메뉴 건너뛰기




Volumn , Issue , 2002, Pages

Detecting Steganographic Content on the Internet

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; NETWORK SECURITY; NEWSPRINT; STEGANOGRAPHY;

EID: 84860464383     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (63)

References (20)
  • 2
    • 0035333687 scopus 로고    scopus 로고
    • Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding
    • May
    • Brian Chen and Gregory W. Wornell. Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Transactions on Information Theory, 47(4): 1423-1443, May 2001.
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, Brian1    Wornell, Gregory W.2
  • 3
    • 0004064292 scopus 로고    scopus 로고
    • Technical Report TR2001-412, Depar-ment of Computer Science, Dartmouth College, August
    • Hany Farid. Detecting Steganographic Messages in Digital Images. Technical Report TR2001-412, Depar-ment of Computer Science, Dartmouth College, August 2001.
    • (2001) Detecting Steganographic Messages in Digital Images
    • Farid, Hany1
  • 6
    • 0031996445 scopus 로고    scopus 로고
    • Exploring steganography: Seeing the unseen
    • February
    • F. Johnson and S. Jajodia. Exploring steganography: Seeing the unseen. IEEE Computer Magazine, 31(2):26-34, February 1998.
    • (1998) IEEE Computer Magazine , vol.31 , Issue.2 , pp. 26-34
    • Johnson, F.1    Jajodia, S.2
  • 7
    • 84867695896 scopus 로고    scopus 로고
    • Terror groups hide behind Web encryption
    • USA Today, Feburary
    • Jack Kelley. Terror groups hide behind Web encryption. USA Today, Feburary 2001. http://www.usatoday.com/life/cyber/tech/ 2001-02-05-binladen.htm.
    • (2001)
    • Kelley, Jack1
  • 9
    • 0040231044 scopus 로고
    • Foiling the Cracker: A Survey of, and Improvements to, Password Security
    • August
    • Daniel Klein. Foiling the Cracker: A Survey of, and Improvements to, Password Security. In Proceedings of the 2nd USENIX Security Workshop, pages 5-14, August 1990.
    • (1990) Proceedings of the 2nd USENIX Security Workshop , pp. 5-14
    • Klein, Daniel1
  • 10
    • 0026762153 scopus 로고
    • A Universal Statistical Test for Random Bit Generators
    • Ueli M. Maurer. A Universal Statistical Test for Random Bit Generators. Journal of Cryptology, 5(2):89-105, 1992.
    • (1992) Journal of Cryptology , vol.5 , Issue.2 , pp. 89-105
    • Maurer, Ueli M.1
  • 11
    • 79955590156 scopus 로고    scopus 로고
    • Secret Messages Come in .Wavs
    • February
    • Declan McCullagh. Secret Messages Come in .Wavs. Wired News, February 2001. http://www.wired.com/ news/politics/0,1283,41861,00.html.
    • (2001) Wired News
    • McCullagh, Declan1
  • 16
    • 0001254670 scopus 로고
    • Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)
    • Springer-Verlag, December
    • Bruce Schneier. Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish). In Fast Software Encryption, Cambridge Security Workshop Proceedings, pages 191-204. Springer-Verlag, December 1993.
    • (1993) Fast Software Encryption, Cambridge Security Workshop Proceedings , pp. 191-204
    • Schneier, Bruce1
  • 19
    • 0026142897 scopus 로고
    • The JPEG Still Picture Compression Standard
    • April
    • G. W. Wallace. The JPEG Still Picture Compression Standard. Communications of the ACM, 34(4):30-44, April 1991.
    • (1991) Communications of the ACM , vol.34 , Issue.4 , pp. 30-44
    • Wallace, G. W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.