메뉴 건너뛰기




Volumn 4437 LNCS, Issue , 2007, Pages 109-123

Content-aware steganography: About lazy prisoners and narrow-minded wardens

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER SIMULATION; CONTENT BASED RETRIEVAL; HUMAN COMPUTER INTERACTION; KNOWLEDGE REPRESENTATION; SYNTACTICS;

EID: 38049146625     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74124-4_8     Document Type: Conference Paper
Times cited : (13)

References (31)
  • 2
    • 77953750858 scopus 로고    scopus 로고
    • Natural language watermarking: Design, analysis, and a proof-of-concept implementation
    • Moskowitz, I.S, ed, Information Hiding: Fourth International Workshop, Springer, Heidelberg
    • Atallah, M.J., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., Naik, S.: Natural language watermarking: Design, analysis, and a proof-of-concept implementation. In: Moskowitz, I.S. (ed.) Information Hiding: Fourth International Workshop. LNCS, vol. 2137, pp. 185-199. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2137 , pp. 185-199
    • Atallah, M.J.1    Raskin, V.2    Crogan, M.3    Hempelmann, C.4    Kerschbaum, F.5    Mohamed, D.6    Naik, S.7
  • 3
    • 35248834521 scopus 로고    scopus 로고
    • Natural language watermarking and tamperproofing
    • Fabien A. P. Petitcolas, editor, Information Hiding: Fifth International Workshop, of, Springer October
    • Mikhail J. Atallah, Victor Raskin, Christian F. Hempelmann, Mercan Topkara, Radu Sion, Umut Topkara, and Katrina E. Triezenberg. Natural language watermarking and tamperproofing. In Fabien A. P. Petitcolas, editor, Information Hiding: Fifth International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 196-212. Springer (October 2002)
    • (2002) Lecture Notes in Computer Science , vol.2578 , pp. 196-212
    • Atallah, M.J.1    Raskin, V.2    Hempelmann, C.F.3    Topkara, M.4    Sion, R.5    Topkara, U.6    Triezenberg, K.E.7
  • 4
    • 33947624454 scopus 로고    scopus 로고
    • Survey, analysis, and robustness concerns for hiding information in text May
    • Bennett, K.: Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text (May 2004)
    • (2004) Linguistic steganography
    • Bennett, K.1
  • 5
    • 38049165748 scopus 로고    scopus 로고
    • Bergmair, R.: Towards linguistic steganography: A systematic investigation of approaches, systems, and issues, final year project, April 2004 submitted in partial fulfillment of the degree requirements for B.Sc (Hons.) to the University of Derby (2004)
    • Bergmair, R.: Towards linguistic steganography: A systematic investigation of approaches, systems, and issues, final year project, April 2004 submitted in partial fulfillment of the degree requirements for B.Sc (Hons.) to the University of Derby (2004)
  • 6
    • 38049098167 scopus 로고    scopus 로고
    • Bergmair, R., Katzenbeisser, S.: Towards human interactive proofs in the text-domain. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, 3225, Springer, Heidelberg (2004)
    • Bergmair, R., Katzenbeisser, S.: Towards human interactive proofs in the text-domain. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, Springer, Heidelberg (2004)
  • 7
    • 35048885080 scopus 로고    scopus 로고
    • Bolshakov, I.A.: A method of linguistic steganography based on collocationally-verified synonymy. In: Fridrich, J.J. (ed.) IH 2004. LNCS, 3200, pp. 180-191. Springer, Heidelberg (2004)
    • Bolshakov, I.A.: A method of linguistic steganography based on collocationally-verified synonymy. In: Fridrich, J.J. (ed.) IH 2004. LNCS, vol. 3200, pp. 180-191. Springer, Heidelberg (2004)
  • 11
    • 0005013984 scopus 로고    scopus 로고
    • Hiding the hidden: A software system for concealing ciphertext in innocuous text
    • Han, Y, Quing, S, eds, ICICS 1997, Springer, Heidelberg
    • Chapman, M., Davida, G.I.: Hiding the hidden: A software system for concealing ciphertext in innocuous text. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 11-14. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1334 , pp. 11-14
    • Chapman, M.1    Davida, G.I.2
  • 12
    • 84944053897 scopus 로고    scopus 로고
    • Plausible deniability using automated linguistic steganography
    • Davida, G, Frankel, Y, eds, InfraSec 2002, Springer, Heidelberg
    • Chapman, M., Davida, G.I.: Plausible deniability using automated linguistic steganography. In: Davida, G., Frankel, Y. (eds.) InfraSec 2002. LNCS, vol. 2437, Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2437
    • Chapman, M.1    Davida, G.I.2
  • 13
    • 84947255170 scopus 로고    scopus 로고
    • Chapman, M., Davida, G.I., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, 2200, Springer, Heidelberg (2001)
    • Chapman, M., Davida, G.I., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, Springer, Heidelberg (2001)
  • 14
    • 33749047587 scopus 로고    scopus 로고
    • Chew, M., Tygar, J.D.: Image recognition CAPTCHAs. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, 3225, Springer, Heidelberg (2004)
    • Chew, M., Tygar, J.D.: Image recognition CAPTCHAs. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, Springer, Heidelberg (2004)
  • 15
    • 35048888203 scopus 로고    scopus 로고
    • Chiang, Y.-L., Chang, L.-P., Hsieh, W.-T., Chen, W.-C.: Natural language watermarking using semantic substitution for Chinese text. In: Kalker, T., Cox, I.J., Ro, Y.M. (eds.) IWDW 2003. LNCS, 2939, pp. 129-140. Springer, Heidelberg (2004)
    • Chiang, Y.-L., Chang, L.-P., Hsieh, W.-T., Chen, W.-C.: Natural language watermarking using semantic substitution for Chinese text. In: Kalker, T., Cox, I.J., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 129-140. Springer, Heidelberg (2004)
  • 16
    • 84957887122 scopus 로고    scopus 로고
    • On public-key steganography in the presence of an active warden
    • Aucsmith, D, ed, IH, Springer, Heidelberg
    • Craver, S.: On public-key steganography in the presence of an active warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 355-368. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1525 , pp. 355-368
    • Craver, S.1
  • 17
    • 1442360452 scopus 로고    scopus 로고
    • Quantitative steganalysis of digital images: Estimating the secret message length
    • Fridrich, J., Goljan, M., Hogea, D., Soukal, D.: Quantitative steganalysis of digital images: estimating the secret message length. Multimedia Systems 9, 298-302 (2003)
    • (2003) Multimedia Systems , vol.9 , pp. 298-302
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3    Soukal, D.4
  • 18
    • 33746654158 scopus 로고    scopus 로고
    • Translationbased steganography
    • Barni, M, Herrera-Joancomarti, J, Katzenbeisser, S, Pérez-González, F, eds, Information Hiding, 7th International Workshop IH, Barcelona, Spain, Springer, Heidelberg
    • Grothoff, C., Grothoff, K., Alkhutova, L., Stutsman, R., Atallah, M.: Translationbased steganography. In: Barni, M., Herrera-Joancomarti, J., Katzenbeisser, S., Pérez-González, F. (eds.) Information Hiding, 7th International Workshop (IH 2005), Barcelona, Spain. LNCS, vol. 3727, pp. 219-233. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3727 , pp. 219-233
    • Grothoff, C.1    Grothoff, K.2    Alkhutova, L.3    Stutsman, R.4    Atallah, M.5
  • 21
    • 38049156072 scopus 로고    scopus 로고
    • Text information hiding with preserved meaning - a case for Japanese documents
    • Nakagawa, H., Sampei, K., Matsumoto, T., Kawaguchi, S., Makino, K., Murase, I.: Text information hiding with preserved meaning - a case for Japanese documents. IPSJ Transaction 42(9), 2339-2350 (2001)
    • (2001) IPSJ Transaction , vol.42 , Issue.9 , pp. 2339-2350
    • Nakagawa, H.1    Sampei, K.2    Matsumoto, T.3    Kawaguchi, S.4    Makino, K.5    Murase, I.6
  • 22
    • 34548235364 scopus 로고    scopus 로고
    • A framework of text-based steganography using sd-form semantics model
    • August
    • Niimi, M., Minewaki, S., Noda, H., Kawaguchi, E.: A framework of text-based steganography using sd-form semantics model. IPSJ Journal, 44(8) (August 2003)
    • (2003) IPSJ Journal , vol.44 , Issue.8
    • Niimi, M.1    Minewaki, S.2    Noda, H.3    Kawaguchi, E.4
  • 25
    • 38049132335 scopus 로고    scopus 로고
    • von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: HIPs. http://www.aladdin.es.emu.edu/hips/
    • von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: HIPs. http://www.aladdin.es.emu.edu/hips/
  • 26
    • 35248831179 scopus 로고    scopus 로고
    • CAPTCHA: Using hard ai problems for security
    • Advances in Cryptology, Eurocrypt 2003, Springer, Heidelberg
    • von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: using hard ai problems for security. In: Advances in Cryptology, Eurocrypt 2003. LNCS, vol. 2656, pp. 294-311. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 294-311
    • von Ahn, L.1    Blum, M.2    Hopper, N.J.3    Langford, J.4
  • 27
    • 84950895792 scopus 로고
    • Mimic functions
    • Wayner, P.: Mimic functions. Cryptologia XVI/3, 193-214 (1992)
    • (1992) Cryptologia , vol.XVI 3 , pp. 193-214
    • Wayner, P.1
  • 28
    • 0005008029 scopus 로고
    • Strong theoretical steganography
    • Wayner, P.: Strong theoretical steganography. Cryptologia XIX/3, 285-299 (1995)
    • (1995) Cryptologia , vol.XIX 3 , pp. 285-299
    • Wayner, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.