СРАВНЕНИЕ МЕТОДОВ СТЕГАНОГРАФИИ В ИЗОБРАЖЕНИЯХ
Аннотация
Об авторах
С. А. СейедиРоссия
Р. Х,. Садыхов
Россия
Список литературы
1. Currie, D.L. Surmounting the effects of lossy compression on Steganography / D.L. Currie,C.E. Irvine // 19th National Information Systems Security Conference. – Baltimore, 1996.
2. Ahsan, K. Practical Data hiding in TCP/IP / K. Ahsan, D. Kundur // Proceedings of the Workshop on Multimedia Security at ACM Multimedia. – Canada, 2002.
3. Johnson, N.F. Exploring Steganography: Seeing the Unseen / N.F. Johnson, S. Jajodia // Computer Journal. – 1998. – Vol. 31, № 2. – P. 26–34.
4. Katzenbeisser, S. Information Hiding Techniques for Steganography and Digital Watermarking / S. Katzenbeisser, F.A.P. Petitcolas. – Norwood, MA : Artech House, 2000.
5. Niimi, M. High Capacity and Secure Digital Steganography to Palette-Based Images / M. Niimi // IEEE International conference on image processing. – Japan, 2002. – Vol. 2. – P. 917–920.
6. Al-Sadoon, B. On the Development of Steganographic Tools / B. Al-Sadoon, H. Mathkour, Gh. Assassa // Proceedings of the 1st National Information Technology Symposium, NITS. – Riyadh, Saudi Arabia, 2006.
7. Morkel, T. An Overview of Image Steganography / T. Morkel, J.H.P. Eloff, M.S. Olivier. – South Africa : University of Pretoria, 2002.
8. Bender W. Techniques for data hiding / W. Bender, D.Gruhl // IBM Systems Journal. – 1996. – Vol. 35, № 3–4.
9. Krenn, R. Steganography and steganalysis, Internet Publication, March 2004 [Electronic resource] / R. Krenn. – Mode of access : http://www.krenn.nl/univ/cry/steg/article.pdf. – Date of access : 24.12.2012.
10. Steganography Software [Electronic resource]. – Mode of access : http://www.jjtc.com/Steganography/tools.html. – Date of access : 23.12.2012.
11. Brundick, F. Implementation of Spread Spectrum Image Steganography / F. Brundick, L. Marvel [Electronic resource]. – 2001. – Mode of access : http://permanent.access.gpo.gov/gpo2618/ARL-TR-2433.pdf. – Date of access : 24.12.2012.
12. Chang, C.C. Introduction to the Visual Cryptography / C.C. Chang, L.Z. Chuang // Communication of the Chinese Cryptology and Information Security Association (CCISA). – 2004. – Vol. 10, № 2. – P. 1–14.
13. Meenu Kumari, A. JPEG Compression Steganography & Crypography Using Image-Adaptation Technique / A. Meenu Kumari, P. Khare // Journal of Advances in Information Technology.– 2010. – Vol. 1, № 3.
14. Bushra Kassim Al-Abudi. Colour Image Data Compression Using Multilevel Block Trunsaction Coding Technique / Bushra Kassim Al-Abudi // Phd Thesis. – Baghdad : College of Science,2002.
15. Sua’d Kakil, A. Image in Image Hiding System using Iterated Function System (IFS) /A. Sua’d Kakil // Msc Thises. – Iraq : University of Sulaimani, 2009.
16. Khosravi, S. A new steganography method based HIOP (Higher Intensity Of Pixel) algorithm and Strassen's matrix multiplication / S. Khosravi, M.A. Dezfoli, M.H. Yektaie // Journal of Global Research in Computer Science. – 2011. – Vol. 2, № 1.
17. Mathkour, H. A New Image Steganography Technique / H. Mathkour, B. Al-Sadoon, A. Touir // Wireless Communications, Networking and Mobile Computing (WiCOM) : 4th International Conference on IEEE. – Dalian, China, 2008. – P. 1–4.
18. Babu, S. Authentication of Secret Information in Image Steganography / S. Babu, K.B. Raja // IEEE. – India : University of Heydarabad, 2008. – P. 1–6.
Рецензия
Для цитирования:
Сейеди С.А., Садыхов Р.Х. СРАВНЕНИЕ МЕТОДОВ СТЕГАНОГРАФИИ В ИЗОБРАЖЕНИЯХ. Информатика. 2013;(1):66-75.
For citation:
Seyyedi S.A., Sadykhov R.Kh. COMPARISON OF DIGITAL IMAGE STEGANOGRAPHY METHODS. Informatics. 2013;(1):66-75. (In Russ.)