메뉴 건너뛰기




Volumn 2, Issue 1, 2008, Pages 27-36

Graphstega: Graph steganography methodology

Author keywords

Audio cover; Comparison attack; Contrast attack; Graph steganography; Graph cover; Image cover; Steganography; Text cover; Traffic attack

Indexed keywords


EID: 40749156338     PISSN: 15567281     EISSN: 15567346     Source Type: Journal    
DOI: 10.1080/15567280701797087     Document Type: Article
Times cited : (23)

References (20)
  • 3
    • 0001931684 scopus 로고    scopus 로고
    • A Survey of Steganographic Techniques
    • Artech House, Norwood, Mass
    • Johnson, N. F. and Katzenbeisser, S. (2000) A Survey of Steganographic Techniques. Information Hiding, Artech House, Norwood, Mass.
    • (2000) Information Hiding
    • Johnson, N.F.1    Katzenbeisser, S.2
  • 6
    • 84950895792 scopus 로고
    • Mimic Functions
    • Wayner, P. (1992) Mimic Functions. Cryptologia, 16:3, pp. 193-214.
    • (1992) Cryptologia , vol.16 , Issue.3 , pp. 193-214
    • Wayner, P.1
  • 14
    • 0030384775 scopus 로고    scopus 로고
    • Techniques for Data Hiding
    • Bender, W. (1996) Techniques for Data Hiding. IBM Systems Journal, 35:3, pp. 313-336.
    • (1996) IBM Systems Journal , vol.35 , Issue.3 , pp. 313-336
    • Bender, W.1
  • 18
    • 40749088014 scopus 로고
    • Two-Level Grammars Are More Expressive Than Type 0 Grammars or Are They?
    • Grune, D. (1993) Two-Level Grammars Are More Expressive Than Type 0 Grammars or Are They?. SIGPLAN Notices, 28:8, pp. 43-45.
    • (1993) SIGPLAN Notices , vol.28 , Issue.8 , pp. 43-45
    • Grune, D.1
  • 19
    • 0016652463 scopus 로고
    • Revised Report on the Algorithmic Language ALGOL 68
    • van Wijngaarden, A. (1975) Revised Report on the Algorithmic Language ALGOL 68. Acta Informatica, 5, pp. 1-236.
    • (1975) Acta Informatica , vol.5 , pp. 1-236
    • van Wijngaarden, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.