메뉴 건너뛰기




Volumn , Issue , 2007, Pages 25-34

On covert collaboration

Author keywords

Collaborative systems; Steganography

Indexed keywords

COMPUTER SUPPORTED COOPERATIVE WORK; EMBEDDED SYSTEMS;

EID: 38849096989     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1288869.1288874     Document Type: Conference Paper
Times cited : (5)

References (39)
  • 9
    • 1442357605 scopus 로고    scopus 로고
    • A mathematical framework for active steganalysis
    • Rajarathnam Chandramouli, "A mathematical framework for active steganalysis.," Multimedia Syst., vol. 9, no. 3, pp. 303-311, 2003.
    • (2003) Multimedia Syst , vol.9 , Issue.3 , pp. 303-311
    • Chandramouli, R.1
  • 11
    • 35048891531 scopus 로고    scopus 로고
    • Improved detection of lsb steganography in grayscale images
    • Andrew D. Ker, "Improved detection of lsb steganography in grayscale images.," in Information Hiding, 2004, pp. 97-115.
    • (2004) Information Hiding , pp. 97-115
    • Ker, A.D.1
  • 12
    • 0347390531 scopus 로고    scopus 로고
    • Steganalysis of jpeg images: Breaking the f5 algorithm
    • Jessica, J. Fridrich, Miroslav Goljan, and Dorin Hogea, "Steganalysis of jpeg images: Breaking the f5 algorithm.," in Information Hiding, 2002, pp. 310-323.
    • (2002) Information Hiding , pp. 310-323
    • Jessica, J.F.1    Goljan, M.2    Hogea, D.3
  • 14
    • 34748840535 scopus 로고    scopus 로고
    • Stegfs: A steganographic file system for linux
    • Andrew D. McDonald and Markus G. Kuhn, "Stegfs: A steganographic file system for linux," in Information Hiding, 1999, pp. 462-477.
    • (1999) Information Hiding , pp. 462-477
    • McDonald, A.D.1    Kuhn, M.G.2
  • 15
    • 0345359164 scopus 로고    scopus 로고
    • Stegfs: A steganographic file system
    • HweeHwa Pang, Kian-Lee Tan, and Xuan Zhou, "Stegfs: A steganographic file system," icde, vol. 00, pp. 657, 2003.
    • (2003) icde , vol.0 , pp. 657
    • Pang, H.1    Tan, K.-L.2    Zhou, X.3
  • 18
    • 33746584368 scopus 로고    scopus 로고
    • Embedding covert channels into tcp/ip
    • Steven J. Murdoch and Stephen Lewis, "Embedding covert channels into tcp/ip.," in Information Hiding, 2005, pp. 247-261.
    • (2005) Information Hiding , pp. 247-261
    • Murdoch, S.J.1    Lewis, S.2
  • 24
    • 0038156437 scopus 로고    scopus 로고
    • Data hiding in image and video .i. fundamental issues and solutions
    • Min Wu and Bede Liu, "Data hiding in image and video .i. fundamental issues and solutions.," IEEE Transactions on Image Processing, vol. 12, no. 6, pp. 685-695, 2003.
    • (2003) IEEE Transactions on Image Processing , vol.12 , Issue.6 , pp. 685-695
    • Wu, M.1    Liu, B.2
  • 28
    • 85031800805 scopus 로고    scopus 로고
    • Y. Desmedt, Abuses in cryptography and how to fight them, in proceedings, Advances in Cryptology: Crypto '88, LNCS 403, Springer-Verlag, 1990, pp. 375-389.
    • Y. Desmedt, Abuses in cryptography and how to fight them, in proceedings, Advances in Cryptology: Crypto '88, LNCS 403, Springer-Verlag, 1990, pp. 375-389.
  • 30
    • 0027941028 scopus 로고    scopus 로고
    • Randy Browne, Mode security: An infrastructure for covert channel suppression, sp, 00, pp. 39, 1994.
    • Randy Browne, "Mode security: An infrastructure for covert channel suppression," sp, vol. 00, pp. 39, 1994.
  • 32
    • 33847679624 scopus 로고    scopus 로고
    • Performance Study of Common Image Steganography and Steganalysis Techniques
    • October-December
    • M. Kharrazi, H. T. Senear, N. Memon, Performance Study of Common Image Steganography and Steganalysis Techniques, Journal of Electronic Imaging, Volume 15, Issue 4, October-December 2006.
    • (2006) Journal of Electronic Imaging , vol.15 , Issue.4
    • Kharrazi, M.1    Senear, H.T.2    Memon, N.3
  • 33
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • David L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-90, 1981.
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.