Cyber warfare: steganography vs. steganalysis
暂无分享,去创建一个
[1] Niels Provos,et al. Detecting Steganographic Content on the Internet , 2002, NDSS.
[2] Andreas Westfeld. Detecting Low Embedding Rates , 2002, Information Hiding.
[3] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[4] Gerald L Kovacich,et al. What InfoSec professionals should know about information warfare tactics by terrorists , 2001, Comput. Secur..
[5] Stefan Katzenbeisser,et al. Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.
[6] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[7] Nasir D. Memon,et al. Protecting digital media content , 1998, CACM.
[8] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[9] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[10] Ira S. Moskowitz,et al. A new paradigm hidden in steganography , 2001, NSPW '00.
[11] Gerald L. Kovacich,et al. What InfoSec Professionals Should Know About Information Warfare Tactics by Terrorists , 2002, Comput. Secur..
[12] G. Wornell,et al. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[13] Lawrence O'Gorman,et al. Protecting ownership rights through digital watermarking , 1996 .
[14] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.