6
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Investigating Steganographic Communications

&
Pages 207-212 | Published online: 26 Mar 2015

REFERENCES

  • S Katzenbeizzer & FAP Petitcolas (eds.), Information Hiding Techniques for Steganography and Digital Watermarking, Cambridge, Massachusetts, Artech House Books, 2000.
  • S K Pal & P K Saxena, Digital Steganographic Techniques for Secure Communication, Technical Report, SAG/Multimedia/2001/13, Scientific Analysis Group, DRDO, 2001.
  • T Kellen, Hiding in Plain View: Could Steganography be a Terrorist Tool?, SANS Information Security Reading Room, Nov 2001.
  • N F Johnson & S Jajodia, Steganalysis: The investigation of Hidden Information, IEEE Information Technology Conference, New York, 1998.
  • F Hansmann, Steganalysis: Scanning the Web, Steganos website: www.demcom.com/deutsch/index.htm.
  • W. Bender, D. Gruhl, N Morimoto & A Lu, Techniques for Data Hiding, IBM Systems Journal, 35(3 & 4), 1996, pp 313–336.
  • N Provos & P Honeyman, Detecting Steganographic Content on the Internet, Technical Report CITI 01-1a, University of Michigan, 2001.
  • H Farid, Detecting Steganographic Messages in Digital Images, Technical Report, TR 2001–412, Dartmouth College, 2001.
  • R Anderson & F Petitcolas, On the Limits of Steganography, IEEE Journal on Special Areas in Communication, vol 16, no 4, May 1998, pp 463–473.
  • N F Johnson, Z Duric & S Jajodia, Information Hiding: Steganography and Watermarking—Attacks and Countermeasures, Kluwer Academic Publishers, 2001.
  • N F Johnson & S Jajodia, Steganalysis of Images Created using Current Steganography Software, Proceedings of the Second Information Hiding Workshop, Oregon, Portland, 1998.
  • J Fridrich, R Du & M Long, Steganalysis of LSB Encoding Colour Images, Proceedings of the IEEE International Conference on Multimedia and Expo, August 2000.
  • S K Pal, R K Khanna & S K Muttoo, Information Theoretic Models for Improving the Security of Steganographic Systems, Jt. National Conference of VPI on Industrial Mathematics and ISITA, New Delhi, 2002.
  • A Westfeld & A Pfitzmann, Attacks on Steganographic Systems, Proceedings of the Third Information Hiding Workshop, LNCS 1768, Springer-Verlag, 2000, pp. 61–76.
  • N Provos, Defending Against Statistical Steganalysis, 10th USENIX Security Symposium, Washington DC, 2001.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.