CRYPTO-STEG: A Hybrid Cryptology - Steganography
Approach for Improved Data Security
Keywords: Cryptology, Steganography, Steganalysis, Classification
Mehran University Research Journal of Engineering & Technology
Volume 31 , Issue 2
Atif Bin Mansoor , Zohaib Khan , Shoab Ahmed Khan ,
References
1. |
Stallings, W., "Cryptography and Network Security:
Principles and Practices", Prentice Hall, Chapter-3,
pp. 63-64, New York, 2003. |
2. |
McBride, B.T., Peterson, G.L., and Gustafson, S.C., "A
New Blind Method for Detecting Novel Steganography",
Digital Investigation, Volume 2, pp. 50-70, February,
2005. |
3. |
Khan, Z., and Mansoor, A.B., "Steganalysis of JPEG
Images with Joint Transform Features", Pacific-Rim
Symposium on Image and Video Technology, Volume 1,
pp. 965-975, Tokyo, Japan, 2009. |
4. |
Khan, Z., and Mansoor, A.B., "A New Hybrid DCT and
Contourlet Transform Based JPEG Image Steganalysis
Technique", 16th Scandinavian Conference on Image
Analysis, Volume 1, pp. 91-98, Oslo, Norway, June, 2009. |
5. |
UCID (Uncompressed Colour Image Database), Online:
http://vision.cs.aston.ac.uk/datasets/UCID/ucid.html. |
6. |
Schaefer, G., and Stich, M., "UCID-An Uncompressed
Colour Image Database", SPIE, Storage and Retrieval
Methods and Applications for Multimedia, Volume 1,
pp. 472-480, San Jose, USA, January, 2004. |
7. |
Steganography Software F5. Online : http://wwwrn.inf.tudresden.
de/~westfeld/f5.html. |
8. |
Westfeld, A. , "F5-A Steganographic Algorithm: High
Capacity Despite Better Steganalysis", Information
Hiding: 4th International Workshop, Lecture Notes in
Computer Science, Moskowitz, I.S., (Editor), Volume 1,
pp. 289-302, Springer-Verlag, Berlin Heidelberg, April,
2001. |
9. |
Farid, H., "Detecting Hidden Messages Using Higherorder
Statistical Models", IEEE International Conference
on Image Processing, Volume 1, pp. 905-908, New York,
2002. |
10. |
Wang, Y., and Moulin, P., "Optimized Feature Extraction
for Learning-Based Image Steganalysis", IEEE
Transactions on Information Forensics and Security,
Volume 2, pp. 31-45, March, 2007. |
11. |
Model Based JPEG Steganography Demo. Online: http:/
/www.philsallee.com/mbsteg/index.html. |
12. |
Sallee, P., "Model Based Steganography", International
Workshop on Digital Watermarking, Volume 1,
pp. 174-188, Seoul, Korea, October, 2003. |
13. |
Fridrich, J., "Feature-Based Steganalysis for JPEG Images
and its Implications for Future Design of Steganographic
Schemes", Sixth Information Hiding Workshop,
Lecture Notes in Computer Science, Volume 1,
pp. 67-81, Springer-Verlag, Berlin Heidelberg, 2004. |
14. |
Kharrazi, M., Sencar, H.T., and Memon, N.,
"Benchmarking Steganographic and Steganalysis
Technique", SPIE Electronic Imaging, Security,
Steganography and Watermarking of Multimedia
Contents-VII, Volume 1, pp. 152-263, San Jose, USA,
2005 |
15. |
Duda, R.O, Hart, P.E., and Stork, D.G., "Pattern
Classification", John Wiley & Sons, Chapter-3,
pp. 117-120, New York, USA, 2001. |
|
|
|