Have a personal or library account? Click to login
Development of Requirements Specification for Steganographic Systems Cover

Development of Requirements Specification for Steganographic Systems

Open Access
|Jan 2017

References

  1. [1] I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich and T. Kalker, Digital Watermarking and Steganography, 2nd ed. Burlington: Morgan Kaufmann, 2008, 624 p.10.1016/B978-012372585-1.50015-2
  2. [2] C. Everett, “Should encryption software be banned?” Network Security, vol. 2016, iss. 8, pp. 14–17, Aug. 2016. https://doi.org/10.1016/S1353-4858(16)30078-210.1016/S1353-4858(16)30078-2
  3. [3] P. Mozur, The New York Times. New Rules in Chine Upset Western Tech Companies. 2015. [Online]. Available: http://www.nytimes.com/2015/01/29/technology/in-china-new-cybersecurity-rules-perturb-western-tech-companies.html [Accessed: Oct. 9, 2016].
  4. [4] I. Sommerville, Software Engineering, 10th ed. USA: Pearson, 2015, 816 p.
  5. [5] IEEE Recommended Practice for Software Requirements Specifications, IEEE Std 830-1998, 1998. https://doi.org/10.1109/IEEESTD.1998.8828610.1109/IEEESTD.1998.88286
  6. [6] MITRE. (2016) Develop System-Level Technical Requirements. [Online]. Available: https://www.mitre.org/publications/systems-engineering-guide/se-lifecycle-building-blocks/system-design-and-development/develop-systemlevel-technical-requirements [Accessed: Oct. 8, 2016].
  7. [7] G. Konahovich and A. Puzirenko, Digital Steganography, Theory and Practise - Компьютерная стеганография, теория и практика. Kiev: MK-Press, 2006, 286 p. (in Russian).
  8. [8] N. Hamid, A. Yahya, R. B. Ahmad and O. M. AI-Qershi, “Image Steganography Techniques: An Overview,” International Journal of Computer Science and Security (IJCSS), vol. 6, no. 3, pp. 168–187, June 2012.
  9. [9] A. H. Lashkari, A. A. Manaf and M. Masrom, Magic Hexagon Image Steganography Evaluator. [Online]. Available: http://www.academia.edu/1014807/Magic_Hexagon_Image_Steganography_Evaluator [Accessed: Oct. 8, 2016]
  10. [10] V. Gribunin, I. Okov and I. Turincev, Digital Steganography, Aspects of Protection - Цифровая стеганография, аспекты защиты. Moscow: Solon-press, 2009, 265 p. (in Russian).
  11. [11] A. Jersovs, V. Zabiniako and P. Semencuks, “Using Concatenated Steganography for Visual Analysis in GIS SOA,” Applied Computer Systems, vol. 13, pp. 74–82, Nov. 2012. https://doi.org/10.2478/v10312-012-0010-610.2478/v10312-012-0010-6
  12. [12] T. Morkel, J. H. P. Eloff and M. S. Olivier, “An Overview of Image Steganography,” in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, Africa, June/July 2005.
  13. [13] M. Kharrazi, H. T. Sencar and N. Memon, “Cover Selection for Steganographic Embedding,” in International Conference on Image Processing, Atlanta, Georgia, USA, 2006, pp. 317–326. https://doi.org/10.1109/icip.2006.31238610.1109/ICIP.2006.312386
  14. [14] Spammimic. (2015). Spam mimic. [Online]. Available: http://www.spammimic.com/ [Accessed: Oct. 9, 2016].
  15. [15] T. H. Cormen, C. E. Leiserson, R. L. Rivest and C. Stein, Introduction to Algorithms, 3rd ed. Massachusetts: The MIT Press, 2009, 1312 p.
  16. [16] M. K. Kundu and S. Das, “Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding,” in International Conference on Pattern Recognition, Istanbul, Turkey, Aug. 23–26, 2010, pp. 1457–1460. https://doi.org/10.1109/icpr.2010.36010.1109/ICPR.2010.360
  17. [17] International Telecommunication Union. (2012). Methodology for the subjective assessment of the quality of television pictures. Recommendation ITU-R BT.500-13. [Online]. Available: https://www.itu.int/rec/R-REC-BT.500-13-201201-I/en [Accessed: Oct. 8, 2016]
  18. [18] R. Böhme, “Principles of Modern Steganography and Steganalysis,” Information Security and Cryptography (Information Security and Cryptography), pp. 11–77, 2010. https://doi.org/10.1007/978-3-642-14313-7_210.1007/978-3-642-14313-7_2
  19. [19] H. Sajedi, “Steganalysis based on steganography pattern discovery,” Journal of Information Security and Applications, vol. 30, pp. 3–14, Oct. 2016. https://doi.org/10.1016/j.jisa.2016.04.00110.1016/j.jisa.2016.04.001
  20. [20] D. Lerch-Hostalot and D. Megias, “Unsupervised steganalysis based on artificial training sets,” Engineering Applications of Artificial Intelligence, vol. 50, pp. 45–59, Apr. 2016. https://doi.org/10.1016/j.engappai.2015.12.01310.1016/j.engappai.2015.12.013
  21. [21] T. Sloan and J. Hernandez-Castro, “Steganalysis of OpenPuff through atomic concatenation of MP4 flags,” Digital Investigation, vol. 13, pp. 15–21, June 2015. https://doi.org/10.1016/j.diin.2015.02.00210.1016/j.diin.2015.02.002
  22. [22] G. Luo and X. Sun, “An Evaluation Scheme for Steganalysis-proof Ability of Steganographic Algorithms,” in International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Haohsiung, Taiwan, Nov. 26–28, 2007, pp. 126–129. https://doi.org/10.1109/iih-msp.2007.8510.1109/IIH-MSP.2007.85
  23. [23] J. Cummins, P. Diskin, S. Lau and R. Parlett. (2004). Steganography and Digital Watermarking. [Online]. Available: http://www.cs.bham.ac.uk/~mdr/teaching/modules03/security/students/SS5/Steganography.htm [Accessed: Oct. 8, 2016].
  24. [24] D. Kahn, The Codebreakers. New York: Scribner, 1996, 1224 p.
  25. [25] A. Jersovs and P. Rusakovs, “Kutter Steganographical Method’s Improvement and Concept of Universal Stegoconstructor,” in Computer Sciences, vol. 38, pp. 198–208, Jan. 2009. https://doi.org/10.2478/v10143-009-0018-610.2478/v10143-009-0018-6
  26. [26] M. Kharrazi, H. T. Sencar and N. Memon, “Benchmarking steganographic and steganalysis techniques,” in Proceedings of the SPIE, vol. 5681, pp. 252–263, March 2005. https://doi.org/10.1117/12.58737510.1117/12.587375
DOI: https://doi.org/10.1515/acss-2016-0014 | Journal eISSN: 2255-8691 | Journal ISSN: 2255-8683
Language: English
Page range: 40 - 48
Published on: Jan 23, 2017
Published by: Riga Technical University
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2017 Dāvids Grībermans, Andrejs Jeršovs, Pāvels Rusakovs, published by Riga Technical University
This work is licensed under the Creative Commons Attribution 4.0 License.