Steganography via covering codes | IEEE Conference Publication | IEEE Xplore