메뉴 건너뛰기




Volumn , Issue , 2000, Pages 41-50

A new paradigm hidden in steganography

Author keywords

Information hiding; Steganography

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; MATHEMATICAL MODELS; POLYNOMIALS; SECURITY OF DATA; SPURIOUS SIGNAL NOISE; WEBSITES;

EID: 0034593277     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/366173.366189     Document Type: Conference Paper
Times cited : (25)

References (25)
  • 1
    • 0012085074 scopus 로고    scopus 로고
    • Information hiding: First international workshop
    • Springer-Verlag
    • R.J. Anderson, editor: Information Hiding: First International Workshop, vol. 1174 of Lecture Notes in Computer Science. Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1174
    • Anderson, R.J.1
  • 2
    • 84955563192 scopus 로고    scopus 로고
    • Stretching the limits of steganography
    • R. Anderson, editor, Information Hiding: First International Workshop, Springer-Verlag
    • R.J. Anderson: Stretching the Limits of Steganography, In R. Anderson, editor, Information Hiding: First International Workshop, vol. 1174 of LNCS, pp. 39-48. Springer-Verlag, 1996.
    • (1996) LNCS , vol.1174 , pp. 39-48
    • Anderson, R.J.1
  • 5
    • 0012085074 scopus 로고    scopus 로고
    • Information hiding: Second international workshop
    • Springer-Verlag
    • D. Aucsmith, editor: Information Hiding: Second International Workshop, vol. 1525 of Lecture Notes in Computer Science. Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1525
    • Aucsmith, D.1
  • 6
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • D. Aucsmith, editor, Information Hiding: Second International Workshop, Springer-Verlag
    • C. Cachin: An Information-Theoretic Model for Steganography In D. Aucsmith, editor, Information Hiding: Second International Workshop, vol. 1525 of LNCS, pp. 306-318. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1525 , pp. 306-318
    • Cachin, C.1
  • 7
    • 4544318088 scopus 로고    scopus 로고
    • Critical analysis of security in voice hiding techniques
    • Y. Han, T. Okamoto, and S. Qing, editors, Information and Communications Security: First International Conference, Springer-Verlag
    • L. Chang and I.S. Moskowitz Critical Analysis of Security in Voice Hiding Techniques In Y. Han, T. Okamoto, and S. Qing, editors, Information and Communications Security: First International Conference, vol. 1334 of Lecture Notes in Computer Science, pp. 203-216, Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1334 , pp. 203-216
    • Chang, L.1    Moskowitz, I.S.2
  • 8
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszar: Broadcast Channels with Confidential Messages IEEE Transaction on Information Theory, V. IT-24, No. 3, pp. 339-349, May 1978.
    • (1978) IEEE Transaction on Information Theory , vol.IT-24 , Issue.3 , pp. 339-349
    • Csiszar, I.1
  • 9
    • 0001868835 scopus 로고    scopus 로고
    • Surmounting the effects of lossy compression on steganography
    • Baltimore, MD, October
    • D.L. Currie, III and C.E. Irvine: Surmounting the Effects of Lossy Compression on Steganography, In National Information System Security Conference, Baltimore, MD, pp. 194-201, October 1996
    • (1996) National Information System Security Conference , pp. 194-201
    • Currie D.L. III1    Irvine, C.E.2
  • 10
    • 0031103783 scopus 로고    scopus 로고
    • On a special class of broadcast channels with confidential messages
    • March
    • M. van Dijk: On a Special Class of Broadcast Channels with Confidential Messages, IEEE Transactions on Information Theory, V. 43, No. 2, pp. 712-714, March 1997.
    • (1997) IEEE Transactions on Information Theory , vol.43 , Issue.2 , pp. 712-714
    • Van Dijk, M.1
  • 11
    • 84957886834 scopus 로고    scopus 로고
    • Steganalysis and game equilibria
    • D. Aucsmith, editor, Information Hiding: Second International Workshop, Springer-Verlag
    • J.M. Ettinger: Steganalysis and Game Equilibria In D. Aucsmith, editor, Information Hiding: Second International Workshop, vol. 1525 of LNCS, pp. 319-328. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1525 , pp. 319-328
    • Ettinger, J.M.1
  • 12
    • 84955584804 scopus 로고    scopus 로고
    • The history of steganography
    • R. Anderson, editor, Information Hiding: First International Workshop, Springer-Verlag
    • D. Kahn: The History of Steganography In R. Anderson, editor, Information Hiding: First International Workshop, vol. 1174 of LNCS, pp. 1-6, Springer-Verlag, 1996.
    • (1996) LNCS , vol.1174 , pp. 1-6
    • Kahn, D.1
  • 14
    • 85055811894 scopus 로고
    • A cautionary note on image downgrading
    • San Antonio, TX, USA, Dec.
    • C Kurak & J. McHugh: A Cautionary Note on Image Downgrading In Computer Security Applications Conference, San Antonio, TX, USA, pp. 153-159, Dec. 1992.
    • (1992) Computer Security Applications Conference , pp. 153-159
    • Kurak, C.1    McHugh, J.2
  • 16
    • 84947902426 scopus 로고    scopus 로고
    • An information-theoretic approach to steganography and watermarking
    • A. Pfitzmann, editor, Information Hiding: Third International Workshop, Springer-Verlag
    • T. Mittelholzer: An Information-Theoretic Approach to Steganography and Watermarking In A. Pfitzmann, editor, Information Hiding: Third International Workshop, vol. 1768 of LNCS, pp. 1-16. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1768 , pp. 1-16
    • Mittelholzer, T.1
  • 18
    • 0012085074 scopus 로고    scopus 로고
    • Information hiding: Third international workshop
    • Springer-Verlag
    • A. Pfitzmann, editor: Information Hiding: Third International Workshop, vol. 1768 of Lecture Notes in Computer Science. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1768
    • Pfitzmann, A.1
  • 19
    • 84955568589 scopus 로고    scopus 로고
    • Information hiding terminology
    • R. Anderson, editor, Information Hiding: First International Workshop, Springer-Verlag
    • B. Pfitzmann: Information Hiding Terminology In R. Anderson, editor, Information Hiding: First International Workshop, vol. 1174 of LNCS, pp. 347-350. Springer-Verlag, 1996.
    • (1996) LNCS , vol.1174 , pp. 347-350
    • Pfitzmann, B.1
  • 20
    • 84953635000 scopus 로고
    • Description of a new variable-length key, 64-bit block cipher (Blowfish)
    • R. Anderson, editor, Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, (Blowfish implementation written by Eric Young)
    • B. Schneier: Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish), In R. Anderson, editor, Fast Software Encryption, Cambridge Security Workshop Proceedings, vol. 809 of LNCS, pp. 191-204. Springer-Verlag, 1994 (Blowfish implementation written by Eric Young).
    • (1994) LNCS , vol.809 , pp. 191-204
    • Schneier, B.1
  • 21
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C.E Shannon: Communication theory of Secrecy Systems Bell System Technical Journal, Vol. 28, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 22
    • 0001217738 scopus 로고
    • The prisoners' problem and the subliminal channel
    • D. Chaum, editor, Plenum Press
    • G. Simmons: The Prisoners' Problem and the Subliminal Channel In D. Chaum, editor, Advances in Cryptology: Proceedings of Crypto 83, pp. 51-67. Plenum Press, 1984.
    • (1984) Advances in Cryptology: Proceedings of Crypto , vol.83 , pp. 51-67
    • Simmons, G.1
  • 24
    • 0016562514 scopus 로고
    • The wire-tap channel
    • October
    • A.D. Wyner: The Wire-Tap Channel The Bell System Technical Journal, V. 54, No. 8, pp. 1355-1387, October 1975.
    • (1975) The Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 25
    • 84957886335 scopus 로고    scopus 로고
    • Modeling the security of steganographic systems
    • D. Aucsmith, editor, Information Hiding: Second International Workshop, Springer-Verlag
    • J. Zollner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wieke, & G. Wolf: Modeling the Security of Steganographic Systems In D. Aucsmith, editor, Information Hiding: Second International Workshop, vol. 1525 of LNCS, pp. 344-354. Springer-Verlag, 1998
    • (1998) LNCS , vol.1525 , pp. 344-354
    • Zollner, J.1    Federrath, H.2    Klimant, H.3    Pfitzmann, A.4    Piotraschke, R.5    Westfeld, A.6    Wieke, G.7    Wolf, G.8


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.