18.11.2014 Views

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Having implemented these steganographic tools on the Android platform, they<br />

could potentially be used in a number of different ways. One interesting use could be<br />

to use steganography on audio during a phone call. This would allow for a data channel<br />

between two people during a phone call. This could be used to exchange covert text<br />

messages as in our application, or with other protocols to exchange any type of data.<br />

References<br />

[Android 2011a] Android (2011a). Activity lifecycle. http://<strong>de</strong>veloper.<br />

android.com/gui<strong>de</strong>/topics/fundamentals/activities.html%<br />

#Lifecycle.<br />

[Android 2011b] Android (2011b). Documentation on activities. http:<br />

//<strong>de</strong>veloper.android.com/gui<strong>de</strong>/topics/fundamentals/<br />

activities.html.<br />

[Fast Fourier Transform at Co<strong>de</strong> Log 2011] Fast Fourier Transform at Co<strong>de</strong> Log (2011).<br />

http://co<strong>de</strong>.compartmental.net/tools/minim/manual-fft.<br />

[Gruhl et al. 1996] Gruhl, D., Lu, A., and Ben<strong>de</strong>r, W. (1996). Echo hiding. In An<strong>de</strong>rson,<br />

R. J., editor, Information Hiding, volume 1174 of Lecture Notes in Computer<br />

Science, pages 293–315. Springer.<br />

[Jcraft Jorbis Project 2011] Jcraft Jorbis Project (2011).<br />

com/jorbis.<br />

http://www.jcraft.<br />

[Jenkins 2009] Jenkins, N. (2009). Steganography in audio. Technical report, University<br />

of Cambridge.<br />

[Meghanathan and Nayak 2010] Meghanathan, N. and Nayak, L. (2010). Steganalysis<br />

algorithms for <strong>de</strong>tecting the hid<strong>de</strong>n information in image, audio and vi<strong>de</strong>o cover<br />

media. International Journal of Network Security & Its Application (IJNSA),<br />

2(1):43–55.<br />

[MP3 Stego 2011] MP3 Stego (2011). http://www.petitcolas.net/fabien/<br />

steganography/mp3stego.<br />

[Paget 2011] Paget, C. (2011). Def con 18 talk. https://www.<strong>de</strong>fcon.org/<br />

html/links/dc-archives/dc-18-archive.html#Paget.<br />

[Reenskaug 2011] Reenskaug, T. (2011). Mo<strong>de</strong>ls - views - controllers. http://heim.<br />

ifi.uio.no/trygver/1979/mvc-2/1979-12-MVC.pdf.<br />

[Rehearsal Assistant Source 2011] Rehearsal Assistant Source (2011).<br />

sourceforge.net/projects/rehearsalassist.<br />

http://<br />

[Scott 2000] Scott, J. (2000). Social network analysis: a handbook. SAGE Publications.<br />

[Steg Secret 2011] Steg Secret (2011).<br />

net.<br />

http://stegsecret.sourceforge.<br />

[Zimmerman 2011] Zimmerman, P. (2011). No regrets about <strong>de</strong>veloping pgp. http:<br />

//www.mit.edu/fiprz/EN/essays/PRZResponseWashPost.html.<br />

289

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!