Enterprise decision support using intranet technology
Decision Support Systems
Decision support using the intranet
Decision Support Systems - Special issue: intranets and intranetworking
An Efficient Algorithm for the Kolmogorov-Smirnov and Lilliefors Tests
ACM Transactions on Mathematical Software (TOMS)
The technology acceptance model and the World Wide Web
Decision Support Systems
Journal of VLSI Signal Processing Systems - Special issue on multimedia signal processing
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Past, present, and future of decision support technology
Decision Support Systems - Special issue: Decision support systems: Directions for the next decade
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals
Proceedings of the First International Workshop on Information Hiding
Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Significance of Steganography on Data Security
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
An information-theoretic model for steganography
Information and Computation
Cyber warfare: steganography vs. steganalysis
Communications of the ACM - Voting systems
Data Masking: A New Approach for Steganography?
Journal of VLSI Signal Processing Systems
High capacity image steganography using wavelet-based fusion
ISCC '04 Proceedings of the Ninth International Symposium on Computers and Communications 2004 Volume 2 (ISCC"04) - Volume 02
Spatial domain image hiding scheme using pixel-values differencing
Fundamenta Informaticae
An overview of scalar quantization based data hiding methods
Signal Processing
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Toward an interoperable dynamic network analysis toolkit
Decision Support Systems
An associate constraint network approach to extract multi-lingual information for crime analysis
Decision Support Systems
Novel information discovery for intelligence and counterterrorism
Decision Support Systems
The role of data warehousing in bioterrorism surveillance
Decision Support Systems
Steganography for executables and code transformation signatures
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Matrix embedding for large payloads
IEEE Transactions on Information Forensics and Security
An additive approach to transform-domain information hiding andoptimum detection structure
IEEE Transactions on Multimedia
A steganographic scheme for secure communications based on the chaos and euler Theorem
IEEE Transactions on Multimedia
Information-theoretic analysis of information hiding
IEEE Transactions on Information Theory
RopSteg: program steganography with return oriented programming
Proceedings of the 4th ACM conference on Data and application security and privacy
Hi-index | 0.00 |
Information security is gaining widespread importance in distributed decision support systems [T.S. Raghu, and H. Chen, Cyberinfrastructure for homeland security: Advances in information sharing, data mining, and collaboration systems. Decision Support Systems 43 (2007) 1321-1323]. Conventional steganographic models available in the literature on information hiding use the knowledge of cover-object and stego-object to extract embedded data. Embedding algorithms have been predominantly used in steganography for hiding data whereas encoding algorithms have been used for data compression. This research study proposes a modified model for steganographic system that incorporates encoding algorithms based upon the information theoretic model documented in Cachin [C. Cachin, An Information-Theoretic Model for Steganography, Information and Computation 192 (1) (2004) 41-56.]. The differences between the conventional model and the proposed model are analyzed in this study. We further implement the proposed model by designing a novel steganographic algorithm that utilizes animations as cover-objects. The proposed approach is then compared with an encoding algorithm for gif animations and a modified embedding algorithm with animations as the cover. Gifshuffle is a steganographic software that hides data in gif animations. Digital Invisible Ink Toolkit (DIIT) is a software that uses embedding algorithm to conceal data into images. DIIT is remodeled to hide data within animated images in this study. Experiments reveal that the encoding algorithms are suitable for information hiding using animations. The study finds that the proposed encoding framework with animations provides a practical framework for analysis and has a better security performance than Gifshuffle and DIIT. Although the proposed model achieves more hiding rate, Gifshuffle is computationally faster than other techniques.