-
4
-
-
34547528640
-
Determining achievable rates for secure zero divergence steganography
-
Oct
-
K. Sullivan, K. Solanki, B.S. Manjunath, U. Madhow, and S. Chandrasekaran, "Determining achievable rates for secure zero divergence steganography," in IEEE International Conference on Image Processing 2006 (ICIP06), Oct 2006.
-
(2006)
IEEE International Conference on Image Processing 2006 (ICIP06)
-
-
Sullivan, K.1
Solanki, K.2
Manjunath, B.S.3
Madhow, U.4
Chandrasekaran, S.5
-
5
-
-
78649828992
-
Provably secure steganography: Achieving zero k-l divergence using statistical restoration
-
Oct
-
K. Solanki, K. Sullivan, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, "Provably secure steganography: Achieving zero k-l divergence using statistical restoration," in IEEE International Conference on Image Processing 2006 (ICIP06), Oct 2006.
-
(2006)
IEEE International Conference on Image Processing 2006 (ICIP06)
-
-
Solanki, K.1
Sullivan, K.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
6
-
-
33749589438
-
Statistical restoration for robust and secure steganography
-
Sep
-
K. Solanki, K. Sullivan, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, "Statistical restoration for robust and secure steganography," in IEEE International Conference on Image Processing, Sep 2005.
-
(2005)
IEEE International Conference on Image Processing
-
-
Solanki, K.1
Sullivan, K.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
7
-
-
84883295790
-
The design and implementation of a log-structured file system
-
New York, NY, USA, ACM Press
-
Mendel Rosenblum and John K. Ousterhout, "The design and implementation of a log-structured file system," in SOSP '91: Proceedings of the thirteenth A CM symposium on Operating systems principles, New York, NY, USA, 1991, pp. 1-15, ACM Press.
-
(1991)
SOSP '91: Proceedings of the thirteenth A CM symposium on Operating systems principles
, pp. 1-15
-
-
Rosenblum, M.1
Ousterhout, J.K.2
-
8
-
-
35248889376
-
Steganography preserving statistical properties
-
London, UK, Springer-Verlag
-
Elke Franz, "Steganography preserving statistical properties," in IH '02: Revised Papers from the 5th International Workshop on Information Hiding, London, UK, 2003, pp. 278-294, Springer-Verlag.
-
(2003)
IH '02: Revised Papers from the 5th International Workshop on Information Hiding
, pp. 278-294
-
-
Franz, E.1
-
9
-
-
1442357605
-
A mathematical framework for active steganalysis
-
Rajarathnam Chandramouli, "A mathematical framework for active steganalysis.," Multimedia Syst., vol. 9, no. 3, pp. 303-311, 2003.
-
(2003)
Multimedia Syst
, vol.9
, Issue.3
, pp. 303-311
-
-
Chandramouli, R.1
-
10
-
-
84904224992
-
Steganalysis of images created using current steganography software
-
London, UK, Springer-Verlag
-
Neil F. Johnson and Sushil Jajodia, "Steganalysis of images created using current steganography software," in Proceedings of the Second International Workshop on Information Hiding, London, UK, 1998, pp. 273-289, Springer-Verlag.
-
(1998)
Proceedings of the Second International Workshop on Information Hiding
, pp. 273-289
-
-
Johnson, N.F.1
Jajodia, S.2
-
11
-
-
35048891531
-
Improved detection of lsb steganography in grayscale images
-
Andrew D. Ker, "Improved detection of lsb steganography in grayscale images.," in Information Hiding, 2004, pp. 97-115.
-
(2004)
Information Hiding
, pp. 97-115
-
-
Ker, A.D.1
-
12
-
-
0347390531
-
Steganalysis of jpeg images: Breaking the f5 algorithm
-
Jessica, J. Fridrich, Miroslav Goljan, and Dorin Hogea, "Steganalysis of jpeg images: Breaking the f5 algorithm.," in Information Hiding, 2002, pp. 310-323.
-
(2002)
Information Hiding
, pp. 310-323
-
-
Jessica, J.F.1
Goljan, M.2
Hogea, D.3
-
14
-
-
34748840535
-
Stegfs: A steganographic file system for linux
-
Andrew D. McDonald and Markus G. Kuhn, "Stegfs: A steganographic file system for linux," in Information Hiding, 1999, pp. 462-477.
-
(1999)
Information Hiding
, pp. 462-477
-
-
McDonald, A.D.1
Kuhn, M.G.2
-
15
-
-
0345359164
-
Stegfs: A steganographic file system
-
HweeHwa Pang, Kian-Lee Tan, and Xuan Zhou, "Stegfs: A steganographic file system," icde, vol. 00, pp. 657, 2003.
-
(2003)
icde
, vol.0
, pp. 657
-
-
Pang, H.1
Tan, K.-L.2
Zhou, X.3
-
16
-
-
49949105199
-
Mnemosyne: Peer-to-Peer Steganographic Storage
-
Boston, MA, USA, March
-
Steven Hand and Timothy Roscoe, "Mnemosyne: Peer-to-Peer Steganographic Storage," in Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Boston, MA, USA, March 2002.
-
(2002)
Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02)
-
-
Hand, S.1
Roscoe, T.2
-
18
-
-
33746584368
-
Embedding covert channels into tcp/ip
-
Steven J. Murdoch and Stephen Lewis, "Embedding covert channels into tcp/ip.," in Information Hiding, 2005, pp. 247-261.
-
(2005)
Information Hiding
, pp. 247-261
-
-
Murdoch, S.J.1
Lewis, S.2
-
19
-
-
84957806554
-
Covert messaging through tcp timestamps
-
John Giffin, Rachel Greenstadt, Peter Litwack, and Richard Tibbetts, "Covert messaging through tcp timestamps.," in Privacy Enhancing Technologies, 2002, pp. 194-208.
-
(2002)
Privacy Enhancing Technologies
, pp. 194-208
-
-
Giffin, J.1
Greenstadt, R.2
Litwack, P.3
Tibbetts, R.4
-
20
-
-
14844330726
-
Ip covert timing channels: Design and detection
-
New York, NY, USA, ACM Press
-
Serdar Cabuk, Carla E. Brodley, and Clay Shields, "Ip covert timing channels: design and detection," in CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, New York, NY, USA, 2004, pp. 178-187, ACM Press.
-
(2004)
CCS '04: Proceedings of the 11th ACM conference on Computer and communications security
, pp. 178-187
-
-
Cabuk, S.1
Brodley, C.E.2
Shields, C.3
-
22
-
-
84947260435
-
Robust covert communication over a public audio channel using spread spectrum
-
London, UK, Springer-Verlag
-
Darko Kirovski and Henrique S. Malvar, "Robust covert communication over a public audio channel using spread spectrum," in IHW '01: Proceedings of the 4th International Workshop on Information Hiding, London, UK, 2001, pp. 354-368, Springer-Verlag.
-
(2001)
IHW '01: Proceedings of the 4th International Workshop on Information Hiding
, pp. 354-368
-
-
Kirovski, D.1
Malvar, H.S.2
-
24
-
-
0038156437
-
Data hiding in image and video .i. fundamental issues and solutions
-
Min Wu and Bede Liu, "Data hiding in image and video .i. fundamental issues and solutions.," IEEE Transactions on Image Processing, vol. 12, no. 6, pp. 685-695, 2003.
-
(2003)
IEEE Transactions on Image Processing
, vol.12
, Issue.6
, pp. 685-695
-
-
Wu, M.1
Liu, B.2
-
25
-
-
84957894605
-
Steganography in a video conferencing system
-
London, UK, Springer-Verlag
-
Andreas Westfeld and Gritta Wolf, "Steganography in a video conferencing system," in Proceedings of the Second International Workshop on Information Hiding, London, UK, 1998, pp. 32-47, Springer-Verlag.
-
(1998)
Proceedings of the Second International Workshop on Information Hiding
, pp. 32-47
-
-
Westfeld, A.1
Wolf, G.2
-
28
-
-
85031800805
-
-
Y. Desmedt, Abuses in cryptography and how to fight them, in proceedings, Advances in Cryptology: Crypto '88, LNCS 403, Springer-Verlag, 1990, pp. 375-389.
-
Y. Desmedt, Abuses in cryptography and how to fight them, in proceedings, Advances in Cryptology: Crypto '88, LNCS 403, Springer-Verlag, 1990, pp. 375-389.
-
-
-
-
29
-
-
35248897534
-
Eliminating steganography in internet traffic with active wardens
-
London, UK, Springer-Verlag
-
Gina Fisk, Mike Fisk, Christos Papadopoulos, and Joshua Neil, "Eliminating steganography in internet traffic with active wardens," in IH '02: Revised Papers from the 5th International Workshop on Information Hiding, London, UK, 2003, pp. 18-35, Springer-Verlag.
-
(2003)
IH '02: Revised Papers from the 5th International Workshop on Information Hiding
, pp. 18-35
-
-
Fisk, G.1
Fisk, M.2
Papadopoulos, C.3
Neil, J.4
-
30
-
-
0027941028
-
-
Randy Browne, Mode security: An infrastructure for covert channel suppression, sp, 00, pp. 39, 1994.
-
Randy Browne, "Mode security: An infrastructure for covert channel suppression," sp, vol. 00, pp. 39, 1994.
-
-
-
-
31
-
-
14844331039
-
Web tap: Detecting covert web traffic
-
New York, NY, USA, ACM Press
-
Kevin Borders and Atul Prakash, "Web tap: detecting covert web traffic," in CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, New York, NY, USA, 2004, pp. 110-120, ACM Press.
-
(2004)
CCS '04: Proceedings of the 11th ACM conference on Computer and communications security
, pp. 110-120
-
-
Borders, K.1
Prakash, A.2
-
32
-
-
33847679624
-
Performance Study of Common Image Steganography and Steganalysis Techniques
-
October-December
-
M. Kharrazi, H. T. Senear, N. Memon, Performance Study of Common Image Steganography and Steganalysis Techniques, Journal of Electronic Imaging, Volume 15, Issue 4, October-December 2006.
-
(2006)
Journal of Electronic Imaging
, vol.15
, Issue.4
-
-
Kharrazi, M.1
Senear, H.T.2
Memon, N.3
-
33
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
David L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-90, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
34
-
-
0034777803
-
An optimally robust hybrid mix network
-
New York, NY, USA, ACM Press
-
Markus Jakobsson and Ari Juels, "An optimally robust hybrid mix network," in PODC '01: Proceedings of the twentieth annual ACM symposium on Principles of distributed computing, New York, NY, USA, 2001, pp. 284-292, ACM Press.
-
(2001)
PODC '01: Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
, pp. 284-292
-
-
Jakobsson, M.1
Juels, A.2
-
35
-
-
84955557456
-
Hiding routing information
-
London, UK, Springer-Verlag
-
David M. Goldschlag, Michael G. Reed, and Paul F. Syverson, "Hiding routing information," in Proceedings of the First International Workshop on Information Hiding, London, UK, 1996, pp. 137-150, Springer-Verlag.
-
(1996)
Proceedings of the First International Workshop on Information Hiding
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
36
-
-
0030676973
-
Anonymous connections and onion routing
-
Washington, DC, USA, IEEE Computer Society
-
Paul F. Syverson, David M. Goldschlag, and Michael G. Reed, "Anonymous connections and onion routing," in SP '97: Proceedings of the 1997 IEEE Symposium on Security and Privacy, Washington, DC, USA, 1997, p. 44, IEEE Computer Society.
-
(1997)
SP '97: Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 44
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
37
-
-
85084161366
-
Tor: The second-generation onion router
-
Roger Dingledine, Nick Mathewson, and Paul F. Syverson, "Tor: The second-generation onion router.," in USENIX Seeurity Symposium, 2004, pp. 303-320.
-
(2004)
USENIX Seeurity Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.F.3
-
38
-
-
33750277833
-
Locating hidden servers
-
Washington, DC, USA, IEEE Computer Society
-
Lasse Overlier and Paul Syverson, "Locating hidden servers," in SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), Washington, DC, USA, 2006, pp. 100-114, IEEE Computer Society.
-
(2006)
SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06)
, pp. 100-114
-
-
Overlier, L.1
Syverson, P.2
|