-
1
-
-
0031996445
-
Exploring Steganography: Seeing the Unseen
-
Feb
-
Johnson, N. F. and Jajodia, S.: Exploring Steganography: Seeing the Unseen. IEEE Computer, 31 (2): 26-34, Feb 1998.
-
(1998)
IEEE Computer
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
2
-
-
60349120006
-
-
Future. SANS Institute publication, December 1, Retrieved from
-
Judge, J.C.: Steganography: Past, Present, Future. SANS Institute publication, December 1, 2001.Retrieved from: http://www.sans.org/reading_room/ whitepapers/stenganography/552.php
-
(2001)
Steganography: Past, Present
-
-
Judge, J.C.1
-
6
-
-
44149086998
-
-
Simmons, G. J.: The Prisoners' Problem and the Subliminal Channel. Proceedings of CRYPTO83-Advances in Cryptology, August 22-24. 1984. pp. 51.67.
-
Simmons, G. J.: The Prisoners' Problem and the Subliminal Channel. Proceedings of CRYPTO83-Advances in Cryptology, August 22-24. 1984. pp. 51.67.
-
-
-
-
8
-
-
44149084098
-
-
Thomas, T. L.: Al Qaeda and the Internet: The Danger of Cyberplanning. Parameters, US Army War College Quarterly - Spring 2003. Retrieved from: http://www.carlisle.army.mil/usawc/Parameters/03spring/ thomas.pdf on 22-Nov-2006.
-
Thomas, T. L.: Al Qaeda and the Internet: The Danger of "Cyberplanning". Parameters, US Army War College Quarterly - Spring 2003. Retrieved from: http://www.carlisle.army.mil/usawc/Parameters/03spring/ thomas.pdf on 22-Nov-2006.
-
-
-
-
9
-
-
44149098965
-
-
Petitcolas, F.A.P.: Introduction to Information Hiding. In: Katzenbeisser, S and Petitcolas, F.A.P (ed.) (2000) Information hiding Techniques for Steganography and Digital Watermarking. Norwood: Artech House, INC.
-
Petitcolas, F.A.P.: "Introduction to Information Hiding". In: Katzenbeisser, S and Petitcolas, F.A.P (ed.) (2000) Information hiding Techniques for Steganography and Digital Watermarking. Norwood: Artech House, INC.
-
-
-
-
10
-
-
44149126540
-
-
Petitcolas, F.A.P.: Introduction to Information Hiding. In: Katzenbeisser, S and Petitcolas, F.A.P (ed.) (2000) Information hiding Techniques for Steganography and Digital Watermarking. Norwood: Artech House, INC.
-
Petitcolas, F.A.P.: "Introduction to Information Hiding". In: Katzenbeisser, S and Petitcolas, F.A.P (ed.) (2000) Information hiding Techniques for Steganography and Digital Watermarking. Norwood: Artech House, INC.
-
-
-
-
11
-
-
0343867221
-
Applications for Data Hiding
-
Bender, W., Butera, W., Gruhl, D., Hwang, R., Paiz, F.J. and Pogreb, S.: Applications for Data Hiding. IBM Systems Journal, 39 (3&4): 547-568. 2000
-
(2000)
IBM Systems Journal
, vol.39
, Issue.3-4
, pp. 547-568
-
-
Bender, W.1
Butera, W.2
Gruhl, D.3
Hwang, R.4
Paiz, F.J.5
Pogreb, S.6
-
12
-
-
32444448571
-
Steganography in Games: A general methodology and its application to the game of Go
-
Hernandez-Castro, J. C., Blasco-Lopez, I. and Estevez-Tapiador, J. M.: Steganography in Games: A general methodology and its application to the game of Go. Computers & Security, 25(2006): 64-71.
-
(2006)
Computers & Security
, vol.25
, pp. 64-71
-
-
Hernandez-Castro, J.C.1
Blasco-Lopez, I.2
Estevez-Tapiador, J.M.3
-
13
-
-
0036158024
-
Higher Order Statistics and Neural Network for Tremor Recognition
-
February
-
Jakubowski, J., Kwiatos, K., Chwaleba, A. and Osowski, S.: Higher Order Statistics and Neural Network for Tremor Recognition. IEEE Transactions on Biomedical Engineering, 49 (2): February 2002.
-
(2002)
IEEE Transactions on Biomedical Engineering
, vol.49
, Issue.2
-
-
Jakubowski, J.1
Kwiatos, K.2
Chwaleba, A.3
Osowski, S.4
-
14
-
-
0034430895
-
Exploring On Steganography For Low Bit Rate Wavelet Based Coder In Image Retrieval System
-
Kuala Lumpur, Malaysia
-
Areepongsa, S. Kaewkamnerd, N. Syed, Y. F. and Rao. K. R.: Exploring On Steganography For Low Bit Rate Wavelet Based Coder In Image Retrieval System. IEEE Proceedings of TENCON 2000. (3): 250-255. Kuala Lumpur, Malaysia. 2000.
-
(2000)
IEEE Proceedings of TENCON
, vol.3
, pp. 250-255
-
-
Areepongsa, S.1
Kaewkamnerd, N.2
Syed, Y.F.3
Rao, K.R.4
-
15
-
-
44149128538
-
-
Winter
-
Kruus, P., Scace, C., Heyman, M. and Mundy, M.: A survey of Steganographic Techniques for Image Files. Advanced Security Research Journal. V(I): 41-51, Winter 2003.
-
(2003)
A survey of Steganographic Techniques for Image Files. Advanced Security Research Journal. V(I): 41-51
-
-
Kruus, P.1
Scace, C.2
Heyman, M.3
Mundy, M.4
-
16
-
-
44149126850
-
Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis
-
Winter
-
Alvarez, P.: Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis. International Journal of Digital Evidence, 2 (3). Winter 2004.
-
(2004)
International Journal of Digital Evidence
, vol.2
, Issue.3
-
-
Alvarez, P.1
-
17
-
-
44149104221
-
-
Lin, E. T. and Delp, E. J.: A Review of Data Hiding in Digital Images. Retrieved on 1.Dec.2006 from Computer Forensics, Cyber crime and Steganography Resources, Digital Watermarking Links and Whitepapers, Apr 1999.
-
Lin, E. T. and Delp, E. J.: A Review of Data Hiding in Digital Images. Retrieved on 1.Dec.2006 from Computer Forensics, Cyber crime and Steganography Resources, Digital Watermarking Links and Whitepapers, Apr 1999.
-
-
-
-
19
-
-
33845305770
-
Fingerprinted Secret Sharing Steganography for Robustness against Image Cropping Attacks
-
INDIN, Perth, Australia, 10-12 August
-
Potdar, V. M., Han, S. and Chang, E.: Fingerprinted Secret Sharing Steganography for Robustness against Image Cropping Attacks. Proceedings of IEEE's 3rd International Conference on Industrial Informatics (INDIN), Perth, Australia, 10-12 August 2005.
-
(2005)
Proceedings of IEEE's 3rd International Conference on Industrial Informatics
-
-
Potdar, V.M.1
Han, S.2
Chang, E.3
-
21
-
-
0032310338
-
A Methodology for Data Hiding Using Images
-
Boston, MA, USA, 18-21 Oct
-
Marvel, L. M. and Retter, C. T.: A Methodology for Data Hiding Using Images. Proceedings of IEEE Military Communications Conference (MILCOM98) Proceedings, Boston, MA, USA, 18-21 Oct 1998, 1044-1047.
-
(1998)
Proceedings of IEEE Military Communications Conference (MILCOM98) Proceedings
, pp. 1044-1047
-
-
Marvel, L.M.1
Retter, C.T.2
-
23
-
-
35248884299
-
Steganalysis of JPEG Images: Breaking the F5 Algorithm
-
Noordwijkerhout, The Netherlands, October 7-9
-
Fridrich, J., Goljan, M. and Hogeg, D.: Steganalysis of JPEG Images: Breaking the F5 Algorithm. Proceedings of Information Hiding: 5th International Workshop, IH 2002 Noordwijkerhout, The Netherlands, 2578/2003: 310-323, October 7-9, 2002.
-
(2002)
Proceedings of Information Hiding: 5th International Workshop, IH
, vol.2578
, Issue.2003
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogeg, D.3
-
24
-
-
0034787093
-
Reliable Detection of LSB Steganography in Grayscale and Color Images
-
Session on Multimedia Security and Watermarking, Ottawa, Canada, October 5
-
Fridrich, J., Goljan, M. and Du, R., (2001). Reliable Detection of LSB Steganography in Grayscale and Color Images. Proceedings of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, October 5, 2001, pp. 27-30.
-
(2001)
Proceedings of ACM, Special
, pp. 27-30
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
25
-
-
34147191586
-
Steganalysis of Palette Images: Attack Optimal Parity Assignment Algorithm
-
06-09 Dec
-
Xiangwei Kong, Ziren Wang and Xingang You., (2005). Steganalysis of Palette Images: Attack Optimal Parity Assignment Algorithm. Proceedings of 5th IEEE International Conference on Information, Communications and Signal Processing, 860-864, 06-09 Dec 2005.
-
(2005)
Proceedings of 5th IEEE International Conference on Information, Communications and Signal Processing
, pp. 860-864
-
-
Kong, X.1
Wang, Z.2
You, X.3
-
27
-
-
34248160605
-
A steganographic method based upon JPEG and particle swarm optimization algorithm
-
August
-
Xiaoxia Li and Jianjun Wang., (2007). A steganographic method based upon JPEG and particle swarm optimization algorithm. Information Sciences, 177(15): 3099-31091, August 2007.
-
(2007)
Information Sciences
, vol.177
, Issue.15
, pp. 3099-31091
-
-
Li, X.1
Wang, J.2
-
28
-
-
0036497685
-
-
Chin-Chen Chang, Tung-Shou Chen and Lou-Zo Chung.: A steganographic method based upon JPEG and quantization table modification. Information Sciences, (141) 2002: 123-138. 2002.
-
Chin-Chen Chang, Tung-Shou Chen and Lou-Zo Chung.: A steganographic method based upon JPEG and quantization table modification. Information Sciences, (141) 2002: 123-138. 2002.
-
-
-
-
29
-
-
44149094662
-
-
Popescu, A.C.: Statistical Tools for Digital Image Forensics. Ph.D. Dissertation, Department of Computer Science, Dartmouth College, USA, (2005). Retrieved from: http://www.cs.dartmoum.edu/~farid/publications/apthesis05.html on 16-05-07 at 12:20.
-
Popescu, A.C.: Statistical Tools for Digital Image Forensics. Ph.D. Dissertation, Department of Computer Science, Dartmouth College, USA, (2005). Retrieved from: http://www.cs.dartmoum.edu/~farid/publications/apthesis05.html on 16-05-07 at 12:20.
-
-
-
-
30
-
-
40849120015
-
A New Genetic Algorithm Approach for Secure JPEG Steganography
-
22-23 April
-
Fard, A. M., Akbarzadeh-T, M. and Varasteh-A, F.: A New Genetic Algorithm Approach for Secure JPEG Steganography. Proceedings of IEEE International Conference on Engineering of Intelligent Systems, 22-23 April 2006, 1-6.
-
(2006)
Proceedings of IEEE International Conference on Engineering of Intelligent Systems
, pp. 1-6
-
-
Fard, A.M.1
Akbarzadeh-T, M.2
Varasteh-A, F.3
-
31
-
-
33847704195
-
A Robust Steganography Technique using Discrete Cosine Transform Insertion
-
Enabling Technologies for the New Knowledge Society. 5-6 Dec
-
Hashad, A.I., Madani, A.S. and Wahdan, A.E.M.A.: A Robust Steganography Technique using Discrete Cosine Transform Insertion. Proceedings of IEEE/ITI 3rd International Conference on Information and Communications Technology, Enabling Technologies for the New Knowledge Society. 5-6 Dec. 2005, 255-264.
-
(2005)
Proceedings of IEEE/ITI 3rd International Conference on Information and Communications Technology
, pp. 255-264
-
-
Hashad, A.I.1
Madani, A.S.2
Wahdan, A.E.M.A.3
-
32
-
-
84928174250
-
A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images
-
Bangalore, India, 14-17 Dec
-
Raja, K. B., Chowdary, C.R., Venugopal, K. R. and Patnaik, L. M.: A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images. Proceedings of IEEE Third International Conference on Intelligent Sensing and Information Processing (ICISIP 2005), Bangalore, India, 14-17 Dec. 2005, 170-176.
-
(2005)
Proceedings of IEEE Third International Conference on Intelligent Sensing and Information Processing (ICISIP
, pp. 170-176
-
-
Raja, K.B.1
Chowdary, C.R.2
Venugopal, K.R.3
Patnaik, L.M.4
-
33
-
-
1442293736
-
-
2nd ed. USA: Morgan Kaufmann Publishers
-
Wayner, P.: Disappearing Cryptography. 2nd ed. USA: Morgan Kaufmann Publishers. (2002).
-
(2002)
Disappearing Cryptography
-
-
Wayner, P.1
-
34
-
-
61649119545
-
Detection of Block DCT-based Steganography in Gray-scale Images
-
9-11 Dec
-
Manikopoulos, C., Yun-Qing, S., Sui, S., Zheng, Z., Zhicheng, N. and Dekun, Z.: Detection of Block DCT-based Steganography in Gray-scale Images. Proceedings of the IEEE Workshop on Multimedia Signal Processing, 9-11 Dec 2002,355-358.
-
(2002)
Proceedings of the IEEE Workshop on Multimedia Signal Processing
, pp. 355-358
-
-
Manikopoulos, C.1
Yun-Qing, S.2
Sui, S.3
Zheng, Z.4
Zhicheng, N.5
Dekun, Z.6
-
35
-
-
33846993721
-
Color Image Steganography Scheme using Set Partitioning in Hierarchical Trees Coding, Digital Fourier Transform and Adaptive Phase Modulation
-
Wen-Yuan Chen.: Color Image Steganography Scheme using Set Partitioning in Hierarchical Trees Coding, Digital Fourier Transform and Adaptive Phase Modulation. Applied Mathematics and Computation 185(1): 432-448 (2007).
-
(2007)
Applied Mathematics and Computation
, vol.185
, Issue.1
, pp. 432-448
-
-
Chen, W.-Y.1
-
36
-
-
54549122578
-
Robust Data Hiding for Images
-
ICCT, 21-25 Aug
-
Abdulaziz, N.K. and Pang, K.K.: Robust Data Hiding for Images. Proceedings of IEEE International Conference on Communication Technology, WCC - ICCT 2000, 21-25 Aug. 2000, Volume 1: 380-383.
-
(2000)
Proceedings of IEEE International Conference on Communication Technology, WCC
, vol.1
, pp. 380-383
-
-
Abdulaziz, N.K.1
Pang, K.K.2
-
37
-
-
33747799627
-
News Briefs
-
Computer, IEEE Computer Society, Aug
-
Paulson, L. D.: New System Fights Steganography, "News Briefs," Computer, IEEE Computer Society, 39(8): 25-27, Aug, 2006.
-
(2006)
, vol.39
, Issue.8
, pp. 25-27
-
-
Paulson, L.D.1
-
38
-
-
35048834273
-
-
Chin-Chen Chang, Piyu Tsai and Min-Hui Lin.: An Adaptive Steganography for Index-Based Images Using Codeword Grouping. PCM (3) 2004: 731-738. (2004).
-
Chin-Chen Chang, Piyu Tsai and Min-Hui Lin.: An Adaptive Steganography for Index-Based Images Using Codeword Grouping. PCM (3) 2004: 731-738. (2004).
-
-
-
-
40
-
-
44149099416
-
-
Bae-Ho Lee, Kwang-Hee Kim, Yonggwan Won, and Jiseung Nam.: Efficient and Automatic Faces Detection Based on Skin-Tone and Neural Network Model. Proceedings of the 15th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2002, Cairns, Australia, June 17-20, 2002. Lecture Notes in Computer Science (2358/2002).
-
Bae-Ho Lee, Kwang-Hee Kim, Yonggwan Won, and Jiseung Nam.: Efficient and Automatic Faces Detection Based on Skin-Tone and Neural Network Model. Proceedings of the 15th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2002, Cairns, Australia, June 17-20, 2002. Lecture Notes in Computer Science (2358/2002).
-
-
-
-
41
-
-
0036566509
-
Face detection in color images
-
Hsu, R., Abdel-Mottaleb, M. and Jain, A.: Face detection in color images. IEEE Transactions on Pattern Analysis and Machine Intelligence. 24(5): 696-706. (2002).
-
(2002)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.24
, Issue.5
, pp. 696-706
-
-
Hsu, R.1
Abdel-Mottaleb, M.2
Jain, A.3
-
42
-
-
0032092515
-
MPEG-4: An object-based multimedia coding standard supporting mobile applications
-
Springer Netherlands
-
Puri, A and Eleftheriadis, A.: MPEG-4: An object-based multimedia coding standard supporting mobile applications. Mobile Networks and Applications 3 (1): 5-32. (1998). Springer Netherlands
-
(1998)
Mobile Networks and Applications
, vol.3
, Issue.1
, pp. 5-32
-
-
Puri, A.1
Eleftheriadis, A.2
-
43
-
-
44149093244
-
A Comparative Analysis of Steganographic Tools
-
Institute of Technology Blanchardstown, Dublin, Ireland. 25th- 26th October
-
Cheddad, A., Condell, J., Curran, K and Mc Kevitt, P.: A Comparative Analysis of Steganographic Tools. Proceedings of the Seventh IT&T Conference. Institute of Technology Blanchardstown, Dublin, Ireland. 25th- 26th October 2007. pp 29-37.
-
(2007)
Proceedings of the Seventh IT&T Conference
, pp. 29-37
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
Mc Kevitt, P.4
-
44
-
-
44149115088
-
-
http://observer.guardian.co.uk/uk_news/story/0,6903,336271,00.html. Accessed on: January 25, 2007.
-
http://observer.guardian.co.uk/uk_news/story/0,6903,336271,00.html. Accessed on: January 25, 2007.
-
-
-
-
45
-
-
44149124390
-
-
http://news.bbc.co.uk/1/hi/technology/6361891.stm Retrieved on: 15-02-2007 at: 14:17.
-
http://news.bbc.co.uk/1/hi/technology/6361891.stm Retrieved on: 15-02-2007 at: 14:17.
-
-
-
-
46
-
-
44149116346
-
-
accessed on 13th June 2007 at 11:40
-
http://www.couleur.org/index.php?page=transformations, accessed on 13th June 2007 at 11:40.
-
-
-
-
47
-
-
44149092041
-
-
http://www.jpeg.org/jpeg2000/ accessed on 21-06-2007 at 17:04.
-
http://www.jpeg.org/jpeg2000/ accessed on 21-06-2007 at 17:04.
-
-
-
-
48
-
-
44149083417
-
-
http://www.infm.ulst.ac.uk/~abbasc/
-
-
-
-
49
-
-
44149123677
-
-
F5: http://wwwrn.inf.tu-dresden.de/~westfeld/f5.html, and S-Tools from: ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/s-tools4 .zip
-
F5: http://wwwrn.inf.tu-dresden.de/~westfeld/f5.html, and S-Tools from: ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/s-tools4.zip
-
-
-
|