메뉴 건너뛰기




Volumn 3563 LNCS, Issue , 2005, Pages 118-125

Data hiding in identification and offset IP fields

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL IMAGE STORAGE; IDENTIFICATION (CONTROL SYSTEMS); INFORMATION DISSEMINATION; SECURITY OF DATA;

EID: 33646062624     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11533962_11     Document Type: Conference Paper
Times cited : (17)

References (19)
  • 1
    • 0013295432 scopus 로고    scopus 로고
    • The history of steganography, proceedings: Information hiding
    • Cambridge UK
    • D Kanh, The History of Steganography, Proceedings: Information Hiding. First International Workshop, Cambridge UK pp1-5 1996
    • (1996) First International Workshop , pp. 1-5
    • Kanh, D.1
  • 2
    • 0030384775 scopus 로고    scopus 로고
    • 15. Craig H. Rowland, Covert Channels in the TCP/IP protocol suite. First Monday
    • W Bender et al. Techniques for Data Hiding IBM Systems Journal Vol 35 Nos. 3&4, pp 313-336, 1996 15. Craig H. Rowland, Covert Channels in the TCP/IP protocol suite. First Monday, 2003.
    • (1996) Techniques for Data Hiding IBM Systems Journal , vol.35 , Issue.3-4 , pp. 313-336
    • Bender, W.1
  • 3
    • 2542419686 scopus 로고
    • Transmission control protocol
    • Darpa Internet Program, Protocol Specification, September
    • RFC 793, Transmission Control Protocol, Darpa Internet Program, Protocol Specification, September 1981
    • (1981) RFC , vol.793
  • 4
    • 0003466371 scopus 로고
    • Internet protocol
    • Darpa Internet Program, Protocol Specification, September
    • RFC 791 Internet Protocol, Darpa Internet Program, Protocol Specification, September 1981
    • (1981) RFC , vol.791
  • 5
    • 0001217738 scopus 로고
    • Prisoners' problem arid the subliminal channel
    • D. Chaum, ed. Plenum, New York
    • Simmons, O. J. Prisoners' problem arid the subliminal channel., Advances in Cryptology: Proceedings of CRYTTO 83. D. Chaum, ed. Plenum, New York, 1983, pp. 51-67.
    • (1983) Advances in Cryptology: Proceedings of CRYTTO 83 , pp. 51-67
    • Simmons, O.J.1
  • 6
    • 84904224992 scopus 로고    scopus 로고
    • Steganalysis of images created using current steganography software
    • Proceedings Second Information Hiding Workshop held in Portland, Oregon, USA, April 15-17
    • Neil F. Johnson and Sushil Jajodia, Steganalysis of Images Created Using Current Steganography Software, Proceedings Second Information Hiding Workshop held in Portland, Oregon, USA, April 15-17, 1998, Lecture Notes in Computer Science, Vol. 1525, pp 273-289
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 273-289
    • Johnson, N.F.1    Jajodia, S.2
  • 8
    • 84957728214 scopus 로고    scopus 로고
    • Steganalysis: The investigation of hidden information
    • Syracuse, New York, USA, September 1st - 3rd
    • Neil F. Johnson and Sushil Jajodia, Steganalysis: The Investigation of Hidden Information,. IEEE Information Technology Conference, Syracuse, New York, USA, September 1st - 3rd, 1998: 113-116.
    • (1998) IEEE Information Technology Conference , pp. 113-116
    • Johnson, N.F.1    Jajodia, S.2
  • 9
    • 0031996445 scopus 로고    scopus 로고
    • Exploring steganography: Seeing the unseen
    • February
    • Neil F. Johnson, Sushil Jajodia, Exploring Steganography: Seeing the Unseen, IEEE Computer, February 1998 (Vol. 31, No. 2) pp 26-34
    • (1998) IEEE Computer , vol.31 , Issue.2 , pp. 26-34
    • Johnson, N.F.1    Jajodia, S.2
  • 11
    • 0036085154 scopus 로고    scopus 로고
    • An investigation into the application of linear feedback shift registers for steganography SoutheastCon, 2002
    • 5-7 April
    • Jamil, T.; Ahmad, A.; An Investigation into the application of Linear Feedback Shift Registers for Steganography SoutheastCon, 2002. Proceedings IEEE, 5-7 April 2002 pp 239 - 244
    • (2002) Proceedings IEEE , pp. 239-244
    • Jamil, T.1    Ahmad, A.2
  • 14
    • 11844252006 scopus 로고    scopus 로고
    • Cyber warfare: Steganography vs. steganalysis
    • October
    • Huaiqing Wang, Shuozhong Wang; Cyber warfare: Steganography vs. Steganalysis, Communications of the ACM archive, Volume 47, Issue 10 (October 2004) pp. 76 - 82
    • (2004) Communications of the ACM Archive , vol.47 , Issue.10 , pp. 76-82
    • Wang, H.1    Wang, S.2
  • 17
    • 0032070303 scopus 로고    scopus 로고
    • On the limits of Steganography Comput. Lab
    • May
    • Anderson, R.J. Petitcolas, F.A.P., On the limits of Steganography Comput. Lab., IEEE Journal on Communications, May 1998, Volume: 16, Issue: 4 pp. 474-481
    • (1998) IEEE Journal on Communications , vol.16 , Issue.4 , pp. 474-481
    • Anderson, R.J.1    Petitcolas, F.A.P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.