Ref-Lists - Home - KSU Faculty Member websites

Document Sample
Ref-Lists - Home - KSU Faculty Member websites Powered By Docstoc
					                                                                                                                                                                                                 Link
Paper                                                              Title                                                                        Authers                                Year
                                                                                                                                                                                                 CD
  1     An Overview of Steganography for the Computer Forensics Examiner                                              Gary C. Kessler                                                   2004     [1]
  2     Digital Steganography: Hiding data within Data.                                                               Artz D.                                                           2001     [2]
  3     Detecting Steganographic Content in Images Found on the Internet                                              Callinan, J. and Kemick, D                                        2003     [3]
  4     A Mathematical Approach to Steganalysis.                                                                      Chandramouli, R.                                                  2002     [4]
  5     An Evaluation of Image Based Steganography Methods.                                                           Curran, K. and Bailey, K.                                         2003     [5]
  6     Detecting Steganographic Messages in Digital Images.                                                          Farid, H.                                                         2001     [6]
  7     Higher-Order Wavelet Statistics and their Application to Digital Forensics.                                   Farid, H. and Lyu, S.                                             2003     [7]
  8     Secure Steganographic Methods for Palette Images.                                                             Fridrich, J. and Du, R.                                           2000     [8]
  9     PNG (Portable Network Graphics) Specification V. 1.2                                                          G. Randers-Pehrson, et. al.                                       1999     [9]
 10     JPEG File Interchange Format V. 1.02                                                                          Hamilton, E.                                                      1992     [10]
 11     Attacking the OutGuess.                                                                                       Fridrich, J., Goljan, M., and Hogea, D.                           2002     [11]
 12     Steganography-The Art of Hiding Data                                                                          Kefa Rabah                                                        2004     [12]
 13     "Chameleon" image Steganography software                                                                      Mark David                                                        2003     [13]
 14     Quantitative Steganalysis of Digital Images: Estimating the Secret Message Length.                            Fridrich, J., Goljan, M., Hogea, D., and Soukal, D.               2003     [14]
 15     Discovering Covert Digital Evidence.                                                                          Hosmer, C. and Hyde, C.                                           2003     [15]
 16     Blind Steganography Detection Using a Computational Immune System: A Work in Progress.                        Jackson, J.T., Gunsch, G.H., Claypoole, R.L., and Lamont, G.B.    2003     [16]
 17     Exploring Steganography: Seeing the Unseen.                                                                   Johnson, N.F. and Jajodia, S.                                     1998     [17]
 18     StegFS: A Steganographic File System for Linux.                                                               McDonald, A.D. and Kuhn, M.G.                                     2000     [18]
 19     Steganalysis of Audio Based on Audio Quality Metrics.                                                         Özer, H., Avýbas, I., Sankur, B., and Memon N.                    2003     [19]
 20     The Debtor's Digital Reckonings.                                                                              Seward, J.                                                        2003     [20]
 21     Electronic Crime Scene Investigation: A Guide for First Responders.                                           John Ashcroft                                                     2001     [21]
 22     Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations.                                                                                   2002     [22]
                                                                                                                      Computer Crime and Intellectual Property Section-Criminal Division-United States Department of Justice
 23     A New Steganographic Method for Palette-Based Images.                                                         Jiri Fridrich                                                     1999     [23]
 24     Steganalysis of LSB Encoding in Color Images                                                                  Fridrich, J., Rui Du and Long Meng                                2000     [24]
 25     Steganalysis Based on JPEG Compatibility                                                                      Fridrich, J., M. Goljan and R. Du                                 2001     [25]
 26     Reliable Detection of LSB Steganography in Grayscale and Color Images                                         Fridrich, J., M. Goljan and R. Du                                 2001     [26]
 27     Hide and Seek: An Introduction to Steganography                                                               Niels Provos, Peter Honeyman                                      2003     [27]
 28     Practical Steganalysis – State of the Art                                                                     Fridrich, J., M. Goljan                                           2002     [28]
 29     A New Paradigm Hidden in Steganography                                                                        Ira S. Moskowitz, Garth E. Longdon, LiWu Chang                    2000     [29]
 30     Steganalysis of JPEG Images: Breaking the F5 Algorithm                                                        Fridrich, J., M. Goljan and D. Hogea                              2002     [30]
 31     Digital Image Steganography Using Stochastic Modulation                                                       Fridrich, J., M. Goljan                                           2003     [31]
 32     Higher-Order Statistical Steganalysis of Palette Images                                                       Fridrich, J., M. Goljan and D. Soukal                             2003     [32]
 33     New Methodology for Breaking Steganographic Techniques for JPEGs                                              Fridrich, J., M. Goljan and D. Hogea                              2003     [33]
 34     Searching for the Stego Key                                                                                   Fridrich, J., M. Goljan and D. Soukal                             2004     [34]
 35     On Estimation of Secret Message Length in LSB Steganography in Spatial Domain                                 Fridrich, J., M. Goljan                                           2004     [35]
 36     Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes   Fridrich, J                                                       2004     [36]
 37     Perturbed Quantization Steganography with Wet Paper Codes                                                     Fridrich, J., M. Goljan and D. Soukal                             2004     [37]
 38     Writing on Wet Paper                                                                                          Fridrich, J., M. Goljan, P. Lisonek, and D. Soukal                2005     [38]
 39     Forensic Steganalysis: Determining the Stego Key in Spatial Domain Steganography                              Fridrich, J., M. Goljan, D. Soukal, and T. Holotyak               2005     [39]
 40     Handling Uneven Embedding Capacity in Binary Images: A Revisit                                                ridrich, J., Min Wu, M. Goljan, and H. Gou                        2005     [40]
 41     Maximum Likelihood Estimation of Secret Message Length Embedded Using ±K Steganography in Spatial Domain      Fridrich, J., D. Soukal and M. Goljan                             2005     [41]
 42     Stochastic Approach to Secret Message Length Estimation in ±k Embedding Steganography                         Fridrich, J., T.S. Holotyak and D. Soukal                         2005     [42]
 43     Determining Digital Image Origin Using Sensor Imperfections                                                   Fridrich, J., J. Lukas and M. Goljan                              2005     [43]
 44     High Capacity Despite Better Steganalysis (F5–A Steganographic Algorithm)                                     Westfeld, A.                                                      2001     [44]
    Web Link
www.<1>.com    http://www.wetstonetech.com/f/stego-kessler.pdf
www.<2>.com    http://www.cc.gatech.edu/classes/AY2003/cs6262_fall/digital_steganography.pdf
www.<3>.com    http://www.chromesplash.com/jcallinan.com/publications/steg.pdf
www.<4>.com    http://www.ece.stevens-tech.edu/~mouli/spiesteg02.pdf
www.<5>.com    http://www.ijde.org/docs/03_fall_steganography.pdf
www.<6>.com    http://www.cs.dartmouth.edu/~farid/publications/tr01.pdf
www.<7>.com    http://www.cs.dartmouth.edu/~farid/publications/sacv03.pdf
www.<8>.com    http://www.ws.binghamton.edu/fridrich/Research/ihw99_paper1.dot
www.<9>.com    http://www.libpng.org/pub/png/spec/1.2/png-1.2.pdf
www.<10>.com   http://www.w3.org/Graphics/JPEG/jfif3.pdf
www.<11>.com   http://www.ws.binghamton.edu/fridrich/Research/acm_outguess.pdf
www.<12>.com   http://www.ansinet.org/fulltext/itj/itj33245-269.pdf
www.<13>.com   http://chameleon-stego.tripod.com/downloads/Chameleon_Technical_Paper.pdf
www.<14>.com   http://www.ws.binghamton.edu/fridrich/Research/mms100.pdf
www.<15>.com   http://www.dfrws.org/dfrws2003/presentations/Paper-Hosmer-digitalevidence.pdf
www.<16>.com   http://www.ijde.org/docs/02_winter_art4.pdf
www.<17>.com   http://www.jjtc.com/pub/r2026.pdf
www.<18>.com   http://www.cl.cam.ac.uk/%7Emgk25/ih99-stegfs.pdf
www.<19>.com   http://www.busim.ee.boun.edu.tr/%7Esankur/SankurFolder/Audio_Steganalysis_16.doc
www.<20>.com   http://www.ijde.org/docs/03_fall_seward.pdf
www.<21>.com   http://www.ncjrs.org/pdffiles1/nij/187736.pdf
www.<22>.com   http://www.cybercrime.gov/s&smanual2002.pdf
www.<23>.com   http://www.ws.binghamton.edu/fridrich/Research/pics99.doc
www.<24>.com   http://www.ws.binghamton.edu/fridrich/Research/icme00b.doc
www.<25>.com   http://www.ws.binghamton.edu/fridrich/Research/jpgstego01.pdf
www.<26>.com   http://www.ws.binghamton.edu/fridrich/Research/acmwrkshp_version.pdf
www.<27>.com   http://niels.xtdnet.nl/papers/practical.pdf
www.<28>.com   http://www.ws.binghamton.edu/fridrich/Research/steganalysis01.pdf
www.<29>.com   http://chacs.nrl.navy.mil/publications/CHACS/2000/2000moskowitz-stego.pdf
www.<30>.com   http://www.ws.binghamton.edu/fridrich/Research/f5.pdf
www.<31>.com   http://www.ws.binghamton.edu/fridrich/Research/stochastic_modulation02.pdf
www.<32>.com   http://www.ws.binghamton.edu/fridrich/Research/pairs01.pdf
www.<33>.com   http://www.ws.binghamton.edu/fridrich/Research/jpeg01.pdf
www.<34>.com   http://www.ws.binghamton.edu/fridrich/Research/Keysearch_SPIE.pdf
www.<35>.com   http://www.ws.binghamton.edu/fridrich/Research/new_LSB1.pdf
www.<36>.com   http://www.ws.binghamton.edu/fridrich/Research/Blind_JPEGb.pdf
www.<37>.com   http://www.ws.binghamton.edu/fridrich/Research/p44-fridrich.pdf
www.<38>.com   http://www.ws.binghamton.edu/fridrich/Research/EI5681-33_WPC.pdf
www.<39>.com   http://www.ws.binghamton.edu/fridrich/Research/EI5681-63_KS.pdf
www.<40>.com   http://www.ws.binghamton.edu/fridrich/Research/EI5681-20_WuFri.pdf
www.<41>.com   http://www.ws.binghamton.edu/fridrich/Research/EI5681-60_pmK_David.pdf
www.<42>.com   http://www.ws.binghamton.edu/fridrich/Research/EI5681-67_pmK_Taras.pdf
www.<43>.com   http://www.ws.binghamton.edu/fridrich/Research/EI5685-29_Forensic.pdf
www.<44>.com   http://os.inf.tu-dresden.de/~westfeld/publikationen/f5.pdf
                                                                                                                                                                                                           Link
Paper                                               Title                                                                                      Authers                                            Year              Web Link
                                                                                                                                                                                                            CD
 1      An Overview of Steganography for the Computer Forensics Examiner                                         Gary C. Kessler                                                                  2004       [1]   www.<1>.com
 2      Digital Steganography: Hiding data within Data.                                                          Artz D.                                                                          2001       [2]   www.<2>.com
 3      Detecting Steganographic Content in Images Found on the Internet                                         Callinan, J. and Kemick, D                                                       2003       [3]   www.<3>.com
 4      A Mathematical Approach to Steganalysis.                                                                 Chandramouli, R.                                                                 2002       [4]   www.<4>.com
 5      An Evaluation of Image Based Steganography Methods.                                                      Curran, K. and Bailey, K.                                                        2003       [5]   www.<5>.com
 6      Detecting Steganographic Messages in Digital Images.                                                     Farid, H.                                                                        2001       [6]   www.<6>.com
 7      Higher-Order Wavelet Statistics and their Application to Digital Forensics.                              Farid, H. and Lyu, S.                                                            2003       [7]   www.<7>.com
 8      Secure Steganographic Methods for Palette Images.                                                        Fridrich, J. and Du, R.                                                          2000       [8]   www.<8>.com
 9      PNG (Portable Network Graphics) Specification V. 1.2                                                     G. Randers-Pehrson, et. al.                                                      1999       [9]   www.<9>.com
 10     JPEG File Interchange Format V. 1.02                                                                     Hamilton, E.                                                                     1992      [10]   www.<10>.com
 11     Attacking the OutGuess.                                                                                  Fridrich, J., Goljan, M., and Hogea, D.                                          2002      [11]   www.<11>.com
 12     Steganography-The Art of Hiding Data                                                                     Kefa Rabah                                                                       2004      [12]   www.<12>.com
 13     "Chameleon" image Steganography software                                                                 Mark David                                                                       2003      [13]   www.<13>.com
 14     Quantitative Steganalysis of Digital Images: Estimating the Secret Message Length.                       Fridrich, J., Goljan, M., Hogea, D., and Soukal, D.                              2003      [14]   www.<14>.com
 15     Discovering Covert Digital Evidence.                                                                     Hosmer, C. and Hyde, C.                                                          2003      [15]   www.<15>.com
 16     Blind Steganography Detection Using a Computational Immune System: A Work in Progress.                   Jackson, J.T., Gunsch, G.H., Claypoole, R.L., and Lamont, G.B.                   2003      [16]   www.<16>.com
 17     Exploring Steganography: Seeing the Unseen.                                                              Johnson, N.F. and Jajodia, S.                                                    1998      [17]   www.<17>.com
 18     StegFS: A Steganographic File System for Linux.                                                          McDonald, A.D. and Kuhn, M.G.                                                    2000      [18]   www.<18>.com
 19     Steganalysis of Audio Based on Audio Quality Metrics.                                                    Özer, H., Avýbas, I., Sankur, B., and Memon N.                                   2003      [19]   www.<19>.com
 20     The Debtor's Digital Reckonings.                                                                         Seward, J.                                                                       2003      [20]   www.<20>.com
 21     Electronic Crime Scene Investigation: A Guide for First Responders.                                      John Ashcroft                                                                    2001      [21]   www.<21>.com
 22                                                                                                                                                                                               2002
        Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. Computer Crime and Intellectual Property Section-Criminal Division-United States Department of Justice[22]   www.<22>.com
 23     A New Steganographic Method for Palette-Based Images.                                                    Jiri Fridrich                                                                    1999      [23]   www.<23>.com
 24     Steganalysis of LSB Encoding in Color Images                                                             Fridrich, J., Rui Du and Long Meng                                               2000      [24]   www.<24>.com
 25     Steganalysis Based on JPEG Compatibility                                                                 Fridrich, J., M. Goljan and R. Du                                                2001      [25]   www.<25>.com
 26     Reliable Detection of LSB Steganography in Grayscale and Color Images                                    Fridrich, J., M. Goljan and R. Du                                                2001      [26]   www.<26>.com
 27     Hide and Seek: An Introduction to Steganography                                                          Niels Provos, Peter Honeyman                                                     2003      [27]   www.<27>.com
 28     Practical Steganalysis – State of the Art                                                                Fridrich, J., M. Goljan                                                          2002      [28]   www.<28>.com
 29     A New Paradigm Hidden in Steganography                                                                   Ira S. Moskowitz, Garth E. Longdon, LiWu Chang                                   2000      [29]   www.<29>.com
 30     Steganalysis of JPEG Images: Breaking the F5 Algorithm                                                   Fridrich, J., M. Goljan and D. Hogea                                             2002      [30]   www.<30>.com
 31     Digital Image Steganography Using Stochastic Modulation                                                  Fridrich, J., M. Goljan                                                          2003      [31]   www.<31>.com
 32     Higher-Order Statistical Steganalysis of Palette Images                                                  Fridrich, J., M. Goljan and D. Soukal                                            2003      [32]   www.<32>.com
 33     New Methodology for Breaking Steganographic Techniques for JPEGs                                         Fridrich, J., M. Goljan and D. Hogea                                             2003      [33]   www.<33>.com
 34     Searching for the Stego Key                                                                              Fridrich, J., M. Goljan and D. Soukal                                            2004      [34]   www.<34>.com
 35     On Estimation of Secret Message Length in LSB Steganography in Spatial Domain                            Fridrich, J., M. Goljan                                                          2004      [35]   www.<35>.com
 36                                                                                                              Fridrich, J
        Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes                                                                               2004      [36]   www.<36>.com
 37     Perturbed Quantization Steganography with Wet Paper Codes                                                Fridrich, J., M. Goljan and D. Soukal                                            2004      [37]   www.<37>.com
 38     Writing on Wet Paper                                                                                     Fridrich, J., M. Goljan, P. Lisonek, and D. Soukal                               2005      [38]   www.<38>.com
 39     Forensic Steganalysis: Determining the Stego Key in Spatial Domain Steganography                         Fridrich, J., M. Goljan, D. Soukal, and T. Holotyak                              2005      [39]   www.<39>.com
 40     Handling Uneven Embedding Capacity in Binary Images: A Revisit                                           ridrich, J., Min Wu, M. Goljan, and H. Gou                                       2005      [40]   www.<40>.com
 41     Maximum Likelihood Estimation of Secret Message Length Embedded Using ±K Steganography in Spatial Domain J., D. Soukal and M. Goljan
                                                                                                                 Fridrich,                                                                        2005      [41]   www.<41>.com
 42     Stochastic Approach to Secret Message Length Estimation in ±k Embedding Steganography                    Fridrich, J., T.S. Holotyak and D. Soukal                                        2005      [42]   www.<42>.com
 43     Determining Digital Image Origin Using Sensor Imperfections                                              Fridrich, J., J. Lukas and M. Goljan                                             2005      [43]   www.<43>.com
 44     High Capacity Despite Better Steganalysis (F5–A Steganographic Algorithm)                                Westfeld, A.                                                                     2001      [44]   www.<44>.com

				
DOCUMENT INFO
Shared By:
Categories:
Stats:
views:13
posted:5/5/2011
language:English
pages:3