Key-Efficient Steganography Jan 1, 2013· Aggelos Kiayias , Alexander Russell , Shashidhar Narasimha · 0 min read Cite DOI Type 1 Publication Proceedings of the 14th International Conference on Information Hiding (IH) Last updated on Jan 1, 2013 ← Dealing with Undependable Workers in Decentralized Network Supercomputing Jan 1, 2013 Malicious takeover of voting systems: Arbitrary code execution on optical scan voting terminals Jan 1, 2013 →