메뉴 건너뛰기




Volumn 5, Issue 2, 2010, Pages 354-358

A method for automatic identification of signatures of steganography software

Author keywords

Blind; Media type agnostic; Steganalysis; Steganography

Indexed keywords

AUTOMATIC IDENTIFICATION; BLIND; MEDIA TYPES; STEGANALYSIS; STEGANOGRAPHY SOFTWARE;

EID: 77952635989     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2010.2046985     Document Type: Article
Times cited : (15)

References (15)
  • 1
    • 84904224992 scopus 로고    scopus 로고
    • Steganalysis of images created using current steganography software
    • in, London, U. K.
    • N. F. Johnson and S. Jajodia, "Steganalysis of images created using current steganography software, " in Proc. Int. Workshop Information Hiding, ser. LNCS, London, U. K., 1998, vol. 1525, pp. 273-289.
    • (1998) Proc. Int. Workshop Information Hiding, Ser. LNCS , vol.1525 , pp. 273-289
    • Johnson, N.F.1    Jajodia, S.2
  • 4
    • 3042742327 scopus 로고    scopus 로고
    • Hide and seek: An introduction to steganography
    • May/Jun
    • N. Provos and P. Honeyman, "Hide and seek: An introduction to steganography, " IEEE Security Privacy, vol. 1, no. 3, pp. 32-44, May/Jun. 2003.
    • (2003) IEEE Security Privacy , vol.1 , Issue.3 , pp. 32-44
    • Provos, N.1    Honeyman, P.2
  • 6
    • 33646852111 scopus 로고    scopus 로고
    • An evaluationof image-based steganography methods
    • K. Bailey
    • K. Curran and K. Bailey, "An evaluationof image-based steganography methods, " Int. J. Digital Evidence, vol. 2, no. 2, 2003.
    • (2003) Int. J. Digital Evidence , vol.2 , Issue.2
    • Curran, K.1
  • 7
    • 84937814312 scopus 로고    scopus 로고
    • F5-a steganographic algorithm: High capacity despite better steganalysis
    • A. Westfeld, "F5-a steganographic algorithm: High capacity despite better steganalysis, " in Proc. Int. Workshop Information Hiding, ser. LNCS, 2001, vol. 2137, pp. 289-302.
    • (2001) Proc. Int. Workshop Information Hiding, Ser. LNCS , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 8
    • 77952602378 scopus 로고    scopus 로고
    • STools v4.0 Online. Available
    • A. Brown, STools v4.0 [Online]. Available: ftp://ftp. demon. net/pub/mirrors/crypto/idea/code/s-tools4.zip
    • Brown, A.1
  • 9
    • 0031996445 scopus 로고    scopus 로고
    • Exploring steganography: Seeing the unseen
    • N. F. Johnson and S. Jajodia, "Exploring steganography: Seeing the unseen, " Computer, vol. 31, no. 2, pp. 26-34, 1998.
    • (1998) Computer , vol.31 , Issue.2 , pp. 26-34
    • Johnson, N.F.1    Jajodia, S.2
  • 12
    • 0035472155 scopus 로고    scopus 로고
    • Detecting LSB steganography in color and gray-scale images
    • DOI 10.1109/93.959097
    • J. Fridrich, M. Goljan, and R. Du, "Detecting LSB steganography in color and gray-scale images, " Special Issue on Security, IEEE Multimedia, vol. 8, no. 4, pp. 22-28, Oct./Dec. 2001. (Pubitemid 33018249)
    • (2001) IEEE Multimedia , vol.8 , Issue.4 , pp. 22-28
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 13
    • 77952630898 scopus 로고    scopus 로고
    • The dangers of webcrawled datasets
    • Feb. 1, Online. Available
    • G. Bell, "The dangers of webcrawled datasets, " First Monday vol. 15, no. 2, Feb. 1, 2010 [Online]. Available: http://firstmonday.org/htbin/ cgiwrap/bin/ojs/index.php/fm/article/view/2739/2456
    • (2010) First Monday , vol.15 , Issue.2
    • Bell, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.