메뉴 건너뛰기




Volumn 18, Issue 4, 2009, Pages 178-193

Notestega: Notes-based steganography methodology

Author keywords

Information hiding; Linguistic steganography; Steganography; Test steganography

Indexed keywords


EID: 77956001264     PISSN: 19393555     EISSN: 19393547     Source Type: Journal    
DOI: 10.1080/19393550903076841     Document Type: Article
Times cited : (19)

References (56)
  • 2
    • 4544331263 scopus 로고    scopus 로고
    • Data-hiding in audio using frequency-selective phase alteration. Proceedings of ieee international conference on acoustics
    • Ansari, R., Malik, H., & Khokhar, A. (2004, May). Data-hiding in audio using frequency-selective phase alteration. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '04), 5(17-21), 389-92.
    • (2004) Speech, and Signal Processing (ICASSP '04) , vol.5 , Issue.17-21 , pp. 389-392
    • Ansari, R.1    Malik, H.2    Khokhar, A.3
  • 3
    • 0030384775 scopus 로고    scopus 로고
    • Techniques for data hiding
    • Bender, W. et al. (1996). Techniques for data hiding. IBM Systems Journal, 35(3 & 4), 313-336.
    • (1996) IBM Systems Journal , vol.35 , Issue.3-4 , pp. 313-336
    • Bender, W.1
  • 4
    • 33947624454 scopus 로고    scopus 로고
    • Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text
    • Purdue University.
    • Bennett, K. (2004). Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text. CERIAS Technical Report 2004-13, Purdue University.
    • (2004) CERIAS Technical Report 2004-13
    • Bennett, K.1
  • 11
    • 33749584675 scopus 로고    scopus 로고
    • Exploiting linguistic features in lexical steganography: Design and proof-of-concept implementation. proceedings of the 39th annual hawaii international conference on system sciences (hicss '06)
    • Chand, V., & Orgun, C. O. (2006, January). Exploiting linguistic features in lexical steganography: Design and proof-of-concept implementation. Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS '06). IEEE, 6, 126b.
    • (2006) IEEE , vol.6
    • Chand, V.1    Orgun, C.O.2
  • 18
    • 0038420284 scopus 로고
    • Steganography its history and its application to computer-based data files
    • Dublin City University. Retrieved August 3, 2006, from
    • Davern, P., & Scott, M. (1995). Steganography its history and its application to computer-based data files. Internal Report Working Paper: CA-0795. School of Computing, Dublin City University. Retrieved August 3, 2006, from http://computing.dcu.ie/research/papers/1995/0795.pdf
    • (1995) Internal Report Working Paper: CA-0795. School of Computing
    • Davern, P.1    Scott, M.2
  • 19
    • 68449090598 scopus 로고    scopus 로고
    • Psm: Public steganography methodology
    • Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore, MD.
    • Desoky, A., & Younis, M. (2006, November). PSM: Public steganography methodology. Technical Report TR-CS-06-07, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore, MD.
    • (2006) Technical Report TR-CS-06-07
    • Desoky, A.1    Younis, M.2
  • 21
    • 57849094995 scopus 로고    scopus 로고
    • Nostega: Noiseless steganography paradigm
    • Desoky, A. (2008). Nostega: Noiseless steganography paradigm. Journal of Digital Forensic Practice, 2(3),132-139.
    • (2008) Journal of Digital Forensic Practice , vol.2 , Issue.3 , pp. 132-139
    • Desoky, A.1
  • 26
    • 33746582127 scopus 로고    scopus 로고
    • Translation-based steganography
    • Purdue University (CERIAS Tech Report 2005-39)
    • Grothoff, C., et al. (2005). Translation-based steganography. Technical Report CSD TR# 05-009. Purdue University (CERIAS Tech Report 2005-39).
    • (2005) Technical Report CSD TR# 05-009
    • Grothoff, C.1
  • 30
    • 84928222576 scopus 로고
    • Note-taking english as a simplified register
    • Janda, R. D. (1985). Note-taking English as a simplified register. Discourse Processes, 8(4), 437-454.
    • (1985) Discourse Processes , vol.8 , Issue.4 , pp. 437-454
    • Janda, R.D.1
  • 31
    • 0001931684 scopus 로고    scopus 로고
    • A survey of steganographic techniques
    • S. Katzenbeisser & F. Petitcolas (Eds.), Norwood, MA: Artech House
    • Johnson, N. F., & Katzenbeisser, S. (1999). A survey of steganographic techniques. In S. Katzenbeisser & F. Petitcolas (Eds.), Information hiding (pp. 43-78). Norwood, MA: Artech House.
    • (1999) Information Hiding , pp. 43-78
    • Johnson, N.F.1    Katzenbeisser, S.2
  • 32
    • 34547967524 scopus 로고    scopus 로고
    • Automatic summarizing: The state of the art. info
    • Jones, K. S. (2007). Automatic summarizing: The state of the art. Info. Processing Mgmt., 43(6), 1449-1481.
    • (2007) Processing Mgmt. , vol.43 , Issue.6 , pp. 1449-1481
    • Jones, K.S.1
  • 34
    • 33847675252 scopus 로고    scopus 로고
    • An overview of steganography for the computer forensics examiner. Forensic science communications
    • Kessler, G. C. (2004). An overview of steganography for the computer forensics examiner. Forensic Science Communications. Technical Report, 6(3) http://www.garykessler.net/library/fsc_stego.htm.
    • (2004) Technical Report , vol.6 , Issue.3
    • Kessler, G.C.1
  • 36
    • 0035791290 scopus 로고    scopus 로고
    • Spread-spectrum audio watermarking: Requirements, applications, and limitations
    • 219-224, Cannes, France, October 3-5, 2001.
    • Kirovski, D., & Malvar, H. (2001). Spread-spectrum audio watermarking: Requirements, applications, and limitations. Proceedings of the 4th IEEE Workshop on Multimedia Signal Processing, 219-224, Cannes, France, October 3-5, 2001.
    • (2001) Proceedings of the 4Th IEEE Workshop on Multimedia Signal Processing
    • Kirovski, D.1    Malvar, H.2
  • 37
    • 84880039971 scopus 로고    scopus 로고
    • Amsterdam, Philadelphia: John Benjamins Publishing Company
    • Mani, I. (2001). Automatic summarization. Amsterdam, Philadelphia: John Benjamins Publishing Company.
    • (2001) Automatic Summarization
    • Mani, I.1
  • 42
    • 38049156072 scopus 로고    scopus 로고
    • Text information hiding with preserved meaning a case for japanese documents
    • [originally published in Japanese]. A similar paper by the first author in English retrieved on June 4, 2008, from
    • Nakagawa, H., Sampei, K., Matsumoto, T., Kawaguchi, S., Makino, K., & Murase, I. (2001). Text information hiding with preserved meaning a case for Japanese documents. IPSJ Transaction, 42(9), 2339-2350 [originally published in Japanese]. A similar paper by the first author in English retrieved on June 4, 2008, from http://www.ndl.itc.utokyo.ac.jp/nakagawa/academic-res/finpri02.pdf
    • (2001) IPSJ Transaction , vol.42 , Issue.9 , pp. 2339-2350
    • Nakagawa, H.1    Sampei, K.2    Matsumoto, T.3    Kawaguchi, S.4    Makino, K.5    Murase, I.6
  • 43
    • 85023907079 scopus 로고    scopus 로고
    • Retrieved October 15, 2008
    • Notetaking System. (n.d.). Retrieved October 15, 2008, from http://www.cs.umd.edu/-egolub/AVIAN/TE-BIRD
  • 47
    • 85023903699 scopus 로고    scopus 로고
    • Text steganography in sms. Convergence information technology
    • Shirali-Shahreza, M. et al. (2007, November). Text steganography in SMS. Convergence Information Technology, November 21-23, 1714-1719.
    • (2007) November , vol.21-23 , pp. 1714-1719
    • Shirali-Shahreza, M.1
  • 48
    • 85023957047 scopus 로고    scopus 로고
    • What we do with english when we take notes: Evidence from a civil lawsuit
    • Poznan, Poland: Adam Mickiewicz University Press.
    • Shuy, R. W. (1998). What we do with English when we take notes: Evidence from a civil lawsuit. Studia Anglica posnaniensia: International review of English studies. Poznan, Poland: Adam Mickiewicz University Press.
    • (1998) Studia Anglica Posnaniensia: International Review of English Studies
    • Shuy, R.W.1
  • 49
    • 85023923066 scopus 로고    scopus 로고
    • Retrieved July 31, 2007
    • Spam Mimic. (n.d.). Retrieved July 31, 2007, from http://www.sp ammimic.com
    • Mimic, S.1
  • 51
    • 33750907773 scopus 로고    scopus 로고
    • The hiding virtues of ambiguity: Quantifiably resilient watermarking of natural language text through synonym substitutions
    • New York: ACM Press
    • Topkara, U., Topkara, M., & Atallah, M. J. (2006). The hiding virtues of ambiguity: Quantifiably resilient watermarking of natural language text through synonym substitutions. In MM&Sec '06: Proceeding of the 8th Workshop on Multimedia and Security (pp. 164-174), New York: ACM Press.
    • (2006) Mm&Sec '06: Proceeding of the 8Th Workshop on Multimedia and Security , pp. 164-174
    • Topkara, U.1    Topkara, M.2    Atallah, M.J.3
  • 53
    • 84950895792 scopus 로고
    • Mimic functions
    • Wayner, P. (1992). Mimic functions. Cryptologia, XVI(3), 193-214.
    • (1992) Cryptologia , vol.16 , Issue.3 , pp. 193-214
    • Wayner, P.1
  • 54
    • 85023909913 scopus 로고    scopus 로고
    • (
    • (2nd ed., pp. 81-128).: Morgan Kaufmann.
    • Wayner, P. (2002). Disappearing cryptography (2nd ed., pp. 81-128).: Morgan Kaufmann.
    • (2002) Disappearing Cryptography
    • Wayner, P.1
  • 55
    • 33750902164 scopus 로고    scopus 로고
    • Lexical steganography through adaptive modulation of the word choice hash
    • Retrieved April 15, 2008, from
    • Winstein, K. (1999, January). Lexical steganography through adaptive modulation of the word choice hash. Secondary education at the Illinois Mathematics and Science Academy. Retrieved April 15, 2008, from http://alumni.imsa.edu/-keithw/tlex/lsteg.ps
    • (1999) Secondary Education at the Illinois Mathematics and Science Academy
    • Winstein, K.1
  • 56
    • 85023934644 scopus 로고    scopus 로고
    • Lexical steganography. Retrieved August 3, 2008, from
    • Winstein, K. (Lexical steganography. Retrieved August 3, 2008, from http://alumni.imsa.edu/-keithw/tlex
    • Winstein, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.