Secure Steganographic Algorithm against Statistical analyses
![]() |
유정재
(고려대학교 정보보호기술연구센터)
오승철 (고려대학교 정보보호기술연구센터) 이광수 (고려대학교 정보보호기술연구센터) 이상진 (고려대학교 정보보호기술연구센터) 박일환 (국가보안기술구소) |
1 | A. Westfeld and A. Pfitzmann: 'Attacks on Steganographic Systems,' Information Hiding, LNCS vol. 1768. Springer-Verlag. 1999. pp.61-76 |
2 | J. Fridrich. M. Goljan, and R. Du, 'Detecting LSB steganography in color and gray-scale image,' Magazine of IEEE Multimedia, 2001. pp. 22-28 |
3 | G. J. Simmons, 'The Prisoner's Problem and the Subliminal Channel,' in Advances in Cryptology. Proceedings of CRYPT0'83, Plenum Press. 1984 pp.51-67 |
4 | Contraband, http://www.biol. rug.nl/hens/j/contrabd.exe |
5 | N. Provos, 'Defending Against Statistical Steganalysis,' in Proceedings of the 10th USENIX Security Symposium, 2001. pp. 323-335 |
6 | A. Westfeld, 'F5-A Steganographic Algorithm,' Information Hiding, 4th International Workshop, LNC8 2137, Springer-Verlag 2001. pp. 289-302 |
7 | C. Craver, 'On public-key steganogra phy in the presence of an active warden.' in Information Hiding: Second International Workshop. IH'98, D. Aucsmith, ed., vol. 1525 of Lecture Notes in Computer Science, Springer- Verlag, 1998. pp. 355-368 |
8 | http://csrc.nist.gov/publications/fips/fips197/fips-197. pdf |
9 | U. Maurer, 'A universal statistical test for random bit generators,' in Advances in Cryptology - CRYPT0'90. A. J. Menezes and S. A. Vanstone, eds., vol. 537 of Lecture Notes in Computer Science, Springer-Verlag, 1991, pp. 409-426 |
![]() |