-
2
-
-
0038420284
-
Steganography its history and its application to computer based data files
-
School of Computing, Dublin City University
-
Davern P, Scott M. "Steganography its history and its application to computer based data files," Internal Report Working Paper: CA-0795, School of Computing, Dublin City University 1995. http://computing.dcu.ie/research/papers/1995/0795.pdf.
-
(1995)
Internal Report Working Paper: Ca-0795
-
-
Davern, P.1
Scott, M.2
-
4
-
-
0001931684
-
A survey of steganographic techniques
-
In Information Hiding, Katzenbeisser S, Petitcolas F (eds)., Norwood, MA
-
Johnson NF, Katzenbeisser S. A survey of steganographic techniques. In Information Hiding, Katzenbeisser S, Petitcolas F (eds). Artech House: Norwood, MA, 2000; 43-78.
-
(2000)
Artech House
, pp. 43-78
-
-
Johnson, N.F.1
Katzenbeisser, S.2
-
5
-
-
33947624454
-
Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text
-
Bennett K. "Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text," CERIAS Tech Report 2004-13, Purdue University, 2004.
-
(2004)
Cerias Tech Report 2004-13
-
-
Bennett, K.1
-
6
-
-
33947672376
-
A New Approach to Persian/Arabic Text Steganography
-
10-12, Honolulu, Hawaii, July
-
Shirali-Shahreza MH, Shirali-Shahreza M. "A New Approach to Persian/Arabic Text Steganography" in the Proceedings of 5th IEEE/ACIS International Conference on Computer and Information Science (ICIS-COMSAR 2006) pp. 310-315, 10-12, Honolulu, Hawaii, July 2006.
-
(2006)
Proceedings of 5th Ieee/acis International Conference On Computer and Information Science (icis-comsar 2006)
, pp. 310-315
-
-
Shirali-Shahreza, M.H.1
Shirali-Shahreza, M.2
-
8
-
-
84950895792
-
Mimic Functions
-
Wayner P. Mimic Functions. Cryptologia 1992; XVI/3: 193-214.
-
(1992)
Cryptologia
, vol.14
, Issue.3
, pp. 193-214
-
-
Wayner, P.1
-
9
-
-
1442293736
-
-
(2nd edn). Morgan Kaufmann: San Francisco, California, USA
-
Wayner P. Disappearing Cryptography (2nd edn). Morgan Kaufmann: San Francisco, California, USA, 2002; 81-128.
-
(2002)
Disappearing Cryptography
, pp. 81-128
-
-
Wayner, P.1
-
10
-
-
0005013984
-
Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text
-
Springer, Beijing, P.R. China, November
-
Chapman M, Davida G. "Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text," in the Proceedings of the International Conference on Information and Communications Security, Vol. 1334 of Lecture Notes in Computer Science, Springer, pp. 335-345, Beijing, P.R. China, November 1997.
-
(1997)
In the Proceedings of The International Conference On Information and Communications Security, Vol. 1334 of Lecture Notes In Computer Science
, pp. 335-345
-
-
Chapman, M.1
Davida, G.2
-
11
-
-
33746582127
-
-
Technical Report CSD TR# 05-009, Purdue University, (CERIAS Tech Report 2005-39)
-
Grothoff C, Grothoff K, Alkhutova L, Stutsman R, Atallah M. "Translation-based steganography," Technical Report CSD TR# 05-009, Purdue University, 2005. (CERIAS Tech Report 2005-39) http://grothoff.org/christian/lit-tech.ps.
-
(2005)
Translation-based Steganography
-
-
Grothoff, C.1
Grothoff, K.2
Alkhutova, L.3
Stutsman, R.4
Atallah, M.5
-
12
-
-
33746654158
-
Translation-based steganography
-
Springer-Verlag, Barcelona, Spain, June
-
Grothoff C, Grothoff K, Alkhutova L, Stuts Man R, Atallah M. "Translation-based steganography." In the Proceedings of Information Hiding Workshop (IH 2005), pp. 213-233. Springer-Verlag, Barcelona, Spain, June 2005.
-
(2005)
The Proceedings of Information Hiding Workshop (ih 2005)
, pp. 213-233
-
-
Grothoff, C.1
Grothoff, K.2
Alkhutova, L.3
Stuts Man, R.4
Atallah, M.5
-
15
-
-
3042637631
-
Increasing robustness of LSB audio steganography using a novel embedding method
-
Las Vegas, Nevada, April
-
Cvejic N, Seppanen T. "Increasing robustness of LSB audio steganography using a novel embedding method," in the Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), pp. 533-537, Las Vegas, Nevada, April 2004.
-
(2004)
Proceedings of The International Conference On Information Technology: Coding and Computing (itcc'04)
, pp. 533-537
-
-
Cvejic, N.1
Seppanen, T.2
-
16
-
-
7644240420
-
Reduced distortion bit-modification for LSB audio steganography
-
'04. 2004 in the, Beijing, China, August
-
Cvejic N, Seppanen T. "Reduced distortion bit-modification for LSB audio steganography"'04. 2004 in the Proceedings of the 7th International Conference on Signal Processing (ICSP 04), Vol. 3 pp. 2318-2321, Beijing, China, August 2004.
-
(2004)
Proceedings of The 7th International Conference On Signal Processing (icsp 04)
, vol.3
, pp. 2318-2321
-
-
Cvejic, N.1
Seppanen, T.2
-
17
-
-
0030384775
-
Techniques for Data Hiding
-
Bender W, Gruhl D, Morimoto N, Lu A. Techniques for Data Hiding. IBM Systems Journal 1996; 35(3 and 4): 313-336.
-
(1996)
Ibm Systems Journal
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
18
-
-
0035791290
-
Spread-spectrum audio watermarking: Requirements, applications, and limitations
-
Cannes, France, October
-
th IEEE Workshop on Multimedia Signal Processing, pp. 219-224 Cannes, France, October 2001.
-
(2001)
th Ieee Workshop On Multimedia Signal Processing
, pp. 219-224
-
-
Kirovski, D.1
Malvar, H.2
-
19
-
-
4544331263
-
Data-hiding in audio using frequency-selective phase alteration
-
17-21, May
-
Ansari R, Malik H, Khokhar A. "Data-hiding in audio using frequency-selective phase alteration," in the Proceedings of IEEE International Conference on Acoustics, Speech, and SignalProcessing,(ICASSP'04), Vol. 5, 17-21 pp. 389-92 May 2004.
-
(2004)
Proceedings of Ieee International Conference On Acoustics, Speech, and Signalprocessing,(icassp'04)
, vol.5
, pp. 389-392
-
-
Ansari, R.1
Malik, H.2
Khokhar, A.3
-
20
-
-
84955119830
-
Echo Hiding
-
Springer, Cambridge, UK, May
-
Gruhl D, Lu A, Bender W. "Echo Hiding," in the Proceedings of First International Workshop on Information Hiding, Lecture Notes in Computer Science, Vol. 1174 Springer, pp. 295-316, Cambridge, UK, May 1996.
-
(1996)
Proceedings of First International Workshop On Information Hiding, Lecture Notes In Computer Science
, vol.1174
, pp. 295-316
-
-
Gruhl, D.1
Lu, A.2
Bender, W.3
-
21
-
-
32444448571
-
Steganography in games: A general methodology and its application to the game of Go
-
Castroa J, Blasco-Lopez I, Estévez-Tapiador JM, Garnacho AR. Steganography in games: A general methodology and its application to the game of Go. Computers and Security 2006; 25(1): 64-71. http://www.very-best.de/pgn-spec.htm.
-
(2006)
Computers and Security
, vol.25
, Issue.1
, pp. 64-71
-
-
Castroa, J.1
Blasco-Lopez, I.2
Estévez-Tapiador, J.M.3
Garnacho, A.R.4
-
23
-
-
33847675252
-
An Overview of Steganography for the Computer Forensics Examiner
-
(Technical Report), July, http://www.garykessler.net/library/fsc stego.html
-
Kessler GC. "An Overview of Steganography for the Computer Forensics Examiner" An edited version, issue of Forensic Science Communications (Technical Report), Vol. 6, No. 3, July 2004. http://www.fbi.gov/hq/lab/fsc/backissu/july2004/research/200403research01.htm. http://www.garykessler.net/library/fsc stego.html.
-
(2004)
An Edited Version, Issue of Forensic Science Communications
, vol.6
, Issue.3
-
-
Kessler, G.C.1
-
25
-
-
40749088014
-
Two-level grammars are more expressive than Type 0 grammars or are they?
-
August
-
Grune D. "Two-level grammars are more expressive than Type 0 grammars or are they?" SIGPLAN Notices, USA, Vol. 28, No.8, pp. 43-45, August 1993.
-
(1993)
Sigplan Notices, USA
, vol.28
, Issue.8
, pp. 43-45
-
-
Grune, D.1
|