Steganography-The Art of Hiding Data
暂无分享,去创建一个
[1] Cynthia E. Irvine,et al. Surmounting the Effects of Lossy Compression on Steganography , 1996 .
[2] Kefa Rabah. A Review of RSA and Public-Key Cryptosystems , 2005 .
[3] D. Kahn. The codebreakers : the story of secret writing , 1968 .
[4] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[5] Ioannis Pitas,et al. Robust audio watermarking in the time domain , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[6] Markus G. Kuhn,et al. StegFS: A Steganographic File System for Linux , 1999, Information Hiding.
[7] Walter Bender,et al. Echo Hiding , 1996, Information Hiding.
[8] R. Card,et al. Design and Implementation of the Second Extended Filesystem , 2001 .
[9] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[10] Ingo Stierand,et al. Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.
[11] Craig H. Rowland,et al. Covert Channels in the TCP/IP Protocol Suite , 1997, First Monday.
[12] John McHugh,et al. A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[13] Adi Shamir,et al. The Steganographic File System , 1998, Information Hiding.
[14] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.
[15] Christoph Hänle,et al. The “ Politehnica ” University of Timisoara Faculty of Automatics and Computers , 2022 .
[16] Ton Kalker. Watermark Estimation through Detector Observations , 1998 .
[17] Steganography Steganography,et al. An Analysis of Steganographic Techniques , 1998 .