Chapter 9: Detection and Attacks


Anderson, R.,Needham, R., and Shamir, A., The Steganographic File System, University of Cambridge, U.K.

Bloom, J.A.,Cox, I.J.,Kalker, T.,Linnartz, J.-P.M.G., and Miller, M.L., "Copy Protection for DVD Video," IEEE, 87, 7, July 1999.

Boney, L.,Twefik, A.H.,Hamdy, K.N., Digital Watermarks for Audio Signals, Department of Electrical Engineering, 1996.

Borland, J., "Movie Industry Dealt DVD-Cracking Blow," CNET News, November 1, 2001.

Clelland, C.T.,Risca, V., and Bancroft, C., "Hiding Messages in DNA Microdots," Nature, 399, 533–534, 1999.

Cook, S., "Audio Revolution Blasts Record Companies," Christian Science Monitor, April 1999.

Czerwinski, S.,Fromm, R., and Hodes, T., Digital Music Distribution and Audio Watermarking, Computer Science Division, University of California.

Deutsch, R.W., More Tales from Encryption, Wired News, January 1999.

Drummond, M., "The Madison Project: The Future of Downloadable CDs is Here but Don't Tell Anybody."

Gilbert, B., Steganography: Why It Matters in a "Post 911" World, SANS Institute, 2002.

Gong, L., Digital Watermarking: A Survey and Experiment, University of Bridgeport, 2002.

Hartung, F. and Girod, B., Watermarking of Compressed and Uncompressed Video, University of Erlangen-Nuremberg, 1998.

Herrigel, A.,Ruandiadh, J.O.,Peterson, H.,Pereira, S., and Pun, T., Secure Copyright Protection Techniques for Digital Images, University of Geneva.

IBM Cryptolope Technology, Executive Summary, available at

Jessup, P., "The Business Case for Audio Watermarking," International Federation of the Phonographic Industry.

Jones, C., "Crypto Creeps into MP3 Domain."

Judge, J.C., Steganography: Past, Present, and Future, SANS, 2001.

Katzenbeisser, S. and Petitcolas, F.A.P., (Eds.), Information Hiding: Techniques for Steganography and Watermarking, Artech House, Boston, 2000.

Kelley, J., "Terror Groups Hide behind Web Encryption," USA Today, February 5, 2001.

Key2Audio, available at

Kirovski, D.,Peinado, M., and Petitcolas, F.A.P., Digital Rights Management for Digital Cinema, Microsoft Research.

Lacy, J.,Quackenbush, S.R.,Reibman, A.R., and Snyder, J.H., Intellectual Property Protection Systems and Digital Watermarking, AT&T Labs-Research, Florham Park, NJ.

Lau, S., An Analysis of Terrorist Groups' Potential Use of Electronic Steganography, SANS Institute, 2002.

MagicGate and OpenMG, available at

McCullagh, D., "Bin Laden: Steganography Master?" Wired News, February 2001.

McDonald, A.D. and Kuhn, M.G., StegFS: A Steganographic File System for Linux, University of Cambridge, Computer Laboratory, U.K., available at

Petitcolas, F.A.P.,Anderson, R.J., and Kuhn, M.G., "Information Hiding — A Survey," IEEE, July 1999.

Provos, N. and Honeyman, P., Detecting Steganographic Content on the Internet, Center for Information Technology, University of Michigan, 2001.

Schneier, B. and Wayner, P., "Cryptogram — Terrorists and Steganography," Counterpane Internet Security, Inc., 2001.

Weatherhead, B., "The Digital Link: Understanding the Digital Home Video Controversy on Commercial Content (Copy) Protection," Home Theater and High Fidelity, February, 2002.

Investigator's Guide to Steganography
Investigators Guide to Steganography
ISBN: 0849324335
EAN: 2147483647
Year: 2003
Pages: 220

Similar book on Amazon © 2008-2017.
If you may any questions please contact us: