최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of Internet Computing and Services = 인터넷정보학회논문지, v.22 no.6, 2021년, pp.151 - 162
육심언 (Department of Defense Science (Computer Engineering), Graduate School of Defense Management, Korean National Defense University) , 조영호 (Department of Defense Science (Computer Engineering), Graduate School of Defense Management, Korean National Defense University)
Steganography is an advanced technique that hides secret messages by transforming them into subtle noise and spreading them within multimedia files such as images, video and audio. This technology has been exploited in a variety of espionage and cyber attacks. SNS messenger is an attractive SNS Serv...
"North Korean directives and pledges of allegiance were found on USBs of a party that was carrying out activities against South Korea's introduction of the F-35", Chosun daily, 6 Aug 2021. https://n.news.naver.com/article/023/0003631940?cdsnews_edit
"84 reports and directives to North Korea were found", Chosun daily, 7 Aug 2021. https://n.news.naver.com/article/023/0003632233?cdsnews_edit
"Why do North Korean spies use steganography technology?", JoongAng daily, 8 Aug 2021. https://www.joongang.co.kr/article/24126193
and KARI were also hacked by North Korea. Was information about the KF-21 leaked?", Chosunilbo, 1 Jul 2021. https://www.chosun.com/politics/politics_general/2021/07/01/J23DHZSGR5ABBBR4C3NVPSQIMY/
"Due to North Korea's hacking, President Moon's movement related to the KF-21 release ceremony and data related to electronic warfare equipment have been leaked.", Munhwa daily. 2 Jul 202. http://www.munhwa.com/news/view.html?no20210702MW084831892300
"The design drawings of the 'KF-21' were leaked due to two hacks that occurred in KAI." Dong-A daily. 2 Jul 2021. https://www.donga.com/news/article/all/20210701/107728238/1
H. Lee, "A Study on Detection and Anaysis of Encrypted Steganography," Master Thesis, Korea National Defense University, 2010.
J. Lee, at al. "Military application of steganographic techniques to ensure secure and confidential communication," Battle Development, vol.155, pp. 175-190, 2018.
S. Yuk, J. Park and Y. Cho. "Cyber Threat Analysis of Image Steganography-based Attacks and Defense Approach in National Defense Area," Journal of Defense and Security, vol.1, no.1, pp. 155-182, 2019. https://www.dssc.mil.kr/dssckr/174/subview.do
W. Bender et al, "Techniques for data hiding," IBM systems journal, vol. 35, no. 3.4, pp. 313-336, 1996. http://dx.doi.org/10.1147/sj.353.0313
Neil F. Johnson and Sushil Jajodia, "Exploring steganography: Seeing the unseen," Computer 31.2, pp. 26-34. 1998. http://dx.doi.org/10.1109/MC.1998.4655281
Morkel, Tayana, Jan HP Eloff, and Martin S. Olivier, "An overview of image steganography," ISSA, vol. 1, no. 2, 2005. https://www.academia.edu/2943481/An_overview_of_image_steganography?fromcover_page
"The North Korean Cultural Exchange Bureau, which had issued orders to four members of the Cheongju party, was also involved in the Ilsimhoe and Wangjaesan incidents" JoongAng daily, 9 Aug 2021. http://naver.me/x2PGuQUS
Seoul Central District Court Judgment case 2016 gohap538, 558(merged)
Seoul Central District Court Judgment case 2011gohap1131, 2011gohap1143(merged), 2011gohap1144 (merged), 2011gohap1145(merged), 2011gohap1146(merged)
Seoul High Court Judgment case 2012no805
Suwon District Court Judgment case 2013gohap620, 624(merged), 699(merged), 851(merged)
Seoul High Court Judgment case 2014no762
Supreme Court of Korea Judgment case 2017do9747
"The 'Self-Reunification Chungbuk Comrades Association' was arrested and indicted as an offender in the national security range", Cheongju District Prosecutors' Office, 16 Sep 2021. https://spo.go.kr/site/spo/ex/board/View.do?cbIdx1403&bcIdx1021884
"Numerous North Korean directives found on a quadruple sealed USB", Kukmin Daily, 6 Aug 2021. https://n.news.naver.com/article/005/0001462690
"Self-Reunification Chungbuk Comrades Association wrote a bloody note to Kim Jong-un... 'We are Kim Jong-un's warriors'", JoongAng daily, 7 Aug 2021. https://www.joongang.co.kr/article/24123021
2020 Sursey on the internet usage, Ministry of Science and ICT of Korea, 2021. https://www.nia.or.kr/site/nia_kor/ex/bbs/List.do?cbIdx99870
"Photo/video file storage period and recovery method after the period has elapsed", KakaoTalk CS. https://cs.kakao.com/helps?articleId1073197935&service8&category645&device2405&localeko
"U.S. Department of Justice indicts three North Korean hackers... Suspicion of hacking 1.4 trillion won", Newsis, 18 Feb 2021. https://newsis.com/view/?idNISX20210218_0001342906&cID10101&pID10100
Shishir Nagaraja et al, "Stegobot: a covert social network botnet," International Workshop on Information Hiding, Springer, Berlin, Heidelberg, pp. 299-313, 2011. https://doi.org/10.1007/978-3-642-24178-9_21
J. Jeon and Y. Cho, "Construction and performance analysis of image steganography-based botnet in KakaoTalk openchat," Computers 8.3, 61, 2019. https://doi.org/10.3390/computers8030061
M. Kwak and Y. Cho, "A novel video steganography-based botnet communication model in telegram sns messenger," Symmetry 13.1, 84, 2021 https://doi.org/10.3390/sym13010084
J. Park and Y. Cho, "Design and implementation of automated steganography image-detection system for the kakaotalk instant messenger," Computers 9.4, 103, 2021. https://doi.org/10.3390/computers9040103
S. Yuk and Y. Cho, "A Study on Steganography-based Botnet C&C Covert Communication Model using Thumbnail Images in SNS Instant Messengers," Proceedings of the KSII Spring Conference, Vol.21.1, pp.197-198, 2020.
S. Yuk and Y. Cho, "A Study of Stego Botnet Communication Method to Avoid Destruction of Secret Message by Image Down-scaling in KakaoTalk," Korea Computer Congress 2021, pp.1140-1142, 2021. http://www.dbpia.co.kr/journal/articleDetail?nodeIdNODE10583196
S. Gollapudi, "Learning computer vision using OpenCV," A press, Springer, 2019.
"What is OpenCV's INTER_AREA Actually Doing?", WenruDong, 25 jun 2018. https://medium.com/@wenrudong/what-is-opencvs-inter-area-actually-doing-282a626a09b3
"Steg," http://www.fabionet.org/node/237
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.