A novel steganographic methodology for high capacity data hiding in executable files
暂无分享,去创建一个
[1] Lisa M. Marvel,et al. A methodology for data hiding using images , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).
[2] Mike Van Emmerik,et al. Using a decompiler for real-world source recovery , 2004, 11th Working Conference on Reverse Engineering.
[3] Gadadhar Sahoo,et al. Some New Methodologies for Image Hiding using Steganographic Techniques , 2012, ArXiv.
[4] Subariah Ibrahim,et al. Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..
[5] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[6] Christian S. Collberg,et al. On the Limits of Software Watermarking , 1998 .
[7] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998 .
[8] K.B. Raja,et al. A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.
[9] Gadadhar Sahoo,et al. Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization , 2008 .
[10] Angelos D. Keromytis,et al. Hydan: Hiding Information in Program Binaries , 2004, ICICS.
[11] Jean-Jacques Quisquater,et al. Robust Object Watermarking: Application to Code , 1999, Information Hiding.
[12] Lisa M. Marvel,et al. Hiding information in images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).