Cite

[1] I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich and T. Kalker, Digital Watermarking and Steganography, 2nd ed. Burlington: Morgan Kaufmann, 2008, 624 p.10.1016/B978-012372585-1.50015-2Search in Google Scholar

[2] C. Everett, “Should encryption software be banned?” Network Security, vol. 2016, iss. 8, pp. 14–17, Aug. 2016. https://doi.org/10.1016/S1353-4858(16)30078-210.1016/S1353-4858(16)30078-2Search in Google Scholar

[3] P. Mozur, The New York Times. New Rules in Chine Upset Western Tech Companies. 2015. [Online]. Available: http://www.nytimes.com/2015/01/29/technology/in-china-new-cybersecurity-rules-perturb-western-tech-companies.html [Accessed: Oct. 9, 2016].Search in Google Scholar

[4] I. Sommerville, Software Engineering, 10th ed. USA: Pearson, 2015, 816 p.Search in Google Scholar

[5] IEEE Recommended Practice for Software Requirements Specifications, IEEE Std 830-1998, 1998. https://doi.org/10.1109/IEEESTD.1998.8828610.1109/IEEESTD.1998.88286Search in Google Scholar

[6] MITRE. (2016) Develop System-Level Technical Requirements. [Online]. Available: https://www.mitre.org/publications/systems-engineering-guide/se-lifecycle-building-blocks/system-design-and-development/develop-systemlevel-technical-requirements [Accessed: Oct. 8, 2016].Search in Google Scholar

[7] G. Konahovich and A. Puzirenko, Digital Steganography, Theory and Practise - Компьютерная стеганография, теория и практика. Kiev: MK-Press, 2006, 286 p. (in Russian).Search in Google Scholar

[8] N. Hamid, A. Yahya, R. B. Ahmad and O. M. AI-Qershi, “Image Steganography Techniques: An Overview,” International Journal of Computer Science and Security (IJCSS), vol. 6, no. 3, pp. 168–187, June 2012.Search in Google Scholar

[9] A. H. Lashkari, A. A. Manaf and M. Masrom, Magic Hexagon Image Steganography Evaluator. [Online]. Available: http://www.academia.edu/1014807/Magic_Hexagon_Image_Steganography_Evaluator [Accessed: Oct. 8, 2016]Search in Google Scholar

[10] V. Gribunin, I. Okov and I. Turincev, Digital Steganography, Aspects of Protection - Цифровая стеганография, аспекты защиты. Moscow: Solon-press, 2009, 265 p. (in Russian).Search in Google Scholar

[11] A. Jersovs, V. Zabiniako and P. Semencuks, “Using Concatenated Steganography for Visual Analysis in GIS SOA,” Applied Computer Systems, vol. 13, pp. 74–82, Nov. 2012. https://doi.org/10.2478/v10312-012-0010-610.2478/v10312-012-0010-6Search in Google Scholar

[12] T. Morkel, J. H. P. Eloff and M. S. Olivier, “An Overview of Image Steganography,” in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, Africa, June/July 2005.Search in Google Scholar

[13] M. Kharrazi, H. T. Sencar and N. Memon, “Cover Selection for Steganographic Embedding,” in International Conference on Image Processing, Atlanta, Georgia, USA, 2006, pp. 317–326. https://doi.org/10.1109/icip.2006.31238610.1109/ICIP.2006.312386Search in Google Scholar

[14] Spammimic. (2015). Spam mimic. [Online]. Available: http://www.spammimic.com/ [Accessed: Oct. 9, 2016].Search in Google Scholar

[15] T. H. Cormen, C. E. Leiserson, R. L. Rivest and C. Stein, Introduction to Algorithms, 3rd ed. Massachusetts: The MIT Press, 2009, 1312 p.Search in Google Scholar

[16] M. K. Kundu and S. Das, “Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding,” in International Conference on Pattern Recognition, Istanbul, Turkey, Aug. 23–26, 2010, pp. 1457–1460. https://doi.org/10.1109/icpr.2010.36010.1109/ICPR.2010.360Search in Google Scholar

[17] International Telecommunication Union. (2012). Methodology for the subjective assessment of the quality of television pictures. Recommendation ITU-R BT.500-13. [Online]. Available: https://www.itu.int/rec/R-REC-BT.500-13-201201-I/en [Accessed: Oct. 8, 2016]Search in Google Scholar

[18] R. Böhme, “Principles of Modern Steganography and Steganalysis,” Information Security and Cryptography (Information Security and Cryptography), pp. 11–77, 2010. https://doi.org/10.1007/978-3-642-14313-7_210.1007/978-3-642-14313-7_2Search in Google Scholar

[19] H. Sajedi, “Steganalysis based on steganography pattern discovery,” Journal of Information Security and Applications, vol. 30, pp. 3–14, Oct. 2016. https://doi.org/10.1016/j.jisa.2016.04.00110.1016/j.jisa.2016.04.001Search in Google Scholar

[20] D. Lerch-Hostalot and D. Megias, “Unsupervised steganalysis based on artificial training sets,” Engineering Applications of Artificial Intelligence, vol. 50, pp. 45–59, Apr. 2016. https://doi.org/10.1016/j.engappai.2015.12.01310.1016/j.engappai.2015.12.013Search in Google Scholar

[21] T. Sloan and J. Hernandez-Castro, “Steganalysis of OpenPuff through atomic concatenation of MP4 flags,” Digital Investigation, vol. 13, pp. 15–21, June 2015. https://doi.org/10.1016/j.diin.2015.02.00210.1016/j.diin.2015.02.002Search in Google Scholar

[22] G. Luo and X. Sun, “An Evaluation Scheme for Steganalysis-proof Ability of Steganographic Algorithms,” in International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Haohsiung, Taiwan, Nov. 26–28, 2007, pp. 126–129. https://doi.org/10.1109/iih-msp.2007.8510.1109/IIH-MSP.2007.85Search in Google Scholar

[23] J. Cummins, P. Diskin, S. Lau and R. Parlett. (2004). Steganography and Digital Watermarking. [Online]. Available: http://www.cs.bham.ac.uk/~mdr/teaching/modules03/security/students/SS5/Steganography.htm [Accessed: Oct. 8, 2016].Search in Google Scholar

[24] D. Kahn, The Codebreakers. New York: Scribner, 1996, 1224 p.Search in Google Scholar

[25] A. Jersovs and P. Rusakovs, “Kutter Steganographical Method’s Improvement and Concept of Universal Stegoconstructor,” in Computer Sciences, vol. 38, pp. 198–208, Jan. 2009. https://doi.org/10.2478/v10143-009-0018-610.2478/v10143-009-0018-6Search in Google Scholar

[26] M. Kharrazi, H. T. Sencar and N. Memon, “Benchmarking steganographic and steganalysis techniques,” in Proceedings of the SPIE, vol. 5681, pp. 252–263, March 2005. https://doi.org/10.1117/12.58737510.1117/12.587375Search in Google Scholar

eISSN:
2255-8691
Idioma:
Inglés
Calendario de la edición:
2 veces al año
Temas de la revista:
Computer Sciences, Artificial Intelligence, Information Technology, Project Management, Software Development