메뉴 건너뛰기




Volumn 2, Issue 1, 2007, Pages 24-30

A new steganographic method for data hiding in microsoft word documents by a change tracking technique

Author keywords

Stegodocument

Indexed keywords

MICROSOFT WORD DOCUMENTS; STEGANOGRAPHIC METHOD; STEGODOCUMENT;

EID: 33847748545     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2006.890310     Document Type: Article
Times cited : (125)

References (25)
  • 1
    • 0030384775 scopus 로고    scopus 로고
    • Techniques for data hiding
    • W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Syst. J., vol. 35, no. 3-4, pp. 313-336, 1996.
    • (1996) IBM Syst. J , vol.35 , Issue.3-4 , pp. 313-336
    • Bender, W.1    Gruhl, D.2    Morimoto, N.3    Lu, A.4
  • 2
    • 0032680807 scopus 로고    scopus 로고
    • Information hiding - A survey
    • Jul
    • F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding - A survey," Proc. IEEE, vol. 87, no. 7, pp. 1062-1078, Jul. 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1062-1078
    • Petitcolas, F.A.P.1    Anderson, R.J.2    Kuhn, M.G.3
  • 3
    • 0033312461 scopus 로고    scopus 로고
    • Multi-level data hiding for digital image and video
    • presented at the, Boston, MA
    • M. Wu, H. Yu, and A. Gelman, "Multi-level data hiding for digital image and video," presented at the SPIE Photonics East, Boston, MA, 1999.
    • (1999) SPIE Photonics East
    • Wu, M.1    Yu, H.2    Gelman, A.3
  • 6
    • 0037410595 scopus 로고    scopus 로고
    • A steganographic method for images by pixel-value differencing
    • D. C. Wu and W. H. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognit. Lett., vol. 24, no. 9-10, pp. 1613-1626, 2003.
    • (2003) Pattern Recognit. Lett , vol.24 , Issue.9-10 , pp. 1613-1626
    • Wu, D.C.1    Tsai, W.H.2
  • 7
    • 0032637701 scopus 로고    scopus 로고
    • Copyright protection for the electronic distribution of text Documents
    • Jul
    • J. T. Brassil and N. F. Maxemchuk, "Copyright protection for the electronic distribution of text Documents," Proc. IEEE, vol. 87, no. 7, pp. 1181-1196, Jul. 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1181-1196
    • Brassil, J.T.1    Maxemchuk, N.F.2
  • 8
    • 64249108718 scopus 로고    scopus 로고
    • online at: [Online, Available
    • M. Kwan, GIF Colourmap Steganography 2003, online at: [Online]. Available: http://www.darkside.com.au/gifshuffle/.
    • (2003) Steganography
    • Kwan, M.1    Colourmap, G.I.F.2
  • 10
  • 11
    • 33847749094 scopus 로고    scopus 로고
    • K. Bennett, Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text, Purdue Univ., West Lafayette, IN, CERIAS Tech. Rep. 2004-13, May 2004.
    • K. Bennett, "Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text," Purdue Univ., West Lafayette, IN, CERIAS Tech. Rep. 2004-13, May 2004.
  • 14
    • 84957728214 scopus 로고    scopus 로고
    • Steganalysis: The Investigation of Hidden Information
    • Syracuse, NY, Sep
    • F. Johnson and S. Jajodia, "Steganalysis: The Investigation of Hidden Information," in Proc. IEEE Information Technology Conf., Syracuse, NY, Sep. 1998, pp. 113-116.
    • (1998) Proc. IEEE Information Technology Conf , pp. 113-116
    • Johnson, F.1    Jajodia, S.2
  • 15
    • 20844453087 scopus 로고    scopus 로고
    • A new steganography method based on hypertext
    • Aug
    • G. Sui and H. Luo, "A new steganography method based on hypertext," in Proc. Radio Science Conf., Aug. 2004, pp. 181-184.
    • (2004) Proc. Radio Science Conf , pp. 181-184
    • Sui, G.1    Luo, H.2
  • 16
    • 84947255170 scopus 로고    scopus 로고
    • A practical and effective approach to large-scale automated linguistic steganography
    • Malaga, Spain, Oct
    • M. Chapman, I. D. George, and R. Marc, "A practical and effective approach to large-scale automated linguistic steganography," in Proc. Information Security Conf., Malaga, Spain, Oct. 2001, pp. 156-165.
    • (2001) Proc. Information Security Conf , pp. 156-165
    • Chapman, M.1    George, I.D.2    Marc, R.3
  • 18
    • 84950895792 scopus 로고
    • Mimic functions
    • P. Wayner, "Mimic functions," Crypt., vol. XVI, no. 3, pp. 193-214, 1992.
    • (1992) Crypt , vol.16 , Issue.3 , pp. 193-214
    • Wayner, P.1
  • 19
    • 0013272272 scopus 로고    scopus 로고
    • Microsoft Office 97 Visual Basic Programmer's Guide
    • Microsoft Professional Editions
    • Microsoft Office 97 Visual Basic Programmer's Guide, Microsoft Professional Editions Series, 1997.
    • (1997) Series
  • 21
    • 33847747928 scopus 로고    scopus 로고
    • WordNet v2.1, a lexical database for the English language. Princeton Univ., Princeton, NJ, 2005.
    • WordNet v2.1, a lexical database for the English language. Princeton Univ., Princeton, NJ, 2005.
  • 23
    • 35048885080 scopus 로고    scopus 로고
    • A method of linguistic steganography based on collocationally-verifled synonymy
    • Toronto, ON, Canada, May
    • I. A. Bolshakov, "A method of linguistic steganography based on collocationally-verifled synonymy," in Proc. 6th Information Hiding Workshop, Toronto, ON, Canada, May 2004, pp. 180-191.
    • (2004) Proc. 6th Information Hiding Workshop , pp. 180-191
    • Bolshakov, I.A.1
  • 24
    • 11844252006 scopus 로고    scopus 로고
    • Cyber warfare: Steganography vs. steganalysis
    • H. Wang and S. Wang, "Cyber warfare: Steganography vs. steganalysis," Commun. ACM, vol. 47, no. 10, pp. 76-82, 2004.
    • (2004) Commun. ACM , vol.47 , Issue.10 , pp. 76-82
    • Wang, H.1    Wang, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.