과제정보
본 논문은 과학기술정보통신부의 재원으로 정보통신기획평가원(IITP)의 정보통신방송혁신인재양성사업(Project No. 2021-0-01816, 50%), 정보통신방송기술 국제공동연구(Project No. RS-2022-00165794, 30%), 한국연구재단(NRF) 중견후속연구사업(Project No. RS-2023-00208460, 20%)의 지원을 받아 수행된 연구임.
참고문헌
- Khalaf, A. M., & Lakhtaria, K. (2024, February). A review of steganography techniques. In *AIP Conference Proceedings* (Vol. 3051, No. 1). AIP Publishing.
- Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. *Signal processing*, *90*(3), 727-752.
- CSO Staff. (2024, February 26). Hacker group hides malware in images to target Ukrainian organizations. CSO Online. https://www.csoonline.com/article/1309858/hacker-group-hides-malware-in-images-to-target-ukrainian-organizations.html
- Hacker News Staff. (2024, April 16). TA55 8 hackers weaponize images for wide-scale phi shing attacks. *The Hacker News*. https://thehackernews.com/2024/04/ta558-hackers-weaponize-images-for-wide.html
- S. M. J. a. Abdalwahid, W. A. Hashim, M. G. Saeed, S. A. Altaie and S. W. Kareem, "Investigating the Effectiveness of Artificial Intelligence in Watermarking and Steganography for Digital Media Security," *2024 21st International Multi-Conference on Systems, Signals & Devices (SSD)*, Erbil, Iraq, 2024, pp. 552-561, doi: 10.1109/SSD61670.2024.10549272.
- M. Zhang, S. Ji, H. Cai, H. Dong, P. Zhang and Y. Li, "Audio Steganography Based Backdo or Attack for Speech Recognition Software," *2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC)*, Osaka, Japan, 2024, pp. 1208-1217, doi: 10.1109/COMPSAC61105.2024.00161.
- Dong, L., Fu, Z., Chen, L., Ding, H., Zheng, C., Cui, X., & Shen, Z. (2024). FDNet: Imperceptible backdoor attacks via frequency domain steganography and negative sampling. *Neurocomputing*, *583*, 127546.
- Tang, W., Li, J., Rao, Y., Zhou, Z., & Peng, F. A Trigger-Perceivable Backdoor Attack Framework Driven by Image Steganography. *Available at SSRN 4886265*.
- Xu, W., Xu, Y., & Zhang, S. (2024). SAB: A Stealing and Robust Backdoor Attack based on Steganographic Algorithm against Federated Learning. *arXiv preprint arXiv:2408.13773*.
- Almehmadi L, Basuhail A, Alghazzawi D, Rabie O. Framework for Malware Triggering Using Steganography. Applied Sciences. 2022; 12(16):8176. https://doi.org/10.3390/app12168176
- Knochel, M., & Karius, S. (2024, June). Text Steganography Methods and their Influence in Malware: A Comprehensive Overview and Evaluation. In *Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security* (pp. 113-124).
- Jscrambler. 2022. Steganography in a Magecart Attack. https://jscrambler.com/blog/steganography-in-magecart-attack
- Bill Toulas. 2022. Hackers Hide Malware i n James Webb Telescope Images. BleepingComputer. https://www.bleepingcomputer.com/news/security/hackershide-malware-in-james-webb-telescope-images/
- Airbus. 2022. Vinself Now with Steganography - Airbus Defence and Space Cyber. Airbus. https://www.cyber.airbus.com/vinself-now-steganography/
- Bill Toulas. 2022. Worok Hackers Hide New Malware in PNGs Using Steganography. BleepingComputer. https://www.bleepingcomputer.com/news/security/worokhackers-hide-new-malware-in-pngs-using-steganography/