최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기스마트미디어저널 = Smart media journal, v.12 no.4, 2023년, pp.9 - 18
김현지 (한성대학교 IT융합공학과) , 임세진 (한성대학교 IT융합공학과) , 김덕영 (한성대학교 IT융합공학과) , 윤세영 (한성대학교 IT융합공학과) , 서화정 (한성대학교 융합보안학과)
Steganography is a technology capable of protecting data by hiding the existence of data. Recently, with the development of deep learning technology, deep learning-based steganography are being developed. Deep learning can learn by analyzing high-dimensional features of data, so it can improve the p...
DJEBBAR, Fatiha, "Securing IoT Data Using?Steganography: A Practical Implementation?Approach," Electronics, 10.21: 2707, 2021.
KHARI, Manju, et al., "Securing data in Internet?of Things (IoT) using cryptography and?steganography techniques," IEEE Transactions?on Systems, Man, and Cybernetics: Systems,?Vol. 50, Issue 1, PP. 73-80, Jan. 2020.
Akhtar, Nadeem, Pragati Johri, and Shahbaaz Khan.?"Enhancing the security and quality of LSB based?image steganography," 2013 5th International?Conference and Computational Intelligence and?Communication Networks, Mathura, India, Sep.?2013.
Jian, Chua Teck, et al., "Audio steganography?with embedded text," IOP Conference Series:?Materials Science and Engineering, Vol. 226.?No. 1, Aug. 2017.
Kim, Jaeyoung, et al., "A statistical approach for?improving the embedding capacity of block?matching based image steganography," Journal?of Broadcast Engineering, Vol. 22, Issue 5, pp.?643-651, 2017.
Kavitha, Kavita Kadam, Ashwini Koshti, and?Priya Dunghav, "Steganography using least?significant bit algorithm," International Journal?of Engineering Research and Applications?(IJERA), Vol. 2, Issue 3, pp. 2248-9622,?May-Jun 2012.
Gupta, Shailender, Ankur Goyal, and Bharat?Bhushan, "Information hiding using least?significant bit steganography and cryptography,"?International Journal of Modern Education and?Computer Science, 4.6: 27, Jun. 2012.
Wu, Da-Chun, and Wen-Hsiang Tsai, "A steganographic method for images by?pixel-value differencing," Pattern recognition?letters, Vol. 24, Issues 9-10, pp. 1613-1626, Jun.?2003.
Nurdiyanto, Heri, et al., "Enhanced pixel value?differencing steganography with government?standard algorithm," 2017 3rd International?Conference on Science in Information?Technology (ICSITech), Bandung, Indonesia,?Oct. 2017.
H.-C. Wu, et al., "Image steganographic scheme?based on pixel-value differencing and LSB?replacement methods," IEE Proceedings-Vision,?Image and Signal Processing, Vol. 152, Issues 5,?pp. 611-615, Oct. 2005.
C.-H. Yang, et al., "Capacity-raising?steganography using multi-pixel differencing and?pixel-value shifting operations," Fundamenta?Informaticae, vol. 98, no. 2-3, pp. 321- 336, 2010.
V. Holub and J. Fridrich, "Designing?steganographic distortion using directional filters,"?2012 IEEE International Workshop on Information?Forensics and Security(WIFS), Vol.2, pp. 234-239, 2012.
Holub, V., Fridrich, J., "Digital image?steganography using universal distortion,"?Proceedings of the First ACM Workshop on?Information Hiding and Multimedia Security, pp.?59-68, Montpellier, France, Jun. 2013.
Nam, Soo-Tai and Chan-Yong Jin, "Rebuilding?of Image Compression Algorithm Based on the?DCT (discrete cosine transform)," Journal of the?Korea Institute of Information and?Communication Engineering, vol. 23, no. 1, pp.?84-89, 2019.
Sahar A. El_Rahman, "A comparative analysis?of image steganography based on DCT algorithm and steganography tool to hide nuclear?reactors confidential information," Computers &Electrical Engineering, Vol. 70, pp. 380-399,?Aug. 2018.
Dr. Ekta Walia, Payal Jain, Navdeep, "An?Analysis of LSB & DCT based Steganography,"?Global Journal of Computer Science and?Technology, Vol. 10, Issue 1, pp.4-8, Apr. 2010.
A.M.Raid, W.M.Khedr, M. A. El-dosuky and?Wesam Ahmed, "Jpeg Image Compression Using?Discrete Cosine Transform - A Survey,"?International Journal of Computer Science &?Engineering Survey(IJCSES), Vol. 5, No. 2, Apr.?2014.
R. Reininger and J. Gibson, "Distributions of the?Two-Dimensional DCT Coefficients for Images,"?IEEE Transactions on Communications, Vol. 31,?Issue 6, pp. 835-839, Jun. 1983.
Ken Cabeen, Peter Gent, "Image Compression?and the Discrete Cosine Transform,"
Baluja, Shumeet, "Hiding images in plain sight:?Deep steganography," Advances in neural?information processing systems 30, 2017.
Albawi, Saad, Tareq Abed Mohammed and Saad?Al-Zawi, "Understanding of a convolutional neural?network," 2017 international conference on?engineering and technology (ICET). pp. 1-6, Antalya,?Turkey, Aug. 2017.
Volkhonskiy, Denis, Ivan Nazarov and Evgeny?Burnaev, "Steganographic generative adversarial?networks," Twelfth international conference on?machine vision (ICMV 2019), Vol. 11433, pp.?991-1005, Jan. 2020.
Goodfellow, Ian, et al., "Generative adversarial?networks," Communications of the ACM, Vol.?63, no. 11, pp. 139-144, Oct. 2020.
Wu, Pin, Yang Yang and Xiaoqiang Li,?"Stegnet: Mega image steganography capacity?with deep convolutional network," Future?Internet, Vol. 10, Issue 6, pp. 54, Jun. 2018.
Srivastava, et al., "Highway networks,"?arXiv:1505.00387, Nov. 2015.
He, Kaiming, et al., "Deep residual learning for?image recognition," Proceedings of the IEEE?conference on computer vision and pattern?recognition, pp. 770-778, Las Vegas, NV, USA,?Jun. 2016.
Szegedy, Christian, et al., "Rethinking the inception?architecture for computer vision," 2016 IEEE?Conference on Computer Vision and Pattern?Recognition (CVPR), pp. 2818-2826, Las Vegas,?NV, USA, Jun. 2016.
Kingma, Diederik P. and Max Welling, "An?introduction to variational?autoencoders," Foundations and Trends® in?Machine Learning, Vol. 12, No. 4, pp. 307-392,?Nov. 2019.
Baluja, Shumeet, "Hiding images within images,"?IEEE transactions on pattern analysis and machine?intelligence, Vol. 42, Issue 7, pp. 1685-1697, Feb.?2019.
Shi, Haichao, et al., "SSGAN: Secure steganography?based on generative adversarial?networks," Advances in Multimedia Information?Processing-PCM 2017, pp. 534-544, Harbin, China,?September 28-29, 2017.
WANG, Yaojie, Ke NIU and Xiaoyuan YANG,?"Information hiding scheme based on generative?adversarial network," Journal of Computer?Applications, Vol. 38, Issue 10, pp. 2923-2928,?2018.
Zhang, Kevin Alex, et al., "SteganoGAN: High?capacity image steganography with GANs,"?arXiv:1901.03892, 2019.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.