Uneingeschränkter Zugang

STEGANOGRAPHIC FILE SYSTEM BASED ON JPEG FILES


Zitieren

[1] JÓKAY, M.- MORAVČÍK, T,: Image-based JPEG steganography, Tatra Mt. Math. Publ. 45 (2010), 65-74.Search in Google Scholar

[2] ANDERSON, R.-NEEDHAM, R.-SHAMIR, A.: The steganographic file system, in: Information Hiding, Second InternationalWorkshop, IH’ 98, Portland, Oregon, USA, April 15-17 (Aucsmith, D. ed.), LNCS Vol. 1525, Springer-Verlag, 1998, pp. 73-82.Search in Google Scholar

[3] MCDONALD, A. D.-KUHN, M. G.: StegFs: A steganographic file system for Linux, (A. Pfitzmann ed.), in: LNCS Vol. 1768, Springer-Verlag Berlin, 2000, pp. 463-477.Search in Google Scholar

[4] BERTONI, G.-DAEMEN, J.-PEETERS, M.-VAN ASSCHE, G.: The Keccak reference, NIST SHA-3, 2011 (submission).Search in Google Scholar

[5] TUNG HOANG, V.-ROGAWAY, P.: On generalized Feistel networks, in: Proceedings of the 30-th annual conference on Advances in cryptology (CRYPTO’10), (Tal Rabin, ed.) Springer-Verlag, Berlin, Heidelberg, 2010, pp. 613-630.10.1007/978-3-642-14623-7_33Search in Google Scholar

[6] BATEMAN, P.: Image Steganography and Steganalysis, Diploma thesis, Faculty of Engineering and Physical Sciences, University of Surrey, Guildford, 2008.Search in Google Scholar

[7] WESTFELD, A.: F5-a Steganographic Algorithm: High Capacity Despite Better Steganalysis, in: 4-th International Workshop on Information Hiding, 2001.10.1007/3-540-45496-9_21Search in Google Scholar

[8] NAG, A.-SINGH, J. P.-KHAN, S.-GHOSH, S.-BISWAS, S.-SARKAR, D.- SARKAR, P. P: A Weighted Location Based LSB Image Steganography Technique, in: Advances in Computing and Communications, ACC 2011 Conference Communications in Computer and Information Science, Vol. 191, Springer-Verlag, Berlin, 2011, pp. 620-627.10.1007/978-3-642-22714-1_64Search in Google Scholar

[9] GROˇ SEK, O.-VOJVODA, M.-ZAJAC, P.: Classical Ciphers, Faculty of Electrical Engineering and Information Technology, Slovak University of Technology, Bratislava, 2007.Search in Google Scholar

[10] CHANG, K.: Knowledge file system in: A Principled Approach to Personal Information Management, 2010, IEEE International Conference on Data Mining Workshops, 2010.10.1109/ICDMW.2010.119Search in Google Scholar

[11] KATZENBEISSER, S.: Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Publishers, London, 1999.Search in Google Scholar

[12] FREE SOFTWARE FOUNDATION, INC.: The GNU C Library Manual: File Times, 2013, http://www.gnu.org/software/libc/manual/html_node/File-Times.html.Search in Google Scholar

[13] OLIBONI, C.: OpenPuff, http://embeddedsw.net/OpenPuff_Steganography_Home.html.Search in Google Scholar

[14] PAUL, H.-UPHAM, D.: JSteg, http://zooid.org/~paul/crypto/jsteg.Search in Google Scholar

[15] HETZL, S.: StegHide, http://steghide.sourceforge.net.Search in Google Scholar

[16] LATHAM, A.: JP Hide & JP Seek, http://linux01.gwdg.de/~alatham/stego.html.Search in Google Scholar

[17] PROVOS, N.: OutGuess, http://www.outguess.org.Search in Google Scholar

[18] ZHANG,W.-ZHANG, X.-WANG, S.: Maximizing steganographic embedding efficiency by combining Hamming Codes and Wet Paper Codes, in: Information Hiding, 10th International Workshop, 2008, pp. 60-71.10.1007/978-3-540-88961-8_5Search in Google Scholar

[19] CHANDRAMOULI, R.-KHARAZZI, M.-MEMON, N.: Image steganography and steganalysis: Concepts and practice, in: International Workshop on Digital Watermarking, 2003, (T. Kalker et al. eds.) LNCS Vol. 2939, Springer-Verlag, Berlin, 2004, pp. 35-49.Search in Google Scholar

[20] ZAJAC, P.: Remarks on the NFS complexity, Tatra Mt. Math. Publ. 41 (2008), 79-91. Search in Google Scholar

ISSN:
1210-3195
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
3 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Mathematik, Allgemeines