1 |
"Photo/video file storage period and recovery method after the period has elapsed", KakaoTalk CS. https://cs.kakao.com/helps?articleId=1073197935&service=8&category=645&device=2405&locale=ko
|
2 |
"North Korean directives and pledges of allegiance were found on USBs of a party that was carrying out activities against South Korea's introduction of the F-35", Chosun daily, 6 Aug 2021. https://n.news.naver.com/article/023/0003631940?cds=news_edit
|
3 |
"Why do North Korean spies use steganography technology?", JoongAng daily, 8 Aug 2021. https://www.joongang.co.kr/article/24126193
|
4 |
S. Yuk, J. Park and Y. Cho. "Cyber Threat Analysis of Image Steganography-based Attacks and Defense Approach in National Defense Area," Journal of Defense and Security, vol.1, no.1, pp. 155-182, 2019. https://www.dssc.mil.kr/dssckr/174/subview.do
|
5 |
and KARI were also hacked by North Korea. Was information about the KF-21 leaked?", Chosunilbo, 1 Jul 2021. https://www.chosun.com/politics/politics_general/2021/07/01/J23DHZSGR5ABBBR4C3NVPSQIMY/
|
6 |
Morkel, Tayana, Jan HP Eloff, and Martin S. Olivier, "An overview of image steganography," ISSA, vol. 1, no. 2, 2005. https://www.academia.edu/2943481/An_overview_of_image_steganography?from=cover_page
|
7 |
"84 reports and directives to North Korea were found", Chosun daily, 7 Aug 2021. https://n.news.naver.com/article/023/0003632233?cds=news_edit
|
8 |
"Due to North Korea's hacking, President Moon's movement related to the KF-21 release ceremony and data related to electronic warfare equipment have been leaked.", Munhwa daily. 2 Jul 202. http://www.munhwa.com/news/view.html?no=20210702MW084831892300
|
9 |
J. Lee, at al. "Military application of steganographic techniques to ensure secure and confidential communication," Battle Development, vol.155, pp. 175-190, 2018.
|
10 |
W. Bender et al, "Techniques for data hiding," IBM systems journal, vol. 35, no. 3.4, pp. 313-336, 1996. http://dx.doi.org/10.1147/sj.353.0313
DOI
|
11 |
J. Jeon and Y. Cho, "Construction and performance analysis of image steganography-based botnet in KakaoTalk openchat," Computers 8.3, 61, 2019. https://doi.org/10.3390/computers8030061
DOI
|
12 |
M. Kwak and Y. Cho, "A novel video steganography-based botnet communication model in telegram sns messenger," Symmetry 13.1, 84, 2021 https://doi.org/10.3390/sym13010084
DOI
|
13 |
J. Park and Y. Cho, "Design and implementation of automated steganography image-detection system for the kakaotalk instant messenger," Computers 9.4, 103, 2021. https://doi.org/10.3390/computers9040103
DOI
|
14 |
S. Yuk and Y. Cho, "A Study on Steganography-based Botnet C&C Covert Communication Model using Thumbnail Images in SNS Instant Messengers," Proceedings of the KSII Spring Conference, Vol.21.1, pp.197-198, 2020.
|
15 |
"Steg," http://www.fabionet.org/node/237
|
16 |
"What is OpenCV's INTER_AREA Actually Doing?", WenruDong, 25 jun 2018. https://medium.com/@wenrudong/what-is-opencvs-inter-area-actually-doing-282a626a09b3
|
17 |
Shishir Nagaraja et al, "Stegobot: a covert social network botnet," International Workshop on Information Hiding, Springer, Berlin, Heidelberg, pp. 299-313, 2011. https://doi.org/10.1007/978-3-642-24178-9_21
DOI
|
18 |
"The North Korean Cultural Exchange Bureau, which had issued orders to four members of the Cheongju party, was also involved in the Ilsimhoe and Wangjaesan incidents" JoongAng daily, 9 Aug 2021. http://naver.me/x2PGuQUS
|
19 |
Seoul Central District Court Judgment case 2011gohap1131, 2011gohap1143(merged), 2011gohap1144 (merged), 2011gohap1145(merged), 2011gohap1146(merged)
|
20 |
Seoul Central District Court Judgment case 2016 gohap538, 558(merged)
|
21 |
Neil F. Johnson and Sushil Jajodia, "Exploring steganography: Seeing the unseen," Computer 31.2, pp. 26-34. 1998. http://dx.doi.org/10.1109/MC.1998.4655281
DOI
|
22 |
Seoul High Court Judgment case 2012no805
|
23 |
Seoul High Court Judgment case 2014no762
|
24 |
Supreme Court of Korea Judgment case 2017do9747
|
25 |
"Numerous North Korean directives found on a quadruple sealed USB", Kukmin Daily, 6 Aug 2021. https://n.news.naver.com/article/005/0001462690
|
26 |
2020 Sursey on the internet usage, Ministry of Science and ICT of Korea, 2021. https://www.nia.or.kr/site/nia_kor/ex/bbs/List.do?cbIdx=99870
|
27 |
"U.S. Department of Justice indicts three North Korean hackers... Suspicion of hacking 1.4 trillion won", Newsis, 18 Feb 2021. https://newsis.com/view/?id=NISX20210218_0001342906&cID=10101&pID=10100
|
28 |
"The design drawings of the 'KF-21' were leaked due to two hacks that occurred in KAI." Dong-A daily. 2 Jul 2021. https://www.donga.com/news/article/all/20210701/107728238/1
|
29 |
S. Yuk and Y. Cho, "A Study of Stego Botnet Communication Method to Avoid Destruction of Secret Message by Image Down-scaling in KakaoTalk," Korea Computer Congress 2021, pp.1140-1142, 2021. http://www.dbpia.co.kr/journal/articleDetail?nodeId=NODE10583196
|
30 |
S. Gollapudi, "Learning computer vision using OpenCV," A press, Springer, 2019.
|
31 |
H. Lee, "A Study on Detection and Anaysis of Encrypted Steganography," Master Thesis, Korea National Defense University, 2010.
|
32 |
"The 'Self-Reunification Chungbuk Comrades Association' was arrested and indicted as an offender in the national security range", Cheongju District Prosecutors' Office, 16 Sep 2021. https://spo.go.kr/site/spo/ex/board/View.do?cbIdx=1403&bcIdx=1021884
|
33 |
"Self-Reunification Chungbuk Comrades Association wrote a bloody note to Kim Jong-un... 'We are Kim Jong-un's warriors'", JoongAng daily, 7 Aug 2021. https://www.joongang.co.kr/article/24123021
|
34 |
Suwon District Court Judgment case 2013gohap620, 624(merged), 699(merged), 851(merged)
|