메뉴 건너뛰기




Volumn 6059 LNCS, Issue , 2010, Pages 203-213

Concurrent covert communication channels

Author keywords

Concurrent channel; Covert Channel; JPEG; steganography

Indexed keywords

CONCURRENT CHANNEL; COVERT CHANNELS; COVERT COMMUNICATIONS; FIRST ORDER; JPEG IMAGE; MULTIPLE RECEIVERS; ROUND-OFF ERRORS; SINGLE-BIT; STATISTICAL DETECTION;

EID: 77954595266     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13577-4_18     Document Type: Conference Paper
Times cited : (3)

References (15)
  • 1
    • 70350710022 scopus 로고    scopus 로고
    • Digital image steganography: Survey and analysis of current methods
    • Curran, K., Cheddad, A., Condell, J., McKevitt, P.: Digital image steganography: Survey and analysis of current methods. Signal Processing 90(3), 727-752 (2010)
    • (2010) Signal Processing , vol.90 , Issue.3 , pp. 727-752
    • Curran, K.1    Cheddad, A.2    Condell, J.3    McKevitt, P.4
  • 2
    • 33749598442 scopus 로고    scopus 로고
    • Breaking cauchy model-based JPEG steganography with first order statistics
    • Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. Springer, Heidelberg
    • Böhme, R., Westfeld, A.: Breaking cauchy model-based JPEG steganography with first order statistics. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 125-140. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3193 , pp. 125-140
    • Böhme, R.1    Westfeld, A.2
  • 4
    • 35248884299 scopus 로고    scopus 로고
    • Steganalysis of JPEG images: Breaking the F5 algorithm
    • Petitcolas, F.A.P. (ed.) IH 2002. Springer, Heidelberg
    • Fridrich, J.J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310-323. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2578 , pp. 310-323
    • Fridrich, J.J.1    Goljan, M.2    Hogea, D.3
  • 5
    • 14844321910 scopus 로고    scopus 로고
    • Perturbed quantization steganography with wet paper codes
    • Dittmann, J., Fridrich, J.J. (eds.) ACM, New York
    • Fridrich, J.J., Goljan, M., Soukal, D.: Perturbed quantization steganography with wet paper codes. In: Dittmann, J., Fridrich, J.J. (eds.) MM&Sec, pp. 4-15. ACM, New York (2004)
    • (2004) MM&Sec , pp. 4-15
    • Fridrich, J.J.1    Goljan, M.2    Soukal, D.3
  • 6
    • 38149033612 scopus 로고    scopus 로고
    • Modified matrix encoding technique for minimal distortion steganography
    • Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. Springer, Heidelberg
    • Kim, Y., Duric, Z., Richards, D.: Modified matrix encoding technique for minimal distortion steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 314-327. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4437 , pp. 314-327
    • Kim, Y.1    Duric, Z.2    Richards, D.3
  • 9
    • 35048819204 scopus 로고    scopus 로고
    • Model-based steganography
    • Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. Springer, Heidelberg
    • Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154-167. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2939 , pp. 154-167
    • Sallee, P.1
  • 10
    • 33744753200 scopus 로고    scopus 로고
    • Model-based methods for steganography and steganalysis
    • Sallee, P.: Model-based methods for steganography and steganalysis. Int. J. Image Graphics 5(1), 167-190 (2005)
    • (2005) Int. J. Image Graphics , vol.5 , Issue.1 , pp. 167-190
    • Sallee, P.1
  • 11
    • 77954582811 scopus 로고    scopus 로고
    • Upham, D.: http://zooid.org/~paul/crypto/jsteg/
    • Upham, D.1
  • 13
    • 84937814312 scopus 로고    scopus 로고
    • F5 - A steganographic algorithm
    • Moskowitz, I.S. (ed.) IH 2001. Springer, Heidelberg
    • Westfeld, A.: F5 - A steganographic algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289-302. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 14
    • 35248881927 scopus 로고    scopus 로고
    • Detecting low embedding rates
    • Petitcolas, F.A.P. (ed.) IH 2002. Springer, Heidelberg
    • Westfeld, A.: Detecting low embedding rates. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 324-339. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2578 , pp. 324-339
    • Westfeld, A.1
  • 15
    • 84892764719 scopus 로고    scopus 로고
    • Attacks on steganographic systems
    • Pfitzmann, A. (ed.) IH 1999. Springer, Heidelberg
    • Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61-76. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1768 , pp. 61-76
    • Westfeld, A.1    Pfitzmann, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.