메뉴 건너뛰기




Volumn 10, Issue 1, 2006, Pages 33-43

Undercover communication using image and text as disguise and countermeasures

Author keywords

covert communication; information hiding; security; steganalysis; steganography

Indexed keywords


EID: 84867951498     PISSN: 10076417     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11741-006-0102-x     Document Type: Review
Times cited : (1)

References (35)
  • 1
    • 0030384775 scopus 로고    scopus 로고
    • Techniques for data hiding[J]
    • 10.1147/sj.353.0313
    • W Bender D Gruhl N Morimoto, et al. 1996 Techniques for data hiding[J] IBM System Journal 35 3, 4 313 336 10.1147/sj.353.0313
    • (1996) IBM System Journal , vol.35 , Issue.3-4 , pp. 313-336
    • Bender, W.1    Gruhl, D.2    Morimoto, N.3
  • 2
    • 84947943261 scopus 로고    scopus 로고
    • Protecting digital media content [J]
    • 10.1145/278476.278485
    • N Memon P W Wong 1998 Protecting digital media content [J] Communications of the ACM 41 7 34 43 10.1145/278476.278485
    • (1998) Communications of the ACM , vol.41 , Issue.7 , pp. 34-43
    • Memon, N.1    Wong, P.W.2
  • 3
    • 0031996445 scopus 로고    scopus 로고
    • Exploring steganography: Seeing the unseen[j]
    • N F Johnson S Jajodia 1998 Exploring steganography: seeing the unseen[j] IEEE Computer 31 2 26 34
    • (1998) IEEE Computer , vol.31 , Issue.2 , pp. 26-34
    • Johnson, N.F.1    Jajodia, S.2
  • 4
    • 3042742327 scopus 로고    scopus 로고
    • Hide and seek: An introduction to steganography [J]
    • 10.1109/MSECP.2003.1203220
    • N Provos P Honeyman 2003 Hide and seek: an introduction to steganography [J] IEEE Security and Privacy 1 3 32 44 10.1109/MSECP.2003.1203220
    • (2003) IEEE Security and Privacy , vol.1 , Issue.3 , pp. 32-44
    • Provos, N.1    Honeyman, P.2
  • 6
    • 11844252006 scopus 로고    scopus 로고
    • Cyber warfare: Steganography vs. steganalysis[J]
    • 10.1145/1022594.1022597
    • H Wang S. Wang 2004 Cyber warfare: steganography vs. steganalysis[J] Communication of the ACM 47 10 76 82 10.1145/1022594.1022597
    • (2004) Communication of the ACM , vol.47 , Issue.10 , pp. 76-82
    • Wang, H.1    Wang, S.2
  • 7
    • 0036168261 scopus 로고    scopus 로고
    • What infoSec professionals should know about information warfare tactics by terrorists[J]
    • G L Kovacich A Jones 2002 What infoSec professionals should know about information warfare tactics by terrorists[J] Computers and Security 21 1,2 35 41
    • (2002) Computers and Security , vol.21 , Issue.1-2 , pp. 35-41
    • Kovacich, G.L.1    Jones, A.2
  • 11
    • 47849102609 scopus 로고    scopus 로고
    • Steganalysis against LSB insertion using statistical method [J]
    • (in Chinese)
    • X Zhang S Wang K Zhang 2004 Steganalysis against LSB insertion using statistical method [J] Journal of Applied Sciences 22 1 16 19 (in Chinese)
    • (2004) Journal of Applied Sciences , vol.22 , Issue.1 , pp. 16-19
    • Zhang, X.1    Wang, S.2    Zhang, K.3
  • 12
    • 34248328309 scopus 로고    scopus 로고
    • A novel LSB steganography scheme against statistical analysis [J]
    • (in Chinese)
    • X Zhang S Wang K Zhang 2003 A novel LSB steganography scheme against statistical analysis [J] Journal of Image and Graphics 8 9 1055 1060 (in Chinese)
    • (2003) Journal of Image and Graphics , vol.8 , Issue.9 , pp. 1055-1060
    • Zhang, X.1    Wang, S.2    Zhang, K.3
  • 13
    • 20444404178 scopus 로고    scopus 로고
    • Steganalysis of LSB matching in grayscale images[J]
    • 10.1109/LSP.2005.847889
    • A D Ker 2005 Steganalysis of LSB matching in grayscale images[J] IEEE Signal Processing Letters 12 6 441 444 10.1109/LSP.2005.847889
    • (2005) IEEE Signal Processing Letters , vol.12 , Issue.6 , pp. 441-444
    • Ker, A.D.1
  • 14
    • 0242576328 scopus 로고    scopus 로고
    • Higher-order statistical steganalysis of palette images[A]
    • 10.1117/12.476813
    • J Harmsen W Pearlman 2003 Higher-order statistical steganalysis of palette images[A] Proceedings of SPIE[C] 5 020 131 142 10.1117/12.476813
    • (2003) Proceedings of SPIE[C] , vol.5020 , pp. 131-142
    • Harmsen, J.1    Pearlman, W.2
  • 16
    • 11444265136 scopus 로고    scopus 로고
    • Steganographic technique capable of withstanding RQP analysis [J]
    • 10.1007/s11741-002-0049-5
    • S Wang X Zhang K Zhang 2002 Steganographic technique capable of withstanding RQP analysis [J] Journal of Shanghai University (English Edition) 6 4 273 277 10.1007/s11741-002-0049-5
    • (2002) Journal of Shanghai University (English Edition) , vol.6 , Issue.4 , pp. 273-277
    • Wang, S.1    Zhang, X.2    Zhang, K.3
  • 17
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis[A]
    • Washington D C
    • Provos N. Defending against statistical steganalysis[A]. Proc. of 10th USENIX Security Symposium [C]. Washington D C, 2001, 323-335.
    • (2001) Proc. of 10th USENIX Security Symposium [C] , pp. 323-335
    • Provos, N.1
  • 19
    • 0037410595 scopus 로고    scopus 로고
    • A steganographic method for images by pixel-value differencing[J]
    • 1048.68040 10.1016/S0167-8655(02)00402-6
    • D C Wu W H Tsai 2003 A steganographic method for images by pixel-value differencing[J] Pattern Recognition Letters 24 1613 1626 1048.68040 10.1016/S0167-8655(02)00402-6
    • (2003) Pattern Recognition Letters , vol.24 , pp. 1613-1626
    • Wu, D.C.1    Tsai, W.H.2
  • 20
    • 0347355319 scopus 로고    scopus 로고
    • Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security [J]
    • 10.1016/j.patrec.2003.10.014
    • X Zhang S Wang 2004 Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security [J] Pattern Recognition Letters 25 331 339 10.1016/j.patrec.2003.10.014
    • (2004) Pattern Recognition Letters , vol.25 , pp. 331-339
    • Zhang, X.1    Wang, S.2
  • 21
    • 4544351078 scopus 로고    scopus 로고
    • A steganographic method for digital images using side match[J]
    • 10.1016/j.patrec.2004.05.006
    • C C Chang H W Tseng 2004 A steganographic method for digital images using side match[J] Pattern Recognition Letters 25 1431 1437 10.1016/j.patrec.2004. 05.006
    • (2004) Pattern Recognition Letters , vol.25 , pp. 1431-1437
    • Chang, C.C.1    Tseng, H.W.2
  • 23
    • 84940448623 scopus 로고    scopus 로고
    • Secure steganographic methods for palette images[J]
    • 10.1007/10719724-4
    • J Fridrich D Rui 2000 Secure steganographic methods for palette images[J] Lecture Notes in Computer Science 1768 47 60 10.1007/10719724-4
    • (2000) Lecture Notes in Computer Science , vol.1768 , pp. 47-60
    • Fridrich, J.1    Rui, D.2
  • 24
    • 11444249168 scopus 로고    scopus 로고
    • Detection of OPA stego-data and secure steganography in palette images[J]
    • (in Chinese)
    • X Zhang S Wang 2004 Detection of OPA stego-data and secure steganography in palette images[J] Acta Electronica Sinica 32 10 1702 1705 (in Chinese)
    • (2004) Acta Electronica Sinica , vol.32 , Issue.10 , pp. 1702-1705
    • Zhang, X.1    Wang, S.2
  • 25
    • 0035766166 scopus 로고    scopus 로고
    • Steganalysis based on JPEG compatibility [A]
    • 10.1117/12.448213
    • J Fridrich M Goljan R Du 2001 Steganalysis based on JPEG compatibility [A] Proceedings of SPIE[C] 4518 275 280 10.1117/12.448213
    • (2001) Proceedings of SPIE[C] , vol.4518 , pp. 275-280
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 29
    • 84868000045 scopus 로고    scopus 로고
    • Lossless data hiding in JPEG images [J]
    • (in Chinese)
    • X Zhang S Wang 2003 Lossless data hiding in JPEG images [J] Journal of Image and Graphics 8 563 566 (in Chinese)
    • (2003) Journal of Image and Graphics , vol.8 , pp. 563-566
    • Zhang, X.1    Wang, S.2
  • 30
    • 0036959092 scopus 로고    scopus 로고
    • Application of bit-plane decomposition steganography to JPEG 2000 encoded images [J]
    • 10.1109/LSP.2002.806056
    • N Noda J Spaulding M N Shirazi, et al. 2002 Application of bit-plane decomposition steganography to JPEG 2000 encoded images [J] IEEE Signal Processing Letters 9 410 413 10.1109/LSP.2002.806056
    • (2002) IEEE Signal Processing Letters , vol.9 , pp. 410-413
    • Noda, N.1    Spaulding, J.2    Shirazi, M.N.3
  • 31
    • 11844253853 scopus 로고    scopus 로고
    • Steganography using multiple-base notational system and human vision sensitivity [J]
    • 10.1109/LSP.2004.838214
    • X Zhang S Wang 2005 Steganography using multiple-base notational system and human vision sensitivity [J] IEEE Signal Processing Letters 12 1 67 70 10.1109/LSP.2004.838214
    • (2005) IEEE Signal Processing Letters , vol.12 , Issue.1 , pp. 67-70
    • Zhang, X.1    Wang, S.2
  • 33
    • 0032069581 scopus 로고    scopus 로고
    • Performance comparison of two text marking method [J]
    • 10.1109/49.668978
    • N F Maxemchuk S H Low 1998 Performance comparison of two text marking method [J] IEEE Journal Selected Areas of Communications 16 4 561 572 10.1109/49.668978
    • (1998) IEEE Journal Selected Areas of Communications , vol.16 , Issue.4 , pp. 561-572
    • Maxemchuk, N.F.1    Low, S.H.2
  • 34
    • 33745294586 scopus 로고    scopus 로고
    • Method of hiding information in agglutinative language documents using adjustment to new line positions[J]
    • Q Takizawa O Takizawa K Makino, et al. 2005 Method of hiding information in agglutinative language documents using adjustment to new line positions[J] LNCS/LNAI 3683 1039 1048
    • (2005) LNCS/LNAI , vol.3683 , pp. 1039-1048
    • Takizawa, Q.1    Takizawa, O.2    Makino, K.3
  • 35
    • 84867988550 scopus 로고    scopus 로고
    • Data hiding in text file using TeX and fxtraction of hidden data from document image [J]
    • (to appear, in Chinese)
    • Chen C, Wang S, Zhang X. Data hiding in text file using TeX and fxtraction of hidden data from document image [J]. Journal of Applied Sciences (to appear, in Chinese).
    • Journal of Applied Sciences
    • Chen, C.1    Wang, S.2    Zhang, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.