메뉴 건너뛰기




Volumn 2, Issue 2, 2011, Pages 133-141

Free from the cover text: A human-generated natural language approach to text-based steganography

Author keywords

Lexical; Steganography; Text based

Indexed keywords

AUTOMATED ALGORITHMS; ENCRYPTION PROCEDURE; HIDDEN MESSAGES; LEXICAL; NATURAL LANGUAGES; TEXT-BASED;

EID: 84857175482     PISSN: 20734212     EISSN: 20734239     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (19)

References (18)
  • 1
    • 21844458120 scopus 로고    scopus 로고
    • Towards linguistic steganography: A systematic investigation of approaches, systems, and issues
    • University of Derby, August
    • Bergmair, R. 2004. Towards linguistic steganography: A systematic investigation of approaches, systems, and issues. Tech. rep., University of Derby, August 2004.
    • (2004) Tech. Rep , pp. 2004
    • Bergmair, R.1
  • 5
    • 84947255170 scopus 로고    scopus 로고
    • A practical and effective approach to large-scale automated linguistic steganography
    • Malaga, Spain
    • Chapman, M. et al., 2001. A practical and effective approach to large-scale automated linguistic steganography. Proceedings of the information security conference (ISC 01), Malaga, Spain, 156-165.
    • (2001) Proceedings of the Information Security Conference (ISC 01) , pp. 156-165
    • Chapman, M.1
  • 11
    • 77956001264 scopus 로고    scopus 로고
    • Notestega: Notes-Based Steganography Methodology
    • A. Desoky, Notestega: Notes-Based Steganography Methodology, Information Security Journal: A Global Perspective, Vol. 18, No 4, pp. 178-193, January 2009.
    • (2009) Information Security Journal: A Global Perspective , vol.18 , Issue.4 , pp. 178-193
    • Desoky, A.1
  • 13
    • 33746582127 scopus 로고    scopus 로고
    • Technical Report CSD, TR no. 05-009, Purdue University. (CERIAS Tech Report 2005-39)
    • C. Grothoff, et al. 2005. Translation-based steganography, Technical Report CSD, TR no. 05-009, Purdue University. (CERIAS Tech Report 2005-39)
    • (2005) Translation-based Steganography
    • Grothoff, C.1
  • 14
    • 84898233456 scopus 로고    scopus 로고
    • M. Gupta and R. Sharman (Eds.), Handbook of Research on Social and Organizational Liabilities in Information Security, 380-397. New York: IGI Global. doi: 10.4018/978-1-60566-132-2
    • Orgun, C. O. and V. Chand. 2009. The Human Attack in Linguistic Steganography. M. Gupta and R. Sharman (Eds.), Handbook of Research on Social and Organizational Liabilities in Information Security, 380-397. New York: IGI Global. doi: 10.4018/978-1-60566-132-2.
    • (2009) The Human Attack In Linguistic Steganography
    • Orgun, C.O.1    Chand, V.2
  • 17
    • 34548292448 scopus 로고    scopus 로고
    • Information hiding through errors: A confusing approach
    • Steganography,and Watermarking of Multimedia Contents, January
    • Topkara, Mercan, Umut Topkara and Mikhail J. Atallah. 2007. Information hiding through errors: A confusing approach, Proceedings of the SPIE International Conference on Security, Steganography,and Watermarking of Multimedia Contents, January 2007.
    • (2007) Proceedings of the SPIE International Conference On Security , pp. 2007
    • Topkara, M.1    Topkara, U.2    Atallah, M.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.