원문정보
초록
영어
Rival companies compete against each other in business and therefore they try to obtain data that is usually held in the hands of seaports. If a company succeeds to damage one of its rival companies, the company will increase in value. Therefore there is risk for any data in the hands of a port; in spite of this, there is no cybersecurity standard for the maritime industry or for enforcement agencies; despite the fact that the need of secure communication is indispensable. Still, using encrypted messages have a noteworthy disadvantage. Each person who sees the message recognizes that there is a cryptic message. This paper introduces a technique of Steganography, that is to say - transmitting encrypted messages in images compressed by the well known JPEG format. In point of fact, the system modifies the pictures a bit, but this modification is totally unnoticeable. The image seems to be an immaculate picture, while truly the picture does include some extra information.
목차
1. Introduction
2. Background for JPEG Images
3. Steganography System Using JPEG
4. Experiments
5. Conclusions and Future Work
References
저자정보
참고문헌
- 1A STEGANOGRAPHIC METHOD BASED UPON JPEG AND QUANTIZATION TABLE MODIFICATION네이버 원문 이동
- 2The effectiveness of JPEG images produced by a standard digital camera to detect damaged tyres네이버 원문 이동
- 3Fuselage Damage Locator System네이버 원문 이동
- 4Effect of Cover Quantization on Steganographic Fisher Information네이버 원문 이동
- 5(Reference title not available)
- 6(Reference title not available)
- 7(Reference title not available)
- 8Camera that takes pictures of aircraft and ground vehicle tires can save lives네이버 원문 이동
- 9A Survey on Image Steganography and Steganalysis네이버 원문 이동
- 10(Reference title not available)