A Novel Low Distortion Image Steganography for Executable Files
Abstract
Keywords
Full Text:
PDFReferences
J. Giles and B. Hajek, ―An information-theoretic and game-theoretic study of timing channels,‖ IEEE Trans. Inf. Theory, vol. 48, no. 9, pp. 2455–2477, Sep. 2003.
G. J. Simmons, ―The prisoner’s problem and the subliminal channel,‖ in Proc. CRYPTO’83, 1984, pp. 51–67.
C. Cachin, ―An information-theoretic model for steganography,‖ Inf. and Comput., vol. 192, no. 1, pp. 41–56, Jul. 2004.
N. F. Johnson and S. Katzenbeisser, ―A survey of steganographic techniques,‖ in Information Hiding, S. Katzenbeisser and F. Petitcolas, Eds. Norwood, MA: Artech House, 2000, pp. 43–78.
M.-Y. Wu, Y.-K. Ho, and J.-H. Lee, ―An iterative method of palette-based image steganography,‖ Pattern Recognit. Lett., vol. 25, pp. 301–309, 2004.
N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking-Attacks and Countermeasures. Boston, MA: Kluwer Academic, 2000.
I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking. San Francisco, CA: Morgan-Kaufmann, 2002.
P. Moulin and R. Köetter, ―Data-hiding codes,‖ Proc. IEEE, vol. 93, no. 12, pp. 2083–2126, Dec. 2005.
R. J. Anderson and F. A. P. Petitcolas, ―On the limits of steganography,‖ IEEE J. Select. Areas Commun., vol. 16, no. 4, pp. 474–481, May 1998.
N. F. Johnson and S. Jajodia, ―Exploring steganography: Seeing the unseen,‖ IEEE Computer, vol. 31, no. 2, pp. 26–34, Feb. 1998.
N. Provos and P. Honeyman, ―Hide and seek: An introduction to steganography,‖ IEEE Security and Privacy Mag., vol. 1, no. 3, pp.32–44, May/Jun. 2003.
Ying Wang, Pierre Moulin ―Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions‖ IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 6, JUNE 2008
Xinpeng Zhang, Shuozhong Wang, and Zhenyu Zhou.‖ Multiple bit Assignment Steganography in Palette Images‖ IEEE SIGNAL PROCESSING LETTERS, VOL. 15, 2008.
J. Fridrich, ―A new steganographic method for palette-based images,‖ in Proc. IS&T PICS Conf., Savannah, GA, Apr. 1998, pp. 285–289.
J. Fridrich and R. Du, ―Secure steganographic methods for palette images,‖ in The 3rd Information HidingWorkshop, Lecture Notes in Computer Science, 2000, vol. 1768, pp. 47–60.
X. Zhang and S. Wang, ―Analysis of parity assignment steganography in palette images,‖ in Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Artificial Intelligence, 2005, vol. 3683, pp. 1025–1031
http://en.wikipedia.org/wiki/Portable_Executable
M. L. Miller, G. J. Doerr, and I. J. Cox, "Applying informed coding and embedding to design a robust high-capacity watermark," IEEE Trans. Image Processing, vol. 13, no. 6, pp. 792-807, 2004.
N. Damera-Venkata, T.-D. Kite, W.-S. Geisler, B.-L. Evans, and A.- C. Bovik, "Image quality assessment based on a degradation model," IEEE Trans. on Image Processing, vol. 9, no. 4, pp. 636-650, 2000.
Y.-T. Wu and F. Y. Shih, "Genetic algorithm based methodology for breaking the steganalytic systems," IEEE Trans. on Systems, Man, and Cybernetics-Part B, vol. 36, no. 1, pp. 25-3 1, 2006.
D. Levicky and P. Foris, "Human visual system models in digital image watermarking," Radioengineering, vol. 13, no. 4, pp. 38-43, Dec. 2004.
C.-Y. Lin and S.-F. Chang, "Watermarking capacity of digital images based on domain-specific masking effects," Proc. Int'l Conf on Information Technology: Coding and Computing, pp. 90-94, 2001.
K. Solanki, K. Sullivan, U. Madhow, B.S. Manjunath, and S.Chandrasekaran, "Statistical restoration for robust and secure steganography," IEEE Int'l Conf on Image Process., Vol.2, pp.11-14, 2005.
J.A. O’Sullivan, P. Moulin, and J.M. Ettinger, ―Information Theoretic Analysis of Steganography,‖ Proc. IEEE Int’l Symp.Information Theory (ISIT ’98), p. 297, Aug. 1998.
J. Zo¨ llner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, ―Modeling the Security of Steganographic Systems,‖ Proc. Second Int’l Workshop Information Hiding (IH ’98), pp. 344-354, 1998.
R.J. Anderson, ―Stretching the Limits of Steganography,‖ Proc. First Int’l Workshop Information Hiding (IH ’96), pp. 39-48, 1996. IEEE J. Selected Areas in Comm., vol. 16, no. 4, pp. 474-481, May 1998.
T. Mittelholzer, ―An Information-Theoretic Approach to Steganography and Watermarking,‖ Proc. Third Int’l Workshop Information Hiding (IH ’99), A. Pfitzmann, ed., pp. 1-16, 1999.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.