메뉴 건너뛰기




Volumn 10, Issue 15, 2010, Pages 1650-1655

On the differences between hiding information and cryptography techniques: An overview

Author keywords

Cryptography; Data hidden; Hiding information; Information security; Steganography

Indexed keywords

CRYPTOGRAPHY; SECURITY OF DATA; STEGANOGRAPHY;

EID: 77954783981     PISSN: 18125654     EISSN: 18125662     Source Type: Journal    
DOI: 10.3923/jas.2010.1650.1655     Document Type: Review
Times cited : (106)

References (23)
  • 3
    • 74349117323 scopus 로고    scopus 로고
    • A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm
    • Ahmed, M.A., M.L.M. Kiah, B.B. Zaidan and A.A. Zaidan, 2010. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J. Applied Sci., 10: 59-64.
    • (2010) J. Applied Sci. , vol.10 , pp. 59-64
    • Ahmed, M.A.1    Kiah, M.L.M.2    Zaidan, B.B.3    Zaidan, A.A.4
  • 4
    • 77649155870 scopus 로고    scopus 로고
    • Arabic text steganography using kashida extensions with huffman code
    • Al-Azawi, A.F. and M.A. Fadhil, 2010. Arabic text steganography using kashida extensions with huffman code. J. Applied Sci., 10: 436-439.
    • (2010) J. Applied Sci. , vol.10 , pp. 436-439
    • Al-Azawi, A.F.1    Fadhil, M.A.2
  • 5
    • 84888285530 scopus 로고    scopus 로고
    • Code based hashing technique for message authentication algorithms
    • Alghathbar, K., 2010. Code based hashing technique for message authentication algorithms. J. Inform. Assurance Security, 5: 9-20.
    • (2010) J. Inform. Assurance Security , vol.5 , pp. 9-20
    • Alghathbar, K.1
  • 8
    • 84958663551 scopus 로고    scopus 로고
    • Collision-resistant hashing: Towards making uowhfs practical
    • Bellare, M. and P. Rogaway, 1997. Collision-resistant hashing: Towards making uowhfs practical. Lecture Notes Comput. Sci., 1294: 470-484.
    • (1997) Lecture Notes Comput. Sci. , pp. 470-484
    • Bellare, M.1    Rogaway, P.2
  • 10
    • 77954808157 scopus 로고    scopus 로고
    • Frame selected approach for hiding data within MPEG video using bit plane complexity segmentation
    • Jalab, H., A. Zaidan and B.B. Zaidan, 2009. Frame selected approach for hiding data within MPEG video using bit plane complexity segmentation. J. Comput., 1: 108-113.
    • (2009) J. Comput. , vol.1 , pp. 108-113
    • Jalab, H.1    Zaidan, A.2    Zaidan, B.B.3
  • 11
    • 63349086114 scopus 로고    scopus 로고
    • Information hiding: Steganography and watermarking-attacks and countermeasures
    • Johnson, N.F., Z. Duric, S. Jajodia and N. Memon, 2001. Information hiding: Steganography and watermarking-attacks and countermeasures. J. Electron. Imag., 10: 825-825.
    • (2001) J. Electron. Imag. , vol.10 , pp. 825-825
    • Johnson, N.F.1    Duric, Z.2    Jajodia, S.3    Memon, N.4
  • 13
    • 0032634270 scopus 로고    scopus 로고
    • Principle and applications of BPCS-steganography
    • Kawaguchi, E. and R.O. Eason, 1998. Principle and applications of BPCS-steganography. Proc. SPIE, 3528: 464-473.
    • (1998) Proc. SPIE , vol.3528 , pp. 464-473
    • Kawaguchi, E.1    Eason, R.O.2
  • 15
    • 77954774232 scopus 로고    scopus 로고
    • Novel approach for high secure and high rate data hidden in the image using image texture analysis
    • Majeed, A., M.L.M. Kiah, H.T. Madhloom, B.B. Zaidan and A.A. Zaidan, 2009. Novel approach for high secure and high rate data hidden in the image using image texture analysis. Int. J. Eng. Technol., 1: 63-69.
    • (2009) Int. J. Eng. Technol. , vol.1 , pp. 63-69
    • Majeed, A.1    Kiah, M.L.M.2    Madhloom, H.T.3    Zaidan, B.B.4    Zaidan, A.A.5
  • 17
    • 77952266986 scopus 로고    scopus 로고
    • Novel approach of hidden data in the (unused area 2 within exe file) using computation between cryptography and steganography
    • Naji, A.W., A.A. Zaidan, B.B. Zaidan, A. Shihab and O.O. Khalifa, 2009b. Novel approach of hidden data in the (unused area 2 within exe file) using computation between cryptography and steganography. Int. J. Comput. Sci. Network Security, 9: 294-300.
    • (2009) Int. J. Comput. Sci. Network Security , vol.9 , pp. 294-300
    • Naji, A.W.1    Zaidan, A.A.2    Zaidan, B.B.3    Shihab, A.4    Khalifa, O.O.5
  • 20
    • 67649610454 scopus 로고    scopus 로고
    • High capacity persian/arabic text steganography
    • Shirah-Shahreza, M. and S. Shirali-Shahreza, 2008. High capacity persian/arabic text steganography. J. Applied Sci., 8: 4173-4179.
    • (2008) J. Applied Sci. , vol.8 , pp. 4173-4179
    • Shirah-Shahreza, M.1    Shirali-Shahreza, S.2
  • 23
    • 77954780065 scopus 로고    scopus 로고
    • Novel approach for high secure data hidden in MPEG video using public key infrastructure
    • Zaidan, A. and B. Zaidan, 2009. Novel approach for high secure data hidden in MPEG video using public key infrastructure. Int. J. Comput. Network Security, 1: 1985-1993.
    • (2009) Int. J. Comput. Network Security , vol.1 , pp. 1985-1993
    • Zaidan, A.1    Zaidan, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.