메뉴 건너뛰기




Volumn 1, Issue 3, 2003, Pages 32-44

Hide and seek: An introduction to steganography

Author keywords

[No Author keywords available]

Indexed keywords

CUMULATIVE DISTRIBUTION FUNCTION (CDF); DISCRETE COSINE TRANSFORM (DCT); HISTOGRAMS; STEGANOGRAPHY;

EID: 3042742327     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSECP.2003.1203220     Document Type: Review
Times cited : (837)

References (29)
  • 2
    • 0032680807 scopus 로고    scopus 로고
    • Information hiding - A survey
    • F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Information Hiding - A Survey," Proc. IEEE, vol. 87, no. 7, 1999, pp. 1062-1078.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1062-1078
    • Petitcolas, F.A.P.1    Anderson, R.J.2    Kuhn, M.G.3
  • 4
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • B. Chen and G.W. Wornell, "Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding," IEEE Trans. Information Theory, vol. 47, no. 4, 2001, pp. 1423-1443.
    • (2001) IEEE Trans. Information Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 5
    • 0031996445 scopus 로고    scopus 로고
    • Exploring steganography: Seeing the unseen
    • N.F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen," Computer, vol. 31, no. 2, 1998, pp. 26-34.
    • (1998) Computer , vol.31 , Issue.2 , pp. 26-34
    • Johnson, N.F.1    Jajodia, S.2
  • 9
    • 84904224992 scopus 로고    scopus 로고
    • Steganalysis of images created using current steganographic software
    • Springer-Verlag
    • N.F. Johnson and S. Jajodia, "Steganalysis of Images Created Using Current Steganographic Software," Proc. 2nd Int'l Workshop in Information Hiding, Springer-Verlag, 1998, pp. 273-289.
    • (1998) Proc. 2nd Int'l Workshop in Information Hiding , pp. 273-289
    • Johnson, N.F.1    Jajodia, S.2
  • 10
    • 0036452586 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistical models
    • IEEE Press
    • H. Farid, "Detecting Hidden Messages Using Higher-Order Statistical Models," Proc. Int'l Conf. Image Processing, IEEE Press, 2002.
    • (2002) Proc. Int'l Conf. Image Processing
    • Farid, H.1
  • 11
    • 0041308536 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • Springer-Verlag
    • S. Lyu and H. Farid, "Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines," Proc. 5th Int'l Workshop on Information Hiding, Springer-Verlag, 2002.
    • (2002) Proc. 5th Int'l Workshop on Information Hiding
    • Lyu, S.1    Farid, H.2
  • 12
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis
    • Usenix Assoc.
    • N. Proves, "Defending Against Statistical Steganalysis," Proc. 10th Usenix Security Symp., Usenix Assoc., 2001, pp. 323-335.
    • (2001) Proc. 10th Usenix Security Symp. , pp. 323-335
    • Proves, N.1
  • 13
    • 0038675417 scopus 로고    scopus 로고
    • A fast and effective steganalytic technique against JSteg-like algorithms
    • ACM Press
    • T. Zhang and X. Ping, "A Fast and Effective Steganalytic Technique Against JSteg-like Algorithms," Proc. 8th ACM Symp. Applied Computing, ACM Press, 2003.
    • (2003) Proc. 8th ACM Symp. Applied Computing
    • Zhang, T.1    Ping, X.2
  • 17
    • 84937814312 scopus 로고    scopus 로고
    • F5 - A steganographic algorithm: High capacity despite better steganalysis
    • Springer-Verlag
    • A. Westfeld, "F5 - A Steganographic Algorithm: High Capacity Despite Better Steganalysis," Proc. 4th Int'l Workshop Information Hiding, Springer-Verlag, 2001, pp. 289-302.
    • (2001) Proc. 4th Int'l Workshop Information Hiding , pp. 289-302
    • Westfeld, A.1
  • 20
    • 0039430385 scopus 로고    scopus 로고
    • Terror groups hide behind web encryption
    • Feb.
    • J. Kelley, "Terror Groups Hide Behind Web Encryption," USA Today, Feb. 2001, www.usatoday.com/life/cyber/tech/2001-02-05-binladen.htm.
    • (2001) USA Today
    • Kelley, J.1
  • 21
    • 79955590156 scopus 로고    scopus 로고
    • Secret messages come in .wavs
    • Feb.
    • D. McCullagh, "Secret Messages Come in .Wavs," Wired News, Feb. 2001, www.wired.com/news/politics/0,1283,41861,00.html.
    • (2001) Wired News
    • McCullagh, D.1
  • 22
    • 3042729016 scopus 로고    scopus 로고
    • Militants wire web with links to jihad
    • July
    • J. Kelley, "Militants Wire Web with Links to Jihad," USA Today, July 2002, www.usatoday.com/news/world/2002/07/10/web-terror-cover.htm.
    • (2002) USA Today
    • Kelley, J.1
  • 24
    • 0001254670 scopus 로고
    • Description of a new variable-length key, 64-bit block cipher (blowfish)
    • Springer-Verlag
    • B. Schneier, "Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)," Fast Software Encryption, Cambridge Security Workshop Proc., Springer-Verlag, 1993, pp. 191-204.
    • (1993) Fast Software Encryption, Cambridge Security Workshop Proc. , pp. 191-204
    • Schneier, B.1
  • 27
    • 0033281215 scopus 로고    scopus 로고
    • The base-rate fallacy and its implications for the difficulty of intrusion detection
    • ACM Press
    • S. Axelsson, "The Base-Rate Fallacy and its Implications for the Difficulty of Intrusion Detection," Proc. 6th ACM Conf. Computer and Comm. Security, ACM Press, 1999, pp. 1-7.
    • (1999) Proc. 6th ACM Conf. Computer and Comm. Security , pp. 1-7
    • Axelsson, S.1
  • 29
    • 0040231044 scopus 로고
    • Foiling the cracker: A survey of, and improvements to, password security
    • Usenix Assoc.
    • D. Klein, "Foiling the Cracker: A Survey of, and Improvements to, Password Security," Proc. 2nd Usenix Security Workshop, Usenix Assoc., 1990, pp. 5-14.
    • (1990) Proc. 2nd Usenix Security Workshop , pp. 5-14
    • Klein, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.