-
2
-
-
84957728214
-
Steganalysis: The investigation of hidden information
-
Syracuse, New York, USA
-
Johnson, N.F., Jajodia, S.: Steganalysis: The investigation of hidden information. In: Proceedings of the IEEE Information Technology Conference, Syracuse, New York, USA (1998) 113-116
-
(1998)
Proceedings of the IEEE Information Technology Conference
, pp. 113-116
-
-
Johnson, N.F.1
Jajodia, S.2
-
3
-
-
0012085074
-
Information Hiding: Proceedings of the First International Workshop
-
Anderson, R., ed.: Anderson, R., ed.: Cambridge, U.K., Springer
-
Anderson, R., ed.: Information Hiding: Proceedings of the First International Workshop. In Anderson, R., ed.: Lecture Notes in Computer Science 1174, Cambridge, U.K., Springer (1996)
-
(1996)
Lecture Notes in Computer Science 1174
-
-
-
4
-
-
0012085074
-
Information Hiding: Proceedings of the Second International Workshop
-
Aucsmith, D., ed.: Aucsmith, D., ed.: Portland, Oregon, U.S.A., Springer
-
Aucsmith, D., ed.: Information Hiding: Proceedings of the Second International Workshop. In Aucsmith, D., ed.: Lecture Notes in Computer Science 1525, Portland, Oregon, U.S.A., Springer (1998)
-
(1998)
Lecture Notes in Computer Science
, vol.1525
-
-
-
5
-
-
0012085074
-
Information Hiding: Proceedings of the Fourth International Workshop
-
Moskowitz, I.S., ed.: Moskowitz, I.S., ed.: Pittsburg, PA, U.S.A., Springer
-
Moskowitz, I.S., ed.: Information Hiding: Proceedings of the Fourth International Workshop. In Moskowitz, I.S., ed.: Lecture Notes in Computer Science 2137, Pittsburg, PA, U.S.A., Springer (2001)
-
(2001)
Lecture Notes in Computer Science
, vol.2137
-
-
-
7
-
-
0012085074
-
Information Hiding: Proceedings of the Third International Workshop
-
Pfitzmann, A., ed.: Pfitzmann, A., ed.: Dresden, Germany, Springer
-
Pfitzmann, A., ed.: Information Hiding: Proceedings of the Third International Workshop. In Pfitzmann, A., ed.: Lecture Notes in Computer Science 1768, Dresden, Germany, Springer (1999)
-
(1999)
Lecture Notes in Computer Science
, vol.1768
-
-
-
8
-
-
35048830418
-
Information hiding through semantics-preserving application-layer protocol steganography
-
Center for Systems Assurance, Syracuse University
-
Chapin, S.J., Ostermann, S.: Information hiding through semantics-preserving application-layer protocol steganography. Technical report, Center for Systems Assurance, Syracuse University (2002)
-
(2002)
Technical Report
-
-
Chapin, S.J.1
Ostermann, S.2
-
10
-
-
33746096279
-
-
Oak Ridge National Laboratory (Contract No. DE-AC05-96OR22464), Oak Ridge, Tennessee (1998) [ORNL/TM-limited distribution].
-
Dunigan, T.: Internet steganography. Technical report, Oak Ridge National Laboratory (Contract No. DE-AC05-96OR22464), Oak Ridge, Tennessee (1998) [ORNL/TM-limited distribution].
-
Internet Steganography. Technical Report
-
-
Dunigan, T.1
-
11
-
-
33746069919
-
Hiding data in the OSI network model. in Anderson, R., ed
-
Cambridge, U.K., Springer
-
Handel, T., Sandford, M.: Hiding data in the OSI network model. In Anderson, R., ed.: Information Hiding: Proceedings of the First International Workshop, Cambridge, U.K., Springer (1996) 23-38
-
(1996)
Information Hiding: Proceedings of the First International Workshop
, pp. 23-38
-
-
Handel, T.1
Sandford, M.2
-
12
-
-
35048902629
-
-
route@infonexus.com, alhambra@infornexus.com: Article 6. Phrack Magazine, 49 (1996) Retrieved on August 27, 2002 from the World Wide Web
-
route@infonexus.com, alhambra@infornexus.com: Article 6. Phrack Magazine, 49 (1996) Retrieved on August 27, 2002 from the World Wide Web: http://www.phrack.com/phrack/49/P49-06.
-
-
-
-
14
-
-
35048888506
-
-
CAIDA.org: Characterization of internet traffic loads, segregated by application - OC48 analysis (2002) Retrieved on October 15, 2003 from the World Wide Web
-
CAIDA.org: Characterization of internet traffic loads, segregated by application - OC48 analysis (2002) Retrieved on October 15, 2003 from the World Wide Web: http://www.caida.org/analysis/workload/byapplication/oc48/20020305/ apps_perc_20020305/index.xml.
-
-
-
-
15
-
-
0036030621
-
Defining security in steganographic systems
-
Katzenbeisser, S., Petitcolas, F.A.: Defining security in steganographic systems. In: Electronic Imaging, Photonics West, (SPIE). Volume 4675 of Security and Watermarking of Multimedia Contents IV. (2002) 50-56
-
(2002)
Electronic Imaging, Photonics West, (SPIE).
, vol.4675
, pp. 50-56
-
-
Katzenbeisser, S.1
Petitcolas, F.A.2
-
16
-
-
0034593277
-
A new paradigm hidden in steganography
-
Cork, Ireland
-
Moskowitz, I.S., Longdon, G.E., LiWuChang: A new paradigm hidden in steganography. In: Proceedings of the New Security Paradigm Workshop 2000, Cork, Ireland (2000) 41-50
-
(2000)
Proceedings of the New Security Paradigm Workshop 2000
, pp. 41-50
-
-
Moskowitz, I.S.1
Longdon, G.E.2
LiWuChang3
-
17
-
-
35048825755
-
An information-theoreic model for steganography
-
Cachin, C.: An information-theoreic model for steganography. Technical Report Report 2000/028 (2002) http://www.zurich.ibm.com/cca/papers/stego.pdf.
-
(2002)
Technical Report Report 2000/028
-
-
Cachin, C.1
-
19
-
-
84947902426
-
An information-theoretic approach to steganography and watermarking
-
Pfitzmann, A., ed.: Dresden, Germany, Springer
-
Mittelholzer, T.: An information-theoretic approach to steganography and watermarking. In Pfitzmann, A., ed.: Information Hiding: Proceedings of the Third International Workshop. Volume 1768 of Lecture Notes in Computer Science., Dresden, Germany, Springer (1999) 1-16
-
(1999)
Information Hiding: Proceedings of the Third International Workshop. Volume 1768 of Lecture Notes in Computer Science.
, vol.1768
, pp. 1-16
-
-
Mittelholzer, T.1
-
20
-
-
84957886335
-
Modeling the security of steganographic systems
-
Aucsmith, D., ed.: Portland, Oregon, U.S.A., Springer
-
Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic systems. In Aucsmith, D., ed.: Information Hiding: Proceedings of the Second International Workshop. Volume 1525 of Lecture Notes in Computer Science., Portland, Oregon, U.S.A., Springer (1998) 344-354
-
(1998)
Information Hiding: Proceedings of the Second International Workshop. Volume
, vol.1525
, pp. 344-354
-
-
Zöllner, J.1
Federrath, H.2
Klimant, H.3
Pfitzmann, A.4
Piotraschke, R.5
Westfeld, A.6
Wicke, G.7
Wolf, G.8
-
21
-
-
84957886834
-
Steganalysis and game equilibria
-
Aucsmith, D., ed.: Portland, Oregon, U.S.A., Springer
-
Ettinger, J.M.: Steganalysis and game equilibria. In Aucsmith, D., ed.: Information Hiding: Proceedings of the Second International Workshop. Volume 1525 of Lecture Notes in Computer Science., Portland, Oregon, U.S.A., Springer (1998) 319-328
-
(1998)
Information Hiding: Proceedings of the Second International Workshop. Volume 1525 of Lecture Notes in Computer Science.
, vol.1525
, pp. 319-328
-
-
Ettinger, J.M.1
-
22
-
-
84937438364
-
Provably secure steganography
-
Yung, M., ed.: Advances in Cyptology - CRYPTO 2002: Santa Barbara, California, U.S.A., Springer
-
Hopper, N., Langford, J., von Ahn, L.: Provably secure steganography. In Yung, M., ed.: Advances in Cyptology - CRYPTO 2002: Proceedings of the 22nd Annual International Cryptology Conference. Volume 2442 of Lecture Notes in Computer Science., Santa Barbara, California, U.S.A., Springer (2002) 77-92
-
(2002)
Proceedings of the 22nd Annual International Cryptology Conference. Volume 2442 of Lecture Notes in Computer Science.
, vol.2442
, pp. 77-92
-
-
Hopper, N.1
Langford, J.2
Von Ahn, L.3
-
24
-
-
0036034444
-
Practical steganalysis of digital images - State of the art
-
San Jose, California, USA
-
Fridrich, J., Goljan, M.: Practical steganalysis of digital images - state of the art. In: Proceedings of the SPIE Photonics West (Security and Watermarking of Multimedia Contents IV). Volume 4675., San Jose, California, USA (2002) 1-13
-
(2002)
Proceedings of the SPIE Photonics West (Security and Watermarking of Multimedia Contents IV).
, vol.4675
, pp. 1-13
-
-
Fridrich, J.1
Goljan, M.2
-
26
-
-
0001217738
-
The prisoners' problem and the subliminal channel
-
Plenum Press
-
Simmons, G.J.: The prisoners' problem and the subliminal channel. In: Proceedings of CRYPTO '83, Plenum Press (1984) 51-67
-
(1984)
Proceedings of CRYPTO '83
, pp. 51-67
-
-
Simmons, G.J.1
-
28
-
-
0001187269
-
-
Anderson, R., ed.: Cambridge, U.K., Springer
-
Pfitzmann, B.: Information hiding terminology. In Anderson, R., ed.: Information Hiding: Proceedings of the First International Workshop, Cambridge, U.K., Springer (1996) 347-349
-
(1996)
Information hiding terminology
, pp. 347-349
-
-
Pfitzmann, B.1
-
29
-
-
1142291573
-
Ipsofacto: A visual correlation tool for. aggregate network traffic data
-
San Diego, California, ACM Press Demonstration Session.
-
Korn, F., Muthukrishnan, S., Zhu, Y.: Ipsofacto: A visual correlation tool for. aggregate network traffic data. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, San Diego, California, ACM Press (2003) 677-677 Demonstration Session.
-
(2003)
Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data
, pp. 677-677
-
-
Korn, F.1
Muthukrishnan, S.2
Zhu, Y.3
-
30
-
-
35048890085
-
-
Ka0ticSH: Diggin em walls (part 3) - advanced/other techniques for bypassing firewalls. New Order (2002) Retrieved on August 28, 2002 from the World Wide Web
-
Ka0ticSH: Diggin em walls (part 3) - advanced/other techniques for bypassing firewalls. New Order (2002) Retrieved on August 28, 2002 from the World Wide Web: http://neworder.box.sk/newsread.php?newsid=3957.
-
-
-
-
31
-
-
33746099543
-
Eliminating steganography in Internet traffic with active wardens
-
Oostveen, J., ed.: The Netherlands, Springer
-
Fisk, G., Fisk, M., Papadopoulos, C., Neil, J.: Eliminating steganography in Internet traffic with active wardens. In Oostveen, J., ed.: Information Hiding: Preproceedings of the Fifth International Workshop, Noordwijkerhout, The Netherlands, Springer (2002) 29-46
-
(2002)
Information Hiding: Preproceedings of the Fifth International Workshop, Noordwijkerhout
, pp. 29-46
-
-
Fisk, G.1
Fisk, M.2
Papadopoulos, C.3
Neil, J.4
-
33
-
-
1642343952
-
New covert channels in HTTP - Adding unwitting web browsers to anonymity sets
-
Samarati, P., Syverson, P., eds.: Washington, DC, USA, ACM Press ISBN 1-58113-776-1.
-
Bauer, M.: New covert channels in HTTP - adding unwitting web browsers to anonymity sets. In Samarati, P., Syverson, P., eds.: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, Washington, DC, USA, ACM Press (2003) 72-78 ISBN 1-58113-776-1.
-
(2003)
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society
, pp. 72-78
-
-
Bauer, M.1
-
34
-
-
35048831362
-
-
Secure Shell Working Group, I.E.T.F.I.: The secure shell. Retrieved on October 26, 2003 from the World Wide Web
-
Secure Shell Working Group, I.E.T.F.I.: The secure shell. Retrieved on October 26, 2003 from the World Wide Web: http://www.ietf.org/html.charters/ secshcharter.html (2003)
-
-
-
|