메뉴 건너뛰기




Volumn , Issue , 2008, Pages 159-168

Biometric inspired digital image Steganography

Author keywords

[No Author keywords available]

Indexed keywords

DATA HIDING; DIGITAL IMAGE STEGANOGRAPHY; EDGE OPERATORS; HUMAN SKIN TONE DETECTION;

EID: 44149103187     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ECBS.2008.11     Document Type: Conference Paper
Times cited : (41)

References (49)
  • 1
    • 0031996445 scopus 로고    scopus 로고
    • Exploring Steganography: Seeing the Unseen
    • Feb
    • Johnson, N. F. and Jajodia, S.: Exploring Steganography: Seeing the Unseen. IEEE Computer, 31 (2): 26-34, Feb 1998.
    • (1998) IEEE Computer , vol.31 , Issue.2 , pp. 26-34
    • Johnson, N.F.1    Jajodia, S.2
  • 2
    • 60349120006 scopus 로고    scopus 로고
    • Future. SANS Institute publication, December 1, Retrieved from
    • Judge, J.C.: Steganography: Past, Present, Future. SANS Institute publication, December 1, 2001.Retrieved from: http://www.sans.org/reading_room/ whitepapers/stenganography/552.php
    • (2001) Steganography: Past, Present
    • Judge, J.C.1
  • 3
  • 4
    • 28944435491 scopus 로고    scopus 로고
    • Data-hiding codes
    • Dec
    • Moulin, P. and Koetter, R.: Data-hiding codes. Proceedings of the IEEE, 93 (12): 2083-2126, Dec. 2005.
    • (2005) Proceedings of the IEEE , vol.93 , Issue.12 , pp. 2083-2126
    • Moulin, P.1    Koetter, R.2
  • 6
    • 44149086998 scopus 로고    scopus 로고
    • Simmons, G. J.: The Prisoners' Problem and the Subliminal Channel. Proceedings of CRYPTO83-Advances in Cryptology, August 22-24. 1984. pp. 51.67.
    • Simmons, G. J.: The Prisoners' Problem and the Subliminal Channel. Proceedings of CRYPTO83-Advances in Cryptology, August 22-24. 1984. pp. 51.67.
  • 8
    • 44149084098 scopus 로고    scopus 로고
    • Thomas, T. L.: Al Qaeda and the Internet: The Danger of Cyberplanning. Parameters, US Army War College Quarterly - Spring 2003. Retrieved from: http://www.carlisle.army.mil/usawc/Parameters/03spring/ thomas.pdf on 22-Nov-2006.
    • Thomas, T. L.: Al Qaeda and the Internet: The Danger of "Cyberplanning". Parameters, US Army War College Quarterly - Spring 2003. Retrieved from: http://www.carlisle.army.mil/usawc/Parameters/03spring/ thomas.pdf on 22-Nov-2006.
  • 9
    • 44149098965 scopus 로고    scopus 로고
    • Petitcolas, F.A.P.: Introduction to Information Hiding. In: Katzenbeisser, S and Petitcolas, F.A.P (ed.) (2000) Information hiding Techniques for Steganography and Digital Watermarking. Norwood: Artech House, INC.
    • Petitcolas, F.A.P.: "Introduction to Information Hiding". In: Katzenbeisser, S and Petitcolas, F.A.P (ed.) (2000) Information hiding Techniques for Steganography and Digital Watermarking. Norwood: Artech House, INC.
  • 10
    • 44149126540 scopus 로고    scopus 로고
    • Petitcolas, F.A.P.: Introduction to Information Hiding. In: Katzenbeisser, S and Petitcolas, F.A.P (ed.) (2000) Information hiding Techniques for Steganography and Digital Watermarking. Norwood: Artech House, INC.
    • Petitcolas, F.A.P.: "Introduction to Information Hiding". In: Katzenbeisser, S and Petitcolas, F.A.P (ed.) (2000) Information hiding Techniques for Steganography and Digital Watermarking. Norwood: Artech House, INC.
  • 12
  • 14
    • 0034430895 scopus 로고    scopus 로고
    • Exploring On Steganography For Low Bit Rate Wavelet Based Coder In Image Retrieval System
    • Kuala Lumpur, Malaysia
    • Areepongsa, S. Kaewkamnerd, N. Syed, Y. F. and Rao. K. R.: Exploring On Steganography For Low Bit Rate Wavelet Based Coder In Image Retrieval System. IEEE Proceedings of TENCON 2000. (3): 250-255. Kuala Lumpur, Malaysia. 2000.
    • (2000) IEEE Proceedings of TENCON , vol.3 , pp. 250-255
    • Areepongsa, S.1    Kaewkamnerd, N.2    Syed, Y.F.3    Rao, K.R.4
  • 16
    • 44149126850 scopus 로고    scopus 로고
    • Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis
    • Winter
    • Alvarez, P.: Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis. International Journal of Digital Evidence, 2 (3). Winter 2004.
    • (2004) International Journal of Digital Evidence , vol.2 , Issue.3
    • Alvarez, P.1
  • 17
    • 44149104221 scopus 로고    scopus 로고
    • Lin, E. T. and Delp, E. J.: A Review of Data Hiding in Digital Images. Retrieved on 1.Dec.2006 from Computer Forensics, Cyber crime and Steganography Resources, Digital Watermarking Links and Whitepapers, Apr 1999.
    • Lin, E. T. and Delp, E. J.: A Review of Data Hiding in Digital Images. Retrieved on 1.Dec.2006 from Computer Forensics, Cyber crime and Steganography Resources, Digital Watermarking Links and Whitepapers, Apr 1999.
  • 23
    • 35248884299 scopus 로고    scopus 로고
    • Steganalysis of JPEG Images: Breaking the F5 Algorithm
    • Noordwijkerhout, The Netherlands, October 7-9
    • Fridrich, J., Goljan, M. and Hogeg, D.: Steganalysis of JPEG Images: Breaking the F5 Algorithm. Proceedings of Information Hiding: 5th International Workshop, IH 2002 Noordwijkerhout, The Netherlands, 2578/2003: 310-323, October 7-9, 2002.
    • (2002) Proceedings of Information Hiding: 5th International Workshop, IH , vol.2578 , Issue.2003 , pp. 310-323
    • Fridrich, J.1    Goljan, M.2    Hogeg, D.3
  • 24
    • 0034787093 scopus 로고    scopus 로고
    • Reliable Detection of LSB Steganography in Grayscale and Color Images
    • Session on Multimedia Security and Watermarking, Ottawa, Canada, October 5
    • Fridrich, J., Goljan, M. and Du, R., (2001). Reliable Detection of LSB Steganography in Grayscale and Color Images. Proceedings of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, October 5, 2001, pp. 27-30.
    • (2001) Proceedings of ACM, Special , pp. 27-30
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 27
    • 34248160605 scopus 로고    scopus 로고
    • A steganographic method based upon JPEG and particle swarm optimization algorithm
    • August
    • Xiaoxia Li and Jianjun Wang., (2007). A steganographic method based upon JPEG and particle swarm optimization algorithm. Information Sciences, 177(15): 3099-31091, August 2007.
    • (2007) Information Sciences , vol.177 , Issue.15 , pp. 3099-31091
    • Li, X.1    Wang, J.2
  • 28
    • 0036497685 scopus 로고    scopus 로고
    • Chin-Chen Chang, Tung-Shou Chen and Lou-Zo Chung.: A steganographic method based upon JPEG and quantization table modification. Information Sciences, (141) 2002: 123-138. 2002.
    • Chin-Chen Chang, Tung-Shou Chen and Lou-Zo Chung.: A steganographic method based upon JPEG and quantization table modification. Information Sciences, (141) 2002: 123-138. 2002.
  • 29
    • 44149094662 scopus 로고    scopus 로고
    • Popescu, A.C.: Statistical Tools for Digital Image Forensics. Ph.D. Dissertation, Department of Computer Science, Dartmouth College, USA, (2005). Retrieved from: http://www.cs.dartmoum.edu/~farid/publications/apthesis05.html on 16-05-07 at 12:20.
    • Popescu, A.C.: Statistical Tools for Digital Image Forensics. Ph.D. Dissertation, Department of Computer Science, Dartmouth College, USA, (2005). Retrieved from: http://www.cs.dartmoum.edu/~farid/publications/apthesis05.html on 16-05-07 at 12:20.
  • 33
    • 1442293736 scopus 로고    scopus 로고
    • 2nd ed. USA: Morgan Kaufmann Publishers
    • Wayner, P.: Disappearing Cryptography. 2nd ed. USA: Morgan Kaufmann Publishers. (2002).
    • (2002) Disappearing Cryptography
    • Wayner, P.1
  • 35
    • 33846993721 scopus 로고    scopus 로고
    • Color Image Steganography Scheme using Set Partitioning in Hierarchical Trees Coding, Digital Fourier Transform and Adaptive Phase Modulation
    • Wen-Yuan Chen.: Color Image Steganography Scheme using Set Partitioning in Hierarchical Trees Coding, Digital Fourier Transform and Adaptive Phase Modulation. Applied Mathematics and Computation 185(1): 432-448 (2007).
    • (2007) Applied Mathematics and Computation , vol.185 , Issue.1 , pp. 432-448
    • Chen, W.-Y.1
  • 37
    • 33747799627 scopus 로고    scopus 로고
    • News Briefs
    • Computer, IEEE Computer Society, Aug
    • Paulson, L. D.: New System Fights Steganography, "News Briefs," Computer, IEEE Computer Society, 39(8): 25-27, Aug, 2006.
    • (2006) , vol.39 , Issue.8 , pp. 25-27
    • Paulson, L.D.1
  • 38
    • 35048834273 scopus 로고    scopus 로고
    • Chin-Chen Chang, Piyu Tsai and Min-Hui Lin.: An Adaptive Steganography for Index-Based Images Using Codeword Grouping. PCM (3) 2004: 731-738. (2004).
    • Chin-Chen Chang, Piyu Tsai and Min-Hui Lin.: An Adaptive Steganography for Index-Based Images Using Codeword Grouping. PCM (3) 2004: 731-738. (2004).
  • 40
    • 44149099416 scopus 로고    scopus 로고
    • Bae-Ho Lee, Kwang-Hee Kim, Yonggwan Won, and Jiseung Nam.: Efficient and Automatic Faces Detection Based on Skin-Tone and Neural Network Model. Proceedings of the 15th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2002, Cairns, Australia, June 17-20, 2002. Lecture Notes in Computer Science (2358/2002).
    • Bae-Ho Lee, Kwang-Hee Kim, Yonggwan Won, and Jiseung Nam.: Efficient and Automatic Faces Detection Based on Skin-Tone and Neural Network Model. Proceedings of the 15th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2002, Cairns, Australia, June 17-20, 2002. Lecture Notes in Computer Science (2358/2002).
  • 42
    • 0032092515 scopus 로고    scopus 로고
    • MPEG-4: An object-based multimedia coding standard supporting mobile applications
    • Springer Netherlands
    • Puri, A and Eleftheriadis, A.: MPEG-4: An object-based multimedia coding standard supporting mobile applications. Mobile Networks and Applications 3 (1): 5-32. (1998). Springer Netherlands
    • (1998) Mobile Networks and Applications , vol.3 , Issue.1 , pp. 5-32
    • Puri, A.1    Eleftheriadis, A.2
  • 43
    • 44149093244 scopus 로고    scopus 로고
    • A Comparative Analysis of Steganographic Tools
    • Institute of Technology Blanchardstown, Dublin, Ireland. 25th- 26th October
    • Cheddad, A., Condell, J., Curran, K and Mc Kevitt, P.: A Comparative Analysis of Steganographic Tools. Proceedings of the Seventh IT&T Conference. Institute of Technology Blanchardstown, Dublin, Ireland. 25th- 26th October 2007. pp 29-37.
    • (2007) Proceedings of the Seventh IT&T Conference , pp. 29-37
    • Cheddad, A.1    Condell, J.2    Curran, K.3    Mc Kevitt, P.4
  • 44
    • 44149115088 scopus 로고    scopus 로고
    • http://observer.guardian.co.uk/uk_news/story/0,6903,336271,00.html. Accessed on: January 25, 2007.
    • http://observer.guardian.co.uk/uk_news/story/0,6903,336271,00.html. Accessed on: January 25, 2007.
  • 45
    • 44149124390 scopus 로고    scopus 로고
    • http://news.bbc.co.uk/1/hi/technology/6361891.stm Retrieved on: 15-02-2007 at: 14:17.
    • http://news.bbc.co.uk/1/hi/technology/6361891.stm Retrieved on: 15-02-2007 at: 14:17.
  • 46
    • 44149116346 scopus 로고    scopus 로고
    • accessed on 13th June 2007 at 11:40
    • http://www.couleur.org/index.php?page=transformations, accessed on 13th June 2007 at 11:40.
  • 47
    • 44149092041 scopus 로고    scopus 로고
    • http://www.jpeg.org/jpeg2000/ accessed on 21-06-2007 at 17:04.
    • http://www.jpeg.org/jpeg2000/ accessed on 21-06-2007 at 17:04.
  • 48
    • 44149083417 scopus 로고    scopus 로고
    • http://www.infm.ulst.ac.uk/~abbasc/
  • 49
    • 44149123677 scopus 로고    scopus 로고
    • F5: http://wwwrn.inf.tu-dresden.de/~westfeld/f5.html, and S-Tools from: ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/s-tools4 .zip
    • F5: http://wwwrn.inf.tu-dresden.de/~westfeld/f5.html, and S-Tools from: ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/s-tools4.zip


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.