[1] L. Bielik: The Raven paradox, logic, and methods of testing. Organon F, Internat. J. Anal. Philos. 18 (2011), 2, 213–225.
[2] F. Gahér, L. Bielik, M. Zouhar: On definitions and defining. Filozofia 65 (2010), 8, 719–737.
[5] O. Grošek, P. Zajac: Automated cryptanalysis. In: Encyclopedia of Artificial Intelligence (J. R. Rabunal Dopico, J. Dorado De La Calle, and A. Pazos Sierra, eds.), 2009, pp. 179–185.
[6] M. Jókay: The design of a steganographic system based on the internal MP4 file structures. WSEAS Trans. (2011), preprint.
[7] I. Moskowitz, G. Longdon, L. Chang: A new paradigm hidden in steganography. In: Workshop on new security paradigms (2000). ACM Press, New York, pp. 41–50.
[8] Motion Picture Experts Group: ISO/IEC 14496-12:2004 Information Technology – Coding of Audio-visual Objects – Part 12: ISO Base Media File Format. International Organization for Standardization, 2004.
[9] Motion Picture Experts Group: ISO/IEC 14496-12:2004 Information Technology – Coding of Audio-visual Objects – Part 14: MP4 File Format. International Organization for Standardization, 2004.
[10] F. Pereira C. N., E. Touradj: The MPEG-4 Book. Upper Saddle River, Prentice Hall PTR, NJ 2002.
[11] K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, S. Chandrasekaran:
Robust image-adaptive data hiding based on erasure and error correction. In: IEEE Trans. Image Process. 14 (2004), 1627–1639.
DOI 10.1109/TIP.2004.837557
[12] M. Vojvoda:
A survey of security mechanisms in mobile communication systems. Tatra Mt. Math. Publ. 25 (2002), 101–117.
MR 1976476 |
Zbl 1050.94533
[13] M. Vojvoda, O. Grošek: Postranné kanály v kryptoanalýze. EE časopis pre elektrotechniku a energetiku 14 14 (2008), 26–29.
[15] C. Xu, X. Ping, T. Zhang: Steganography in compressed video stream. In: Proc. First Internat. Conference of Innovative Computing, Information and Control (2006).
[17] P. Zajac:
Ciphertext language identification. J. Electr. Engrg. 57 (2006), 7/s, 26–29.
Zbl 1159.94375
[18] P. Zajac: On the use of the method of syllogisms in algebraic cryptanalysis. In: Proc. 1st Plenary Conference of the NIL-I-004: Bergen 2009, pp. 21–30