Cyber warfare: steganography vs. steganalysis

For every clever method and tool being developed to hide information in multimedia data, an equal number of clever methods and tools are being developed to detect and reveal its secrets.

[1]  Niels Provos,et al.  Detecting Steganographic Content on the Internet , 2002, NDSS.

[2]  Andreas Westfeld Detecting Low Embedding Rates , 2002, Information Hiding.

[3]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[4]  Gerald L Kovacich,et al.  What InfoSec professionals should know about information warfare tactics by terrorists , 2001, Comput. Secur..

[5]  Stefan Katzenbeisser,et al.  Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.

[6]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[7]  Nasir D. Memon,et al.  Protecting digital media content , 1998, CACM.

[8]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[9]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[10]  Ira S. Moskowitz,et al.  A new paradigm hidden in steganography , 2001, NSPW '00.

[11]  Gerald L. Kovacich,et al.  What InfoSec Professionals Should Know About Information Warfare Tactics by Terrorists , 2002, Comput. Secur..

[12]  G. Wornell,et al.  Quantization index modulation: a class of provably good methods for digital watermarking and information embedding , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

[13]  Lawrence O'Gorman,et al.  Protecting ownership rights through digital watermarking , 1996 .

[14]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.