Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1047344.1047444acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
Article

A Java framework for experimentation with steganography

Published: 23 February 2005 Publication History

Abstract

This article describes a Java framework for experimentation with fundamental steganographic techniques. The framework is built on top of Java's image processing libraries and provides extensible handles for customization and experimentation. The framework is designed and presented with a view towards incorporation into an undergraduate computer science curriculum.

References

[1]
Gonzalez, R., and Woods, R. Digital Image Processing, Addison-Wesley Longman Publishing Co., Inc, Boston, Ma, 1992.
[2]
Hunt, K., Using Image Processing to Teach CS1 and CS2, ACM SIGCSE Bulletin, Volume 35, Issue 4:86--89.
[3]
Java2 Platform Standard Edition 1.4 Release 2002. Sun Microsystems. http://java.sun.com/j2se
[4]
Johnson, N. F., Steganography, web article found at http://www.jjtc.com/stegdoc/steg1995.html
[5]
Johnson, N., and Sushil, J., Steganography: Seeing the Unseen, IEEE Computer, February 1998: 26--34.
[6]
Kelley, J., Terror groups hid behind Web encryption, USA Today, February 5, 2001; available from http://www.usatoday.com/tech/news/2001-02-05-binladen.htm
[7]
Steinebach, Martin, Zmudzinski, S., and Chen, F., The Digital Watermarking Container: Secure and Efficient Embedding, Proceedings of the 2004 Multimedia and Security Workshop on Multimedia and Security, 2004:199--205.
[8]
Sutherland, K., Image Processing Programming Projects in an Upper Division Algorithms Course, Proceedings of the Midwest Instructional Computing Symposium, 2004.

Cited By

View all
  • (2013)Digital data security and hiding on virtual reality video 3D GISInternational Journal of Management Science and Engineering Management10.1080/17509653.2009.106845754:3(163-176)Online publication date: 16-May-2013
  • (2010)Software architecture for real-time steganography in auditive media2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering (SIBIRCON)10.1109/SIBIRCON.2010.5555319(100-105)Online publication date: Jul-2010
  • (2010)An Approach to Textual SteganographyGlobal Security, Safety, and Sustainability10.1007/978-3-642-15717-2_6(48-54)Online publication date: 2010
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGCSE '05: Proceedings of the 36th SIGCSE technical symposium on Computer science education
February 2005
610 pages
ISBN:1581139977
DOI:10.1145/1047344
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 February 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. computer security
  2. image processing
  3. information hiding
  4. steganography

Qualifiers

  • Article

Conference

SIGCSE05
Sponsor:
SIGCSE05: Technical Symposium on Computer Science Education
February 23 - 27, 2005
Missouri, St. Louis, USA

Acceptance Rates

Overall Acceptance Rate 1,787 of 5,146 submissions, 35%

Upcoming Conference

SIGCSE TS 2025
The 56th ACM Technical Symposium on Computer Science Education
February 26 - March 1, 2025
Pittsburgh , PA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2013)Digital data security and hiding on virtual reality video 3D GISInternational Journal of Management Science and Engineering Management10.1080/17509653.2009.106845754:3(163-176)Online publication date: 16-May-2013
  • (2010)Software architecture for real-time steganography in auditive media2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering (SIBIRCON)10.1109/SIBIRCON.2010.5555319(100-105)Online publication date: Jul-2010
  • (2010)An Approach to Textual SteganographyGlobal Security, Safety, and Sustainability10.1007/978-3-642-15717-2_6(48-54)Online publication date: 2010
  • (2009)Analyzing programming projectsACM SIGCSE Bulletin10.1145/1539024.150899941:1(377-381)Online publication date: 4-Mar-2009
  • (2009)Analyzing programming projectsProceedings of the 40th ACM technical symposium on Computer science education10.1145/1508865.1508999(377-381)Online publication date: 4-Mar-2009
  • (2006)PNG palette permuterProceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education10.1145/1140124.1140164(143-147)Online publication date: 26-Jun-2006
  • (2006)PNG palette permuterACM SIGCSE Bulletin10.1145/1140123.114016438:3(143-147)Online publication date: 26-Jun-2006
  • (2011)A novel steganographic method for gray-level images with four-pixel differencing and LSB substitution2011 International Conference on Multimedia Computing and Systems10.1109/ICMCS.2011.5945688(1-4)Online publication date: Apr-2011
  • (2008)Digital data security and hiding on virtual reality VDO 3DGIS-mapProceedings of the 2nd International Convention on Rehabilitation Engineering & Assistive Technology10.5555/1983222.1983251(108-113)Online publication date: 13-May-2008

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media