메뉴 건너뛰기




Volumn 2, Issue 6, 2009, Pages 555-566

Chestega: Chess steganography methodology

Author keywords

Covert communication; Information hiding; Steganography

Indexed keywords

COMPUTER NETWORKS; INFORMATION SYSTEMS;

EID: 74849132505     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.99     Document Type: Article
Times cited : (40)

References (25)
  • 2
    • 0038420284 scopus 로고
    • Steganography its history and its application to computer based data files
    • School of Computing, Dublin City University
    • Davern P, Scott M. "Steganography its history and its application to computer based data files," Internal Report Working Paper: CA-0795, School of Computing, Dublin City University 1995. http://computing.dcu.ie/research/papers/1995/0795.pdf.
    • (1995) Internal Report Working Paper: Ca-0795
    • Davern, P.1    Scott, M.2
  • 4
    • 0001931684 scopus 로고    scopus 로고
    • A survey of steganographic techniques
    • In Information Hiding, Katzenbeisser S, Petitcolas F (eds)., Norwood, MA
    • Johnson NF, Katzenbeisser S. A survey of steganographic techniques. In Information Hiding, Katzenbeisser S, Petitcolas F (eds). Artech House: Norwood, MA, 2000; 43-78.
    • (2000) Artech House , pp. 43-78
    • Johnson, N.F.1    Katzenbeisser, S.2
  • 5
    • 33947624454 scopus 로고    scopus 로고
    • Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text
    • Bennett K. "Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text," CERIAS Tech Report 2004-13, Purdue University, 2004.
    • (2004) Cerias Tech Report 2004-13
    • Bennett, K.1
  • 8
    • 84950895792 scopus 로고
    • Mimic Functions
    • Wayner P. Mimic Functions. Cryptologia 1992; XVI/3: 193-214.
    • (1992) Cryptologia , vol.14 , Issue.3 , pp. 193-214
    • Wayner, P.1
  • 9
    • 1442293736 scopus 로고    scopus 로고
    • (2nd edn). Morgan Kaufmann: San Francisco, California, USA
    • Wayner P. Disappearing Cryptography (2nd edn). Morgan Kaufmann: San Francisco, California, USA, 2002; 81-128.
    • (2002) Disappearing Cryptography , pp. 81-128
    • Wayner, P.1
  • 21
    • 32444448571 scopus 로고    scopus 로고
    • Steganography in games: A general methodology and its application to the game of Go
    • Castroa J, Blasco-Lopez I, Estévez-Tapiador JM, Garnacho AR. Steganography in games: A general methodology and its application to the game of Go. Computers and Security 2006; 25(1): 64-71. http://www.very-best.de/pgn-spec.htm.
    • (2006) Computers and Security , vol.25 , Issue.1 , pp. 64-71
    • Castroa, J.1    Blasco-Lopez, I.2    Estévez-Tapiador, J.M.3    Garnacho, A.R.4
  • 23
    • 33847675252 scopus 로고    scopus 로고
    • An Overview of Steganography for the Computer Forensics Examiner
    • (Technical Report), July, http://www.garykessler.net/library/fsc stego.html
    • Kessler GC. "An Overview of Steganography for the Computer Forensics Examiner" An edited version, issue of Forensic Science Communications (Technical Report), Vol. 6, No. 3, July 2004. http://www.fbi.gov/hq/lab/fsc/backissu/july2004/research/200403research01.htm. http://www.garykessler.net/library/fsc stego.html.
    • (2004) An Edited Version, Issue of Forensic Science Communications , vol.6 , Issue.3
    • Kessler, G.C.1
  • 25
    • 40749088014 scopus 로고
    • Two-level grammars are more expressive than Type 0 grammars or are they?
    • August
    • Grune D. "Two-level grammars are more expressive than Type 0 grammars or are they?" SIGPLAN Notices, USA, Vol. 28, No.8, pp. 43-45, August 1993.
    • (1993) Sigplan Notices, USA , vol.28 , Issue.8 , pp. 43-45
    • Grune, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.