메뉴 건너뛰기




Volumn 4, Issue 1, 2007, Pages 17-26

Data hiding in a kind of PDF texts for secret communication

Author keywords

Embedding capacity; PDF text; PDFStego; Secret channel; Secure strategy; Steganography

Indexed keywords

EMBEDDING CAPACITY; PDF TEXT; PDFSTEGO; SECRET CHANNEL; SECURE STRATEGY;

EID: 35848940085     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (45)

References (15)
  • 1
    • 84874864163 scopus 로고    scopus 로고
    • Adobe Systems Incorporated
    • Version 1.3, March
    • Adobe Systems Incorporated, Portable document format reference manual, Version 1.3, http://www.adobe.com. March,1999.
    • (1999) Portable document format reference manual
  • 2
    • 84874852949 scopus 로고    scopus 로고
    • Desktop Publishing-kerning and Tracking
    • J. H. Bear, Desktop Publishing-kerning and Tracking, http://desktoppub.about.com/, 2005.
    • (2005)
    • Bear, J.H.1
  • 3
    • 0029394108 scopus 로고
    • Electronic marking and identification techniques to discourage document copying
    • J. T. Brassil, et al., "Electronic marking and identification techniques to discourage document copying," IEEE Journal on Selected Areas in Communications, vol. 13, no. 8, pp. 1495-1504, 1995.
    • (1995) IEEE Journal on Selected Areas in Communications , vol.13 , Issue.8 , pp. 1495-1504
    • Brassil, J.T.1
  • 4
    • 0028592391 scopus 로고
    • Electronic marking and identification techniques to discourage document coping
    • J. Brassil, N. F. Maxemchuk, and L. O. Gorman, "Electronic marking and identification techniques to discourage document coping," in Proceedings of INFORCOM'94, pp. 1278-1287, 1994.
    • (1994) in Proceedings of INFORCOM'94 , pp. 1278-1287
    • Brassil, J.1    Maxemchuk, N.F.2    Gorman, L.O.3
  • 9
    • 61849153506 scopus 로고
    • Document marking an identification using both line and word shifting
    • Boston, MA, Apr
    • S. H. Low, et al. "Document marking an identification using both line and word shifting," in Proceedings INFOCOM'95, pp. 853-860, Boston, MA, Apr. 1995.
    • (1995) Proceedings INFOCOM'95 , pp. 853-860
    • Low, S.H.1
  • 10
    • 0000772864 scopus 로고    scopus 로고
    • Document identification for copyright protection using centroid detection
    • S. H. Low , N. F. Maxemchuk, and A. M. Lapone, "Document identification for copyright protection using centroid detection," IEEE Transactions on Communications, vol. 46, no. 3, pp. 372-383, 1998.
    • (1998) IEEE Transactions on Communications , vol.46 , Issue.3 , pp. 372-383
    • Low, S.H.1    Maxemchuk, N.F.2    Lapone, A.M.3
  • 12
    • 84874917096 scopus 로고    scopus 로고
    • Cyphernomicon 14.7
    • T. May, Cyphernomicon 14.7, http://www.cyphernet.org/cyphernomicon/chapter14/14.7.html, 2005.
    • (2005)
    • May, T.1
  • 13
    • 21144443873 scopus 로고    scopus 로고
    • Bit-plane decomposition steganograohy combined with JPEG2000 compression
    • Noordwijkerhout, The Netherlands, LNCS 2578 , Springer-Verlag,Oct
    • H. Noda, et al, "Bit-plane decomposition steganograohy combined with JPEG2000 compression," 5th International Workshop, Information Hiding 2002, Noordwijkerhout, The Netherlands, LNCS 2578 , Springer-Verlag, pp. 295-309, Oct. 2002.
    • (2002) 5th International Workshop, Information Hiding 2002 , pp. 295-309
    • Noda, H.1
  • 15
    • 0003902428 scopus 로고    scopus 로고
    • Cryptography and network security: Principles and practice
    • second edition, Prentice- Hall, Inc.
    • W. Stallings, Cryptography and network security: Principles and practice, second edition, Prentice Hall, Inc. 2002.
    • (2002)
    • Stallings, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.