메뉴 건너뛰기




Volumn , Issue , 2011, Pages 259-265

Thwarting audio steganography attacks in cloud storage systems

Author keywords

cloud storage; security; steganography

Indexed keywords

AUDIO QUALITY; AUDIO STEGANOGRAPHY; SECURITY; SECURITY THREATS; SENSITIVE DATAS; STORAGE SERVICES; STORAGE SYSTEMS;

EID: 84863177084     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSC.2011.6138530     Document Type: Conference Paper
Times cited : (11)

References (15)
  • 1
    • 84863139285 scopus 로고    scopus 로고
    • Internet, August Available: September 2011
    • Wikipedia Encyclopedia, "Cloud storage," Internet, August 2011, Available: http://en.wikipedia.org/wiki/Cloud-storage. September 2011
    • (2011) Cloud Storage
  • 2
    • 84899075019 scopus 로고    scopus 로고
    • Internet, Available: September
    • J. Strickland, "How Cloud Storage Works," Internet, Available: http://computer.howstuffworks.com/cloud-computing/cloud-storage.htm. September 2011
    • (2011) How Cloud Storage Works
    • Strickland, J.1
  • 3
    • 84863156280 scopus 로고    scopus 로고
    • Understanding Security in Cloud Storage
    • NASUAI
    • NASUAI, "Understanding Security in Cloud Storage", A NASUNI WHITE PAPER, 2010
    • (2010) A Nasuni White Paper
  • 5
    • 84863121797 scopus 로고    scopus 로고
    • Internet, October Available: September
    • Black Hat Team, "[GET] Amazon S3 Ripper," Internet, October 2009, Available: http://www.blackhatteam.com/f51/get-amazon-s3-ripper-9770.html, September 2011
    • (2009) [GET] Amazon S3 Ripper
  • 6
    • 84863121796 scopus 로고    scopus 로고
    • Internet, Available: September
    • NASUAI, "Storage Services Overview," Internet, Available: http://www.nasuni.com/product/product-overview/, September 2011
    • (2011) Storage Services Overview
  • 9
    • 8844280060 scopus 로고    scopus 로고
    • Quantitative evaluation of pairs and RS steganalysis
    • Andrew D. Ker, "Quantitative evaluation of pairs and RS steganalysis,"Proceedings of the SPIE, Volume 5306, pp. 83-97, 2004
    • (2004) Proceedings of the SPIE , vol.5306 , pp. 83-97
    • Ker, A.D.1
  • 10
    • 76649132033 scopus 로고    scopus 로고
    • Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
    • Hindawi
    • Mustafa Ulutas, Vasif V. Nabiyev, and Guzin Ulutas, "Improvements in Geometry-Based Secret Image Sharing Approach with Steganography, "Mathematical Problems in Engineering, Hindawi, 2009
    • (2009) Mathematical Problems in Engineering
    • Ulutas, M.1    Nabiyev, V.V.2    Ulutas, G.3
  • 11
    • 77958025578 scopus 로고    scopus 로고
    • Application of T-code, turbo codes and pseudo-random sequence for steganography
    • Anil Kumar, and Navin Rajpal, "Application of T-code, turbo codes and pseudo-random sequence for steganography," Joumal of Computer Science, pp.148-153, 2006
    • (2006) Joumal of Computer Science , pp. 148-153
    • Kumar, A.1    Rajpal, N.2
  • 13
    • 80455178199 scopus 로고    scopus 로고
    • Statistics detection algorithm based on audio lsb steganography
    • G. T. Juan You, "Statistics detection algorithm based on audio lsb steganography," Computer Engineering of CHINA, vol. 35(24), pp. 176-177, 2009
    • (2009) Computer Engineering of CHINA , vol.35 , Issue.24 , pp. 176-177
    • Juan You, G.T.1
  • 14
    • 84863156283 scopus 로고    scopus 로고
    • Internet, Available: September
    • EmbeddedSw, "OpenPuff Yet not another steganography SW," Internet, Available: http://embeddedsw.net/OpenPuff-Steganography-Home.html, September 2011
    • (2011) OpenPuff Yet Not Another Steganography SW


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.