최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회논문지. Journal of KISS : Computing practices. 컴퓨팅의 실제, v.9 no.4, 2003년, pp.470 - 485
김영실 (대림대학 컴퓨터정보계열) , 김영미 ((주)쎄스 암호화연구실) , 백두권 (고려대학교 컴퓨터학과)
The steganography is one of methods that users can hide data. Some steganography softwares use audio data among multimedia data. However, these commercialized audio steganography softwares have disadvantages that the existence of hidden messages can or easily recognized visually and only certain-siz...
J.Zollner, H.Federrath, H.Klimant, A.Pfitzmann, R.Piotraschke, A.Westfeld, G.Wicke, G.Wolf, 'Modeling the security of steganographic systems.' 2nd Workshop on Information Hiding, Portland, LNCS 1525, pp.345-355, Springer-Cerlag, April 1998
S.K. Pal, P.K. Saxena, S.K. Muttoo, 'The Future of Audio Steganography,' STEG'02, July 11-12, 2002
Neil F. Johnson, 'Introduction to steganography Hidden Information,' GMU 2001-Computer Crime Symposium, August 13-17, 2001, George Mason University, Fairfax, Virginia
Stefan Katzenbeisser, and Fabien A.P.Petitcolas 'Information hiding techniques for steganography and digital watermarking,' Artech House Publishers, 2000
Peter Wayner, 'Disappearing cryptography Information Hiding : Steganography & Watermarking,' second edition, chapter 17, Morgan Kauffman, 2002
http://www.cbcis.wustl.edu/~adpol/courses/cs502/project/report/nodelhtm
http://www.neobytesolutions.com/invsecr/index.html
http://www.steganos.com/./en/
Fabien A.P. Petitcolas, Ross J. Anderson and Markys G.Kuhn, 'Information Hiding-A Survey,' Proceedings of the IEEE, special issue on protec tion of multimedia content, 87(7):1062-1078, July 1999
김현곤, 원동호 외 12, '지적 재산권 보호를 위한 정보은닉 기술 및 표준화 연구', 한국 전산원. pp.19-41, 2000
Christian Cauchin, 'An Information-Theoretic Model for Steganography,' In Proceeding of 2nd Workshop on Information Hiding, Lecture Notes in Computer Science 1525, pp.306-318, Springer, 1998
J. Zollner, H. Federath, H. Klimant, and A. Pfitzmann, 'Modeling the security of steganography systems,' In Proceeding of 2nd Workshop on Information Hiding, Lecture Notes in Computer Science 1525, pp.344-354, Springer, 1998
Brian Chen and Gregory W. Wome.ll, 'Quantization Index Modulation: A Class of Probably Good Methods for Digital Watermarking and Information Embedding,' IEEE Transaction on Information Theory, Vol.47, NO.4, MAY 2001
Djimitri Wiggert, 'Codes for Error Control and Synchronization,' Artech House Inc, 1988
BenZamin Arazi, 'A Commonsense Approach to the Theory of Error Correcting Codes,' MIT Press 1986
http://members.tripod.com/steganography/stego/software.html
http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/dsellars/stego.html
htttp://debut.cis.nctu.edu.tw/~yklee/Reaserch/Steganography/Qalter_Bender/IHW96.pdf
http://www.rfdh.com/bas_com/2- 10.htm
Richard C. Cabot, Bruce Hofer, and Robert Metzler, 'Chapter 13.1 Audio Measurement and Analysis,' 2002
Jerry Whitaker, Blair Benson, 'Chapter 13 Standard Handbook of Audio and Radio Engineering,' McGraw Hill Professional, 2002
http://211.38.132.225/new_b24.htm
Ross J. Anderson, Fabieb A.P. Petitcolas, 'On The Limits of Steganography,' IEEE Journal of Selected Areas in Communication, 16(4):474-481, May 1998
GJ Simmoms, 'The Prisoners' Problem and the Subliminal Channel,' in Proceeding o CRYPTO '83, Plenum Press, pp.51 68, 1984
http://www ccrma.stanford.edu/CCRMA/Courses/422/projects/WaveFormat
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.