메뉴 건너뛰기




Volumn 6, Issue 2-3, 2011, Pages 153-173

Edustega: An education-centric steganography methodology

Author keywords

Information security; Linguistic steganograpy; Steganography

Indexed keywords

LINGUISTICS; SECURITY OF DATA;

EID: 84857177856     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2011.043653     Document Type: Article
Times cited : (13)

References (77)
  • 4
    • 35248834521 scopus 로고    scopus 로고
    • Natural language watermarking and tamperproofing
    • Lecture Notes in Computer Science October
    • Atallah, M.J. et al. (2002) 'Natural language watermarking and tamperproofing', Proceedings of the 5th International Workshop on Information Hiding, Lecture Notes in Computer Science, Vol. 2578, October, pp.196-212.
    • (2002) Proceedings of the 5th International Workshop on Information Hiding , vol.2578 , pp. 196-212
    • Atallah, M.J.1
  • 5
    • 0030384775 scopus 로고    scopus 로고
    • Techniques for data hiding
    • Bender, W. et al. (1996) 'Techniques for data hiding', IBM Systems J., Vol. 35, Nos. 3-4, pp.313-336.
    • (1996) IBM Systems J. , vol.35 , Issue.3-4 , pp. 313-336
    • Bender, W.1
  • 6
    • 33947624454 scopus 로고    scopus 로고
    • Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text
    • Bennett, K. (2004) Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text, Technical Report CERIAS Tech. Report 2004-13, Purdue University.
    • (2004) Technical Report CERIAS Tech. Report 2004-13, Purdue University
    • Bennett, K.1
  • 7
    • 84857171129 scopus 로고    scopus 로고
    • Towards linguistic steganography: A systematic investigation of approaches, systems, and issues
    • Austria, April 2004 Accessed on 18 September, 2008
    • Bergmair, R. (2008) Towards Linguistic Steganography: A Systematic Investigation of Approaches, Systems, and Issues, Technical Report, The University of Derby, Austria, April 2004. Available: http://richard.bergmair.eu/ pub/towlingsteg-rep-inoff-b5.pdf, Accessed on 18 September, 2008.
    • (2008) Technical Report, the University of Derby
    • Bergmair, R.1
  • 9
    • 38049146625 scopus 로고    scopus 로고
    • Content-aware steganography: About lazy prisoners and narrow-minded wardens
    • Lecture Notes in Computer Science September
    • Bergmair, R. and Katzenbeisser, S. (2007) 'Content-aware steganography: about lazy prisoners and narrow-minded wardens', Proceedings of the 8th Information Hiding Workshop, Lecture Notes in Computer Science, Vol. 4437, September, pp.109-123.
    • (2007) Proceedings of the 8th Information Hiding Workshop , vol.4437 , pp. 109-123
    • Bergmair, R.1    Katzenbeisser, S.2
  • 14
    • 0005013984 scopus 로고    scopus 로고
    • Hiding the Hidden: A software system for concealing ciphertext as innocuous text
    • Chapman, M. and Davida, G. (1997) 'Hiding the hidden: a software system for concealing ciphertext as innocuous text', Proceedings of the International Conference on Information and Communications Security, Vol. 1334 of Lecture Notes in Computer Science, Springer, Beijing, PR China, November, pp.335-345. (Pubitemid 127148061)
    • (1997) Lecture Notes in Computer Science , Issue.1334 , pp. 335-345
    • Chapman, M.1    Davida, D.2
  • 16
    • 84947255170 scopus 로고    scopus 로고
    • A practical and effective approach to large-scale automated linguistic steganography
    • Chapman, M. et al. (2001) 'A practical and effective approach to large-scale automated linguistic steganography', Proceedings of the Information Security Conference (ISC '01), Vol. 2200 of Lecture Notes in Computer Science, Springer, Malaga, Spain, pp.156-165. (Pubitemid 33354304)
    • (2001) Lecture Notes in Computer Science , Issue.2200 , pp. 156-165
    • Chapman, M.1    Davida, G.I.2    Rennhard, M.3
  • 19
    • 57849094995 scopus 로고    scopus 로고
    • Nostega: A novel noiseless steganography paradigm
    • March
    • Desoky, A. (2008) 'Nostega: a novel noiseless steganography paradigm', Journal of Digital Forensic Practice, Vol. 2, No. 3, March, pp.132-139.
    • (2008) Journal of Digital Forensic Practice , vol.2 , Issue.3 , pp. 132-139
    • Desoky, A.1
  • 21
    • 68449089444 scopus 로고    scopus 로고
    • Listega: List-based steganography methodology
    • Springer-Verlag, April
    • Desoky, A. (2009b) 'Listega: list-based steganography methodology', International Journal of Information Security, Springer-Verlag, April.
    • (2009) International Journal of Information Security
    • Desoky, A.1
  • 22
    • 77956001264 scopus 로고    scopus 로고
    • Notestega: Notes-based steganography methodology
    • January
    • Desoky, A. (2009c) 'Notestega: notes-based steganography methodology', Information Security Journal: A Global Perspective, Vol. 18, No. 4, January, pp.178-193.
    • (2009) Information Security Journal: A Global Perspective , vol.18 , Issue.4 , pp. 178-193
    • Desoky, A.1
  • 24
    • 77955996737 scopus 로고    scopus 로고
    • Comprehensive linguistic steganography survey
    • Desoky, A. (2010b) 'Comprehensive linguistic steganography survey', Int. J. Information and Computer Security, Vol. 4, No. 2.
    • (2010) Int. J. Information and Computer Security , vol.4 , Issue.2
    • Desoky, A.1
  • 25
    • 79955787308 scopus 로고    scopus 로고
    • Matlist: Mature linguistic steganography methodology
    • June
    • Desoky, A. (2011) 'Matlist: mature linguistic steganography methodology', Security and Communication Networks, Vol. 4, No. 6, June, pp.697-718.
    • (2011) Security and Communication Networks , vol.4 , Issue.6 , pp. 697-718
    • Desoky, A.1
  • 26
    • 77955999670 scopus 로고    scopus 로고
    • Information Security Publisher/Taylor & Francis ISBN: 1439846219/ ISBN: 9781439846216 (In Process)
    • Desoky, A. (2012) Noiseless Steganography: The Key to Covert Communications, Information Security Publisher/Taylor & Francis ISBN: 1439846219/ ISBN: 9781439846216 (In Process).
    • (2012) Noiseless Steganography: The Key to Covert Communications
    • Desoky, A.1
  • 27
    • 40749156338 scopus 로고    scopus 로고
    • Graphstega: Graph steganography methodology
    • January
    • Desoky, A. and Younis, M. (2008) 'Graphstega: graph steganography methodology', Journal of Digital Forensic Practice, Vol. 2, No. 1, January, pp.27-36.
    • (2008) Journal of Digital Forensic Practice , vol.2 , Issue.1 , pp. 27-36
    • Desoky, A.1    Younis, M.2
  • 29
    • 84857175482 scopus 로고    scopus 로고
    • Free from the cover text: A human-generated natural language approach to text-based steganography
    • April
    • Grosvald, M. and Orhan Orgun, C. (2011) 'Free from the cover text: a human-generated natural language approach to text-based steganography', Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 2, April, pp.133-141.
    • (2011) Journal of Information Hiding and Multimedia Signal Processing , vol.2 , Issue.2 , pp. 133-141
    • Grosvald, M.1    Orhan Orgun, C.2
  • 30
    • 33750898917 scopus 로고    scopus 로고
    • Translation-based steganography
    • Springer-Verlag, Barcelona, Spain, June
    • Grothoff C. et al. (2005b) 'Translation-based steganography', Proceedings of Information Hiding Workshop (IH 2005), Springer-Verlag, Barcelona, Spain, June, pp.213-233.
    • (2005) Proceedings of Information Hiding Workshop (IH 2005) , pp. 213-233
    • Grothoff, C.1
  • 32
    • 84955119830 scopus 로고    scopus 로고
    • Echo hiding
    • Information Hiding
    • Gruhl, D., Lu, A. and Bender, W. (1996) 'Echo hiding', Proceedings of First International Workshop on Information Hiding, Lecture Notes in Computer Science, Vol. 1174, May, Springer, Cambridge, UK, pp.295-316. (Pubitemid 126155043)
    • (1996) Lecture Notes in Computer Science , Issue.1174 , pp. 295-316
    • Gruhl, D.1    Lu, A.2    Bender, W.3
  • 34
    • 0043244044 scopus 로고    scopus 로고
    • A bank of chemistry questions on an on-line server
    • March
    • Hoole, D. et al. (2002) 'A bank of chemistry questions on an on-line server', Journal of Science Education and Technology, Vol. 11, No. 1, March, pp.9-13.
    • (2002) Journal of Science Education and Technology , vol.11 , Issue.1 , pp. 9-13
    • Hoole, D.1
  • 36
    • 33847675252 scopus 로고    scopus 로고
    • An overview of steganography for the computer forensics examiner
    • July
    • Kessler, G.C. (2004) 'An overview of steganography for the computer forensics examiner', Forensic Science Communications, Vol. 6, No. 3, July.
    • (2004) Forensic Science Communications , vol.6 , Issue.3
    • Kessler, G.C.1
  • 37
  • 39
    • 0348015658 scopus 로고
    • The kullback-leibler distance
    • Kullback, S. (1987) 'The Kullback-Leibler distance', The American Statistician, Vol. 41, pp.340-341.
    • (1987) The American Statistician , vol.41 , pp. 340-341
    • Kullback, S.1
  • 40
    • 0001927585 scopus 로고
    • On information and sufficiency
    • doi:10.1214/aoms/1177729694. MR39968
    • Kullback, S. and Leibler, R.A. (1951) 'On information and sufficiency', The Annals of Mathematical Statistics, Vol. 22, No. 1, pp.79-86, doi:10.1214/aoms/1177729694. MR39968.
    • (1951) The Annals of Mathematical Statistics , vol.22 , Issue.1 , pp. 79-86
    • Kullback, S.1    Leibler, R.A.2
  • 41
    • 0026953429 scopus 로고
    • Random texts exhibit Zipf's-law-like word frequency distribution
    • DOI 10.1109/18.165464
    • Li, W. (1992) 'Random texts exhibit Zipf's-law-like word frequency distribution', IEEE Transactions on Information Theory, Vol. 38, No. 6, pp.1842-1845. (Pubitemid 23585898)
    • (1992) IEEE Transactions on Information Theory , vol.38 , Issue.6 , pp. 1842-1845
    • Li Wentian1
  • 44
    • 38049156072 scopus 로고    scopus 로고
    • Text information hiding with preserved meaning - Japanese text case
    • Nakagawa, H. et al. (2001) 'Text information hiding with preserved meaning - Japanese text case', Transaction of Information Processing Society of Japan, Vol. 42, No. 9, pp.2339-2350.
    • (2001) Transaction of Information Processing Society of Japan , vol.42 , Issue.9 , pp. 2339-2350
    • Nakagawa, H.1
  • 45
    • 34548235364 scopus 로고    scopus 로고
    • A framework of text-based steganography using sd-form semantics model
    • August
    • Niimi, M. et al. (2003) 'A framework of text-based steganography using sd-form semantics model', Transaction of Information Processing Society of Japan, Vol. 44, No. 8, August.
    • (2003) Transaction of Information Processing Society of Japan , vol.44 , Issue.8
    • Niimi, M.1
  • 46
    • 0032680807 scopus 로고    scopus 로고
    • Information hiding - A survey
    • July
    • Petitcolas, F.A.P. (1999) 'Information hiding - a survey', Proceedings of the IEEE, Vol. 87, No. 7, July, pp.1062-1078.
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1062-1078
    • Petitcolas, F.A.P.1
  • 49
    • 78649828992 scopus 로고    scopus 로고
    • Provably secure steganography: Achieving zero K-L divergence using statistical restoration
    • October, Atlanta, Georgia, USA
    • Solanki, K., Sullivan, K., Madhow, U., Manjunath, B.S. and Chandrasekaran, S. (2006) 'Provably secure steganography: Achieving zero K-L divergence using statistical restoration', Proceedings of ICIP, October, Atlanta, Georgia, USA.
    • (2006) Proceedings of ICIP
    • Solanki, K.1    Sullivan, K.2    Madhow, U.3    Manjunath, B.S.4    Chandrasekaran, S.5
  • 52
    • 33750907773 scopus 로고    scopus 로고
    • The hiding virtues of ambiguity: Quantifiably resilient watermarking of natural language text through synonym substitutions
    • Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06
    • Topkara, U., Topkara, M. and Atallah, M.J. (2006) 'The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions', Proceeding of the 8th workshop on Multimedia and security (MM&Sec '06), pp.164-174. (Pubitemid 44729592)
    • (2006) Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06 , vol.2006 , pp. 164-174
    • Topkara, U.1    Topkara, M.2    Atallah, M.J.3
  • 53
    • 84950895792 scopus 로고
    • Mimic functions
    • Wayner, P. (1992) 'Mimic functions', Cryptologia, Vol. XVI/3, pp.193-214.
    • (1992) Cryptologia , vol.16 , Issue.3 , pp. 193-214
    • Wayner, P.1
  • 55
    • 33750902164 scopus 로고    scopus 로고
    • Secondary education at the Illinois Mathematics and Science Academy, January Accessed on 15 April, 2008
    • Winstein, K. (1999) Lexical Steganography Through Adaptive Modulation of the Word Choice Hash, Secondary education at the Illinois Mathematics and Science Academy, January, Available: http://alumni.imsa.edu/~keithw/tlex/lsteg. ps, Accessed on 15 April, 2008.
    • (1999) Lexical Steganography Through Adaptive Modulation of the Word Choice Hash
    • Winstein, K.1
  • 56
    • 38049119925 scopus 로고    scopus 로고
    • Accessed on 03 August, 2008
    • Winstein, K. (2008) Lexical Steganography, Available: http://alumni.imsa.edu/~keithw/tlex, Accessed on 03 August, 2008.
    • (2008) Lexical Steganography
    • Winstein, K.1
  • 58
    • 84857174674 scopus 로고    scopus 로고
    • Accessed on 31 July, 2008
    • An Online Exam Generator (GRE Antonyms), Available: http://www.syvum.com/ cgi/online/serve.cgi/gre/verbal/antonyms7.tdf?0, Accessed on 31 July, 2008.
    • An Online Exam Generator (GRE Antonyms)
  • 63
    • 77952360033 scopus 로고    scopus 로고
    • Cambridge University Press Accessed on 31 July, 2008
    • Cambridge Dictionaries Online - Cambridge University Press, Available: www.dictionary.cambridge.org, Accessed on 31 July, 2008.
    • Cambridge Dictionaries Online
  • 65
    • 84857171134 scopus 로고    scopus 로고
    • Accessed on 27 July, 2008
    • Exam Pro Software, Available: http://www.exam-software.com, Accessed on 27 July, 2008.
    • Exam pro Software
  • 66
    • 84857185017 scopus 로고    scopus 로고
    • Accessed on 30 July, 2008
    • GRE Analogies, Available: http://greanalogies.blogspot.com/2008/04/ analogies-91-95.html, Accessed on 30 July, 2008.
  • 67
    • 84857186780 scopus 로고    scopus 로고
    • Accessed on 31 July, 2008
    • GRE Sentence Completions, Available: http://www.greguide.com/verbal.html, Accessed on 31 July, 2008.
    • GRE Sentence Completions
  • 68
    • 67649519841 scopus 로고    scopus 로고
    • Accessed on 31 July, 2008
    • Microsoft Word 97, Available: http://www.microsoft.com/en/us/default. aspx, Accessed on 31 July, 2008.
    • Microsoft Word 97
  • 69
    • 84857171133 scopus 로고    scopus 로고
    • Accessed on 31 July, 2008
    • Online Dictionary Net, Available: www.online-dictionary.net, Accessed on 31 July, 2008.
    • Online Dictionary Net
  • 71
    • 84857174675 scopus 로고    scopus 로고
    • Accessed on 31 July, 2007
    • Spam Mimic, Available: http://www.spammimic.com, Accessed on 31 July, 2007.
  • 72
    • 84857174676 scopus 로고    scopus 로고
    • Accessed on 27 July, 2008
    • Testgenerator, Available: http://www.testshop.com/content.php?id=63, Accessed on 27 July, 2008.
  • 73
    • 84857186783 scopus 로고    scopus 로고
    • Accessed on 27 July 2008
    • TV show Who Wants to Be a Millionaire, Available: http://en.wikipedia. org/wiki/Who-Wants-To-Be-A-Millionaire%3F, Accessed on 27 July 2008.
    • TV Show Who Wants to be a Millionaire


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.