Browse > Article
http://dx.doi.org/10.13089/JKIISC.2005.15.2.3

An Implementation of Database Security Using Steganography in the Web  

Moon, Bong-Keun (Soongsil University)
Ryoo, Du-Gyu (Soongsil University)
Ko, Myung-Sun (Soongsil University)
Eom, Ki-Won (Soongsil University)
Jun, Moon-Seog (Soongsil University)
Abstract
As the usage of Internet grows, we share many informations among the others and use more database systems for a various type of data. However, secure database system, which prevents the unauthorized users from modification, deletion, and access, is urgently required for sharing data in Internet. Conventional technologies of a data security are passive methods which depend on several steps with an access control, and these methods are vulnerable against the illegal attack because attacker can see the plain text that is private message. To prevent private data item for the special security from the malicious attack in web database, this paper is devoted to implement database system using steganography method, so we can protect the data item completely because attacker cannot know the secure message although he get the content of database.
Keywords
Web; Steganograph; Database;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Jeffrey D. Ullman, Principles of Database and Knowledge-Base Systems, Computer Science Press, 1988
2 Charles Pfleeger, Shari Lawrence Pfleeger, Security in Computing, Prentice-Hall, 3rd Edition, 2002
3 Neil F. Johnson, Zoran Duric, Sushil Jajodia, 'Information Hiding : Steganography and Watermarking - Attacks and Countermeasures,' Kluwer Academic Publishers, pp.18-44, 2001
4 E. Fanz, A. Jerichow, S. Moller, A. Pfitzmann, I. Stierand, 'Computer-based steganography : How it works and why therefore any restrictions on cryptography are nonsense, at best,' Proceedings of Information Hiding Workshop, LNCS, No.1174, pp.7-21, 1996
5 Neil F. Johnson, Sushil Jajodia, 'Steganalysis of images created using current steganography software,' Proceedings of Information Hiding Workshop, LNCS, No.1525, pp.273-289, 1998
6 주낙근, 이재현, 김동서, '웨이블릿 계수 교환을 이용한 워터마킹 기법', 한국정보보호학회논문지, 제13권 제5호, pp.49-56, 2003
7 Fabian A. P. Petitcolas, Ross J. Anderson, Markus G. Kuhn, 'Information Hiding - A survey,' Proceedings of the IEEE, Vol.87, No.7, pp.1062-1078, 1999
8 Y. C. Hong, Stanley Y. W. Su, 'Associative hardware and software techniques for integrity control,' ACM Transactions on Database Systems, Vol.6, No.3, pp.416-440, 1981   DOI   ScienceOn
9 최순영, 서영호, 유지상, 김대경, 김동욱, 'DWT 기반 영상 압축기의 다해상도의 통계적 특성을 이용한 실시간 워터마킹 알고리즘', 한국정보보호학회논문지, 제13권 제6호, pp.33-43, 2003