메뉴 건너뛰기




Volumn , Issue , 2003, Pages 21-25

Information hiding using steganography

Author keywords

Computer science; Copyright protection; Cryptography; Data security; Fingerprint recognition; Information security; Publishing; Steganography; Watermarking; Writing

Indexed keywords

COMPUTER SCIENCE; CRYPTOGRAPHY; DIGITAL STORAGE; DIGITAL WATERMARKING; MESSAGE PASSING; PATTERN RECOGNITION; PUBLISHING; SECURITY OF DATA; STEGANOGRAPHY; TECHNICAL WRITING;

EID: 84942411709     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NCTT.2003.1188294     Document Type: Conference Paper
Times cited : (111)

References (23)
  • 3
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • C. Cachin, "An Information-Theoretic Model for Steganography", in proceeding 2nd Information Hiding Workshop, vol. 1525, pp. 306-318, 1998
    • (1998) Proceeding 2nd Information Hiding Workshop , vol.1525 , pp. 306-318
    • Cachin, C.1
  • 5
    • 84957728214 scopus 로고    scopus 로고
    • Staganalysis: The investigation of hiding information
    • N.F. Johnson, S. Jajodia, "Staganalysis: The Investigation of Hiding Information", IEEE, pp. 113-116, 1998.
    • (1998) IEEE , pp. 113-116
    • Johnson, N.F.1    Jajodia, S.2
  • 6
    • 0035330787 scopus 로고    scopus 로고
    • Digital steganography: Hiding data within data
    • May-Jun
    • D. Artz, "Digital Steganography: Hiding Data within Data", IEEE Internet Computing, pp. 75-80, May-Jun 2001.
    • (2001) IEEE Internet Computing , pp. 75-80
    • Artz, D.1
  • 8
    • 84861714704 scopus 로고    scopus 로고
    • Steganography: Hidden menace or hidden saviour
    • 10 May
    • R A Isbell, "Steganography: Hidden Menace or Hidden Saviour", Steganography White Paper, 10 May 2002.
    • (2002) Steganography White Paper
    • Isbell, R.A.1
  • 10
    • 4243302256 scopus 로고    scopus 로고
    • Probabilistic methods for improving information hiding
    • January 31
    • N. Provos, "Probabilistic Methods for Improving Information Hiding", CITI Technical Report 01-1, January 31, 2001.
    • (2001) CITI Technical Report 01-1
    • Provos, N.1
  • 15
    • 84904224992 scopus 로고    scopus 로고
    • Steganalysis of images created using current steganography software
    • Portland Oregon, USA, April
    • N.F. Johnson & S. Jajodia, "Steganalysis of Images Created Using Current Steganography Software", in Proceeding for the Second Information Hiding Workhop, Portland Oregon, USA, April 1998, pp. 273-289.
    • (1998) Proceeding for the Second Information Hiding Workhop , pp. 273-289
    • Johnson, N.F.1    Jajodia, S.2
  • 16
    • 0031996445 scopus 로고    scopus 로고
    • Exploring steganography: Seeing the unseen
    • N.F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen", IEEE, pp. 26-34, 1998.
    • (1998) IEEE , pp. 26-34
    • Johnson, N.F.1    Jajodia, S.2
  • 21
    • 0033906136 scopus 로고    scopus 로고
    • Data hiding via steganographic image transformation
    • February
    • S. Tanako, K. Tanaka and T. Sugimura, "Data Hiding via Steganographic Image Transformation", IEICE Trans. Fundamentals, vol. E83-A, pp. 311-319, February, 2000
    • (2000) IEICE Trans. Fundamentals , vol.E83A , pp. 311-319
    • Tanako, S.1    Tanaka, K.2    Sugimura, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.