Стегоанализ графических данных на основе методов сжатия
Аннотация
Список литературы
1. A. Westfeld, A. Pfitzmann. Attacks on Steganographic Systems. Breaking the Steganographic Utilities EzStego, Jsteg, Steganos and S-Tools - and Some Lessons Learned. Lecture Notes in Computer Science, 1768:61-75, 2000.
2. N. Provos, P. Honeyman. Hide and Seek: An Introduction to Steganography. IEEE Security & Privacy, may/june 2003, pp. 32-44.
3. O. Dabeer, K. Sullivan, U. Madhow, S. Chandrasekaran, and B. S. Manjunath. Detection of hiding in the least significant bit. In IEEE Trans. on Signal Processing,volume 52, pages 3046-3058, Oct. 2004.
4. J. Fridrich, M. Goljan, and R. Du. Reliable Detection of LSB Steganography in Color and Grayscale Images. Proc. of the ACM Workshop on Multimedia and Security, pp. 27-30, 2001.
5. B. Ryabko, J. Astola. Universal Codes as a Basis for Time Series Testing. Statistical Methodology, v.3, pp.375-397, 2006.
6. BMP format in MSDN - <http://msdn.microsoft.com/en-us/library/ms532311.aspx>
7. JPEG committee - <http://www.jpeg.org>
8. Independent JPEG Group library for JPEG image compression -http://www.ijg.org
Рецензия
Для цитирования:
Жилкин М.Ю. Стегоанализ графических данных на основе методов сжатия. Вестник СибГУТИ. 2008;(2):62-66.