22 johnson n f jajodia s stegananalysis of images

Info icon This preview shows pages 49–53. Sign up to view the full content.

22. Johnson N. F., Jajodia S., “Stegananalysis of Images Created Using Current Steganography Software”, Second Information Hiding Workshop held in Portland, Oregon, USA, April 15-17, 1998. Proceedings LNCS 1525, 273- 289, Springer-Verlag,1998 23. Katzenbeisser S., Petitcolas F.A.P., “Information Hiding Techniques for Steganography and Digital Watermarking”, Artech House, INC. 685 Canton Street Norwood, MA 02062, 2000. 24. Kharrazi M., Sencar H.T., Memon N, “Image Steganography: Concepts and Practice”, WSPC/Lecture Notes Series, April 22, 2004. 25. Lampson B.W., “A Note on the Confinement Problem”, Communications of the ACM, vol. 16. no. 10, pp. 613-615, October 1973. 26. Memon N., Wong, P., “Protecting digital media content”, Communications of the ACM, vol 41, no. 7 , pp. 34–43, July 1998. 27. Newman B.“Secrets of German Espionage”, London: Robert HaleLtd.,1940. 28. Outguess, 29. Petitcolas F.A.P., Anderson R.J., Kuhn M.G., “Information Hiding–A Survey”, Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, 87(7):1062-1078, July 1999. 30. Pfitzmann B., “Information Hiding Terminology”, In Anderson [3], pp. 347- 350, ISBN 3-540-61996-8, 1996. 31. Revelation, . 32. SAĞIROĞLU Ş., TUNÇKANAT M., “Güvenli İnternet Haberleşmesi İçin Bir Yazılım: Türksteg”, 2002. 33. Schott G., “Schola steganographica: in classes octo distributa .... ”, Jobus Hertz, printer, 1680, bound with: Gasparis Schotti...Technica curiosa... Herbipoli, [Courtesy of Whipple Science Museum, Cambridge.], 1665. 34. Sellars D., “An Introduction to Steganography”, Online book, 1999. 35. Simmons G., “The Prisoners' Problem and the Subliminal Channel", CRYPTO83 Advances in Cryptology, pp. 51-67, Aug 22 -24, 1984. 36. Stego Machine, . 48
Image of page 49

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

37. Stella, . 38. Swanson M., Kobayashi M., Tewfik A., “Multimedia Data Embedding and Watermarking Technologies”, Proc. of IEEE, vol. 86, no. 6, pp. 1064- 1087,June 1998. 39. Şatır Esra “Bilgi Güvenliği İçin Metin Steganografisinde Yeni Bir Yaklaşım” , SELÇUK ÜNİVERSİTESİ, BİLGİSAYAR MÜHENDİSLİĞİ DOKTORA TEZİ, 2013 40. Tacticus A., “How to Survive Under Siege / Aineias the Tactician”, Oxford, England: Clarendon Pres, pp. 84-90 and 183-193, Clarendon Ancient History Series, 1990. 41. Tunçkanat M., Sağıroğlu Ş., “Güvenli İletişim İçin Yeni Bir Yaklaşım: Resim İçerisine Döküman Gizleme”, GAP IV. Mühendislik Kongresi (Uluslararası Katılımlı), Şanlıurfa, vol.1, s.665-668, 6-8 Haziran 2002. 42. Ulutaş, G., Ulutaş, M. ve Nabiyev, V. V., 2012, A new casccaded secret image sharing scheme, Signal Processing and Communications Applications Conference (SIU), 2012 43. Wang H., Wang S., “Cyber Warfare: Steganography vs. Steganalysis”, Communications of the ACM, vol. 47, no. 10, October 2004. 49
Image of page 50
EKLER EK -1 Piksele Göre Analiz Kodları EK-2 En İyi Piksele Göre Analiz Kodları EK-3 Rastgele Piksele Göre Analiz Kodları EK-4 MSE Kodları 50
Image of page 51

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

EK-1 using System; using System.Collections.Generic; using System.ComponentModel; using System.Drawing; using System.Data; using System.Linq; using System.Text; using System.Threading.Tasks; using System.Windows.Forms;
Image of page 52
Image of page 53
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '18
  • traver laudon

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern