{"title":"使用桶隐写的信息隐藏","authors":"Katarzyna Koptyra, M. Ogiela","doi":"10.1109/ISSREW53611.2021.00085","DOIUrl":null,"url":null,"abstract":"This paper describes bucket steganography-a data hiding technique in which secret message may be extracted from the carrier with standard software preinstalled in operating system, and with inconspicuous graphical applications, like GIMP, Paint or Photoshop. First, the carrier file should be presented in chosen base, for example hexadecimal, octal, etc. Then the user takes the screenshot of the listing and fill its background with bucket tool. In this way the secret message appears and may be read from unfilled regions of different color.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"315 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Information Hiding using Bucket Steganography\",\"authors\":\"Katarzyna Koptyra, M. Ogiela\",\"doi\":\"10.1109/ISSREW53611.2021.00085\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper describes bucket steganography-a data hiding technique in which secret message may be extracted from the carrier with standard software preinstalled in operating system, and with inconspicuous graphical applications, like GIMP, Paint or Photoshop. First, the carrier file should be presented in chosen base, for example hexadecimal, octal, etc. Then the user takes the screenshot of the listing and fill its background with bucket tool. In this way the secret message appears and may be read from unfilled regions of different color.\",\"PeriodicalId\":385392,\"journal\":{\"name\":\"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)\",\"volume\":\"315 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISSREW53611.2021.00085\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISSREW53611.2021.00085","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper describes bucket steganography-a data hiding technique in which secret message may be extracted from the carrier with standard software preinstalled in operating system, and with inconspicuous graphical applications, like GIMP, Paint or Photoshop. First, the carrier file should be presented in chosen base, for example hexadecimal, octal, etc. Then the user takes the screenshot of the listing and fill its background with bucket tool. In this way the secret message appears and may be read from unfilled regions of different color.