|
Bailer, W., wbStego, available at http://www.8ung.at/wbailer/wbstego/sg_li000.htm, 1998.
Friedman, W.F. and Friedman, E., The Shakespearean Ciphers Examined, Syndics of the Cambridge University, U.K., 1958.
Kahn, D., The Codebreakers, Macmillan, New York, 1967.
Katzenbeisser, S. and Petitcolas, F.A.P., Information Hiding: Techniques for Steganography and Watermarking, Artech House, Boston, 2000.
Kent, P., Art of Anamorphosis, available at http://www.anamorphosis.com/.
Low, S.H.,Maxemchuck, N.F.,Brassil, J.T., and O'Gorman, L., Document Marking and Identification Using Both Line and Word Shifting, AT&T Bell Laboratories, New Jersey, 1994.
Schilling, D.L., Meteor Burst Communications: Theory and Practice, Wiley Europe, 1993.
Simmons, G.J., "The Prisoners' Problem and the Subliminal Channel," CRYPTO83, Advances in Cryptology, August 22–24, 51–67, 1984.
Zim, H.S., Codes and Secret Writing, William Morrow, New York, 1948.
|