Trends in steganography
Top Cited Papers
- 1 March 2014
- journal article
- review article
- Published by Association for Computing Machinery (ACM) in Communications of the ACM
- Vol. 57 (3), 86-95
- https://doi.org/10.1145/2566590.2566610
Abstract
Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged.Keywords
This publication has 21 references indexed in Scilit:
- Hiding information in a Stream Control Transmission ProtocolComputer Communications, 2012
- PadSteg: introducing inter-protocol steganographyTelecommunication Systems, 2011
- An asynchronous covert channel using spamComputers & Mathematics with Applications, 2011
- Steganography in IEEE 802.11 OFDM symbolsSecurity and Communication Networks, 2011
- Digital image steganography: Survey and analysis of current methodsSignal Processing, 2010
- Hydan: Hiding Information in Program BinariesLecture Notes in Computer Science, 2004
- Information hiding-a surveyProceedings of the IEEE, 1999
- Covert channels in the TCP/IP protocol suiteFirst Monday, 1997
- OSI Reference Model--The ISO Model of Architecture for Open Systems InterconnectionIEEE Transactions on Communications, 1980
- A note on the confinement problemCommunications of the ACM, 1973