New Approach of Hidden Data in the portable Executable File without Change the Size of Carrier File Using Statistical Technique
暂无分享,去创建一个
A. A. Zaidan | B. B. Zaidan | Shihab A. Hameed | Wajdi Fawzi Mohammed Al-Khateeb | Teddy Surya Gunawan | Ahmed Wathik Naji | Othman O-Khalifa
[1] Bilal Bahaa Zaidan,et al. High Rate Video Streaming Steganography , 2009, 2009 International Conference on Future Computer and Communication.
[2] Fazida Othman,et al. An Extensive Empirical Study for the Impact of Increasing Data Hidden on the Images Texture , 2009, 2009 International Conference on Future Computer and Communication.
[3] Md Rafiqul Islam,et al. "Stego-Analysis Chain, Session Two" Novel Approach of Stego-Analysis System for Image File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.
[4] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[5] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[6] A. A. Zaidan,et al. "Stego-Analysis Chain, Session One" Investigations on Steganography Weakness vs Stego-Analysis System for Multimedia File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.
[7] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.
[8] Paul Davern,et al. Steganography: Its History and Its Application to Computer Based Data Files , 1995 .