The Steganographic File System
暂无分享,去创建一个
[1] Ross J. Anderson. Stretching the Limits of Steganography , 1996, Information Hiding.
[2] Mihir Bellare,et al. Advances in Cryptology — CRYPTO '97 , 1996, Lecture Notes in Computer Science.
[3] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[4] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[5] Per-Åke Larson,et al. File organization: implementation of a method guaranteeing retrieval in one access , 1984, CACM.
[6] M. Yeung,et al. Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.
[7] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[8] J. van Leeuwen,et al. Information Hiding , 1999, Lecture Notes in Computer Science.
[9] Donald Beaver,et al. Plug and Play Encryption , 1997, CRYPTO.