1 |
Yuk, Simun, and Youngho Cho, "A Time-Based Dynamic Operation Model for Webpage Steganography Methods," Electronics 9.12, 2113, 2020. https://doi.org/10.3390/electronics9122113
DOI
|
2 |
S. Khattak et al, "A Taxonomy of Botnet Behavior, Detection, and Defense," IEEE COMMUNICATION SURVEYS & TUTORIALS. VOL. 16. NO. 2, 2014. https://doi.org/10.1109/SURV.2013.091213.00134
DOI
|
3 |
P. Malathi, T. Gireeshkumar, "Relating the Embedding Efficiency of LSB Steganography Techniques in Spatial and Transform Domains," Procedia Computer Science, Volume 93, Pages 8, 2016. https://doi.org/10.1016/j.procs.2016.07.270
DOI
|
4 |
A. A. Alsabhany, F. Ridzuan and A. H. Azni, "The Adaptive Multi-Level Phase Coding Method in Audio Steganography," in IEEE Access, vol. 7, 129291-129306, 2019. https://doi.org/10.1109/ACCESS.2019.2940640
DOI
|
5 |
Ahmed A. AlSabhany et al, "Digital audio steganography: Systematic review, classification, and analysis of the current state of the art", Computer Science Review, Volume 38, 2020. https://doi.org/10.1016/j.cosrev.2020.100316
DOI
|
6 |
Jaewoo Jeon and Youngho Cho, "Construction and Performance Analysis of Image Steganography-Based Botnet in KakaoTalk Openchat," Computers 8.3, 61, 2019. https://doi.org/10.3390/computers8030061
DOI
|
7 |
Ghasemzadeh, Hamzeh, and Mohammad H.Kayvanrad, "Toward a robust and secure echo steganography method based on parameters hopping," Signal Process ing and Intelligent Systems Conference, IEEE, 2015. https://doi.org/10.1109/SPIS.2015.7422329
DOI
|
8 |
http://www.jjtc.com/Steganography/tools.html
|
9 |
Shishir Nagaraja et al, "Stegobot: a covert social network botnet," International Workshop on Information Hiding. Springer, Berlin, Heidelberg, pp. 299-313, 2011. https://doi.org/10.1007/978-3-642-24178-9_21
DOI
|
10 |
D. Wu, B. Fang, J. Yin, F. Zhang and X. Cui, "SLBot: A Serverless Botnet Based on Service Flux," 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), pp. 181-188, 2018. https://doi.org/10.1109/DSC.2018.00034
DOI
|
11 |
Seon Su Ji, "Advanced LSB Technique for Hiding Messages in Audio Steganography," Journal of the Korea Industrial Information Systems Research, 19(1), 69-75, 2014. https://doi.org/10.9723/jksiis.2014.19.1.069
DOI
|
12 |
Park Jun, and Youngho Cho, "Design and implemen tation of automated steganography image-detection system for the kakaotalk instant messenger," Computers, 9.4, 103, 2020. https://doi.org/10.3390/computers9040103
DOI
|
13 |
Djebbar, Fatiha, et al, "Comparative study of digital audio steganography techniques," EURASIP Journal on Audio, Speech, and Music Processing(2012):1-16. https://doi.org/10.1186/1687-4722-2012-25
DOI
|
14 |
Hrishikesh Dutta, Rohan Kumar Das, Sukumar Nandi & S. R. Mahadeva Prasanna, "An Overview of Digital Audio Steganography," IETE Technical Review Volume 37, Issue 6, 2020. https://doi.org/10.1080/02564602.2019.1699454
DOI
|
15 |
Matsuoka, Hosei. "Spread spectrum audio steganography using sub-band phase shifting," 2006 International Conference on Intelligent Information Hiding and Multimedia, IEEE, 2006. https://doi.org/10.1109/IIH-MSP.2006.265106
DOI
|
16 |
Minkyung Kwak and Youngho Cho, "A Novel Video Steganography-Based Botnet Communication Model in Telegram SNS Messenger," Symmetry 13, 84, 2021. https://doi.org/10.3390/sym13010084
DOI
|