Anderson, R.J. and Petitcolas, F.A.P., "On the Limits of Steganography," IEEE J. Selected Areas Commun., May, 1998.

Anderson, R.,Needham, R., and Shamir, A., The Steganographic File System, University of Cambridge.

Bender, W.,Gruhl, D.,Morimoto, N., and Lu, A., Techniques for Data Hiding, IBM Systems Journal, 35, 3 and 4, 1996.

Chapman, M.T., Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text, First International Conference, Information and Communication Security, 1997.

Fortini, M., Steganography and Digital Watermarking: A Global View, University of California, Davis.

Fridrich, J., Applications of Hiding Data in Digital Images, Center for Intelligent Systems, 1998.

Johnson, N.F., Steganography and Digital Watermarking: Information Hiding, available at

Judge, J.C., Steganography: Past, Present, and Future, SANS, 2001.

Katzenbeisser, S. and Petitcolas, F.A.P., (Eds.), Information Hiding: Techniques for Steganography and Watermarking, Artech House, Boston, 2000.

Lee, K-H, An Application of Discrete Fast Fourier Transform Algorithm, available at, University of Bridgeport, 2002.

Lin, E.T. and Delp, E.J., A Review of Data Hiding in Digital Images, Purdue University.

Marvel, L.M.,Boncelet, C.G., Jr., and Retter, C.T., "Reliable Blind Information for Hiding Images," International Workshop for Information Hiding, April, 1998.

McDonald, A.D. and Kuhn, M.G., StegFS: A Steganographic File System for Linux, University of Cambridge, Computer Laboratory, U.K.

Rabinovich, V., Steganography: A Cryptography Layer, 1999,

Rowland, C.H., Covert Channels in the TCP/IP Protocol Suite, available at, 1996.

Investigator's Guide to Steganography
Investigators Guide to Steganography
ISBN: 0849324335
EAN: 2147483647
Year: 2003
Pages: 220

Similar book on Amazon © 2008-2017.
If you may any questions please contact us: