暂无分享,去创建一个
[1] Peter Saint-Andre,et al. Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence , 2004, RFC.
[2] Robert C. Newman. Covert computer and network communications , 2007, InfoSecCD '07.
[3] D. Kahn. The codebreakers : the story of secret writing , 1968 .
[4] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[5] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998 .
[6] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[7] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[8] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[9] M.H. Shirali-Shahreza,et al. Text Steganography in chat , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.
[10] Peter Saint-Andre. Extensible Messaging and Presence Protocol (XMPP): Core , 2011, RFC.