Practical Data-Hiding: Additive Attacks Performance Analysis | Publicación