Executable File Hiding: An LSBMR Perspective
Abstract
Keywords
Full Text:
PDFReferences
N. Provos and P. Honeyman, ―Hide and seek: An introduction to steganography,‖ IEEE security and Privacy Mag., vol. 1, no. 3, pp. 32–44, 2003.
J. Fridrich, ―Applications of Data Hiding in Digital Images,‖ Tutorial for the ISSPA, pp. 22-25, Aug. 1999
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, ―Information hiding—A survey,‖ Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, Jul.1999.
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, ―Techniques for data hiding,‖ IBM Syst. J., vol. 35, no. 3–4, pp. 313–336, 1996.
M. Swanson, M. Kobayashi, and A. Tewfik, ―Multimedia data embedding and watermarking technologies,‖ IEEE Proceedings, vol. 86, No. 6, pp 1064-1087, June 1998.
I. Cox, J. Kilian, T. Leighton, and T. Shamoon, ―Secure spread spectrum watermarking for multimedia,‖ Proc. First Int. Workshop Information Hiding, R. Anderson, Ed., Cambridge, U. K.: Springer-Verlag, May/June 1996, pp. 183-206.
I.J. Cox, M.L. Miller, and J.A. Bloom, Digital Watermarking. Morgan Kaufmann, 2002.
Tomáˇs Pevný and Jessica Fridrich, Multiclass Detector of Current Steganographic Methods for JPEG Format, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 4, DECEMBER 2008, 635-650.
G. Simmons,‖ The prisoner’s problem and the subliminal channel, CRYPTO, pp: 51-67, 1983.
J. Zollner, H. Federrath, ―Modelling the security of steganographic systems‖, 2nd information hiding workshop, pp: 345-355, 1998.
N.J. Hopper, J. Langford, L. Von Ahn, ―Provably secure steganography‖, Advances in cryptology: CRYPTO 2002.
A high capacity Steganography scheme for JPEG 2000 Baseline system, Liang Zhang, Haili wang, Renbiao Wu, IEEE transactions on image processing, 18(8), 2009.
T. Morkel 1, J.H.P. Eloff 2, M.S. Olivier , AN OVERVIEW OF IMAGE STEGANOGRAPHY http://mo.co.za/open/stegoverview.pdf
Johnson, N.F. & Jajodia, S., ―Steganalysis of Images Created Using Current Steganography Software‖,Proceedings of the 2nd Information Hiding Workshop, April 1998
F. Huang, B. Li, and J. Huang, ―Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels,‖ in Proc. IEEE Int. Conf. Image Processing, Oct. 16–19, 2007, vol. 1, pp. 401–404.
J. Harmsen and W. Pearlman, ―Steganalysis of additive-noise modelable information hiding,‖ Proc. SPIE Electronic Imaging, vol. 5020, pp. 131–142, 2003.
A. D. Ker, ―Steganalysis of LSB matching in grayscale images,‖ IEEE Signal Process. Lett., vol. 12, no. 6, pp. 441–444, Jun. 2005.
J. Mielikainen, ―LSB matching revisited,‖ IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285–287, May 2006.
K. Hempstalk, ―Hiding behind corners: Using edges in images for better steganography,‖ in Proc. Computing Women’s Congress, Hamilton, New Zealand, 2006.
D. Wu and W. Tsai, ―A steganographic method for images by pixelvalue differencing,‖ Pattern Recognit. Lett., vol. 24, pp. 1613–1626, 2003.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.