An Overview of Steganography
暂无分享,去创建一个
[1] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[2] Manfred Wolf. Covert Channels in LAN Protocols , 1989, LANSEC.
[3] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[4] Theodore G. Handel,et al. Hiding Data in the OSI Network Model , 1996, Information Hiding.
[5] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[6] Sushil Jajodia,et al. Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).
[7] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[8] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[9] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[10] Marc Rennhard,et al. A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography , 2001, ISC.
[11] Gregg H. Gunsch,et al. Blind Stenanography Detection Using a Computational Immune System: A Work in Progress , 2003, Int. J. Digit. EVid..
[12] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[13] Deepa Kundur,et al. Practical Internet Steganography : Data Hiding in IP , 2003 .
[14] Yuewei Dai,et al. Breaking Predictive-Coding-Based Steganography and Modification for Enhanced Security , 2006 .
[15] Kevin Curran,et al. An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.