An Implementation of Database Security Using Steganography in the Web |
Moon, Bong-Keun
(Soongsil University)
Ryoo, Du-Gyu (Soongsil University) Ko, Myung-Sun (Soongsil University) Eom, Ki-Won (Soongsil University) Jun, Moon-Seog (Soongsil University) |
1 | Jeffrey D. Ullman, Principles of Database and Knowledge-Base Systems, Computer Science Press, 1988 |
2 | Charles Pfleeger, Shari Lawrence Pfleeger, Security in Computing, Prentice-Hall, 3rd Edition, 2002 |
3 | Neil F. Johnson, Zoran Duric, Sushil Jajodia, 'Information Hiding : Steganography and Watermarking - Attacks and Countermeasures,' Kluwer Academic Publishers, pp.18-44, 2001 |
4 | E. Fanz, A. Jerichow, S. Moller, A. Pfitzmann, I. Stierand, 'Computer-based steganography : How it works and why therefore any restrictions on cryptography are nonsense, at best,' Proceedings of Information Hiding Workshop, LNCS, No.1174, pp.7-21, 1996 |
5 | Neil F. Johnson, Sushil Jajodia, 'Steganalysis of images created using current steganography software,' Proceedings of Information Hiding Workshop, LNCS, No.1525, pp.273-289, 1998 |
6 | 주낙근, 이재현, 김동서, '웨이블릿 계수 교환을 이용한 워터마킹 기법', 한국정보보호학회논문지, 제13권 제5호, pp.49-56, 2003 |
7 | Fabian A. P. Petitcolas, Ross J. Anderson, Markus G. Kuhn, 'Information Hiding - A survey,' Proceedings of the IEEE, Vol.87, No.7, pp.1062-1078, 1999 |
8 | Y. C. Hong, Stanley Y. W. Su, 'Associative hardware and software techniques for integrity control,' ACM Transactions on Database Systems, Vol.6, No.3, pp.416-440, 1981 DOI ScienceOn |
9 | 최순영, 서영호, 유지상, 김대경, 김동욱, 'DWT 기반 영상 압축기의 다해상도의 통계적 특성을 이용한 실시간 워터마킹 알고리즘', 한국정보보호학회논문지, 제13권 제6호, pp.33-43, 2003 |