
J. Zico Kolter
Jakob N. Foerster
Martin Strohmeier
Published in:
CoRR (2022)
Keyphrases
</>
security requirements
information security
spread spectrum
security protocols
authentication scheme
key management
data management
highly efficient
security issues
sensitive data
security analysis
authentication protocol
high capacity
security measures
covert channel