Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Non-Specialized File Format Extension
Blake W. Ford, Khosrow Kaikhah
Pages - 425 - 432 | Revised - 01-11-2011 | Published - 15-12-2011
MORE INFORMATION
KEYWORDS
steganography, CAD, metadata
ABSTRACT
The study expands upon previous work in format extension. The initial research purposed extra space provided by an unrefined format to store metadata about the file in question. This process does not negatively impact the original intent of the format and allows for the creation of new derivative file types with both backwards compatibility and new features. The file format extension algorithm has been rewritten entirely in C++ and is now being distributed as an open source C/C++ static library, roughdraftlib. The files from our previous research are essentially binary compatible though a few extra fields have been added for developer convenience. The new data represents the current and oldest compatible versions of the binary and values representing the scaling ratio of the image. These new fields are statically included in every file and take only a few bytes to encode, so they have a trivial effect on the overall encoding density.
1 | Google Scholar |
2 | Academic Journals Database |
3 | CiteSeerX |
4 | refSeek |
5 | Bielefeld Academic Search Engine (BASE) |
6 | Scribd |
7 | SlideShare |
8 | PdfSR |
B. W. Ford and K, Kaikhah. “File Format Extension Through Steganography,” presented at the International Conference on Software Engineering, Management & Application, Kathmandu, Nepal, 2010. | |
B. W. Ford and K, Kaikhah. “Honing File Format Extension Through Steganography,” presented at the International Conference on Infocomm Technologies in Competitive Strategies, Singapore, 2010. | |
C. M.C. Chen, S. S. Agaian, and C. L. P. Chen. “Generalized collage steganography on images." In Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 2008, pp. 1043-1047. | |
G. Cantrell and D. D. Dampier. “Experiments in hiding data inside the file structure of common office documents: a steganography application.” In Proceedings of the International Symposium on information and Communication Technologies, 2004, pp. 146- 151. | |
G.A. Francia and T. S. Gomez. “Steganography obliterator: an attack on the least significant bits.” In Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006, pp. 85-91. | |
J. Fridrich, T. Pevný, and J. Kodovský. “Statistically undetectable jpeg steganography: dead ends challenges, and opportunities.” In Proceedings of the 9th Workshop on Multimedia and Security, 2007, pp. 3-14. | |
J. Fridrich. “Minimizing the embedding impact in steganography.” In Proceedings of the 8th Workshop on Multimedia and Security, 2006, pp. 2-10. | |
Z. Oplatkova, J. Holoska, I. Zelinka, and R. Senkerik. “Detection of Steganography Inserted by OutGuess and Steghide by Means of Neural Networks.” In Proceedings of the Third Asia International Conference on Modeling and Simulation, 2009, pp. 25-29. | |
Mr. Blake W. Ford
- United States of America
Dr. Khosrow Kaikhah
Texas State University - United States of America
kk02@txstate.edu
|
|
|
|
View all special issues >> | |
|
|