Investigators Guide to Steganography

Anderson, R.J. and Petitcolas, F.A.P., "On the Limits of Steganography," IEEE J. Selected Areas Commun., May, 1998.

Anderson, R.,Needham, R., and Shamir, A., The Steganographic File System, University of Cambridge.

Bender, W.,Gruhl, D.,Morimoto, N., and Lu, A., Techniques for Data Hiding, IBM Systems Journal, 35, 3 and 4, 1996.

Chapman, M.T., Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text, First International Conference, Information and Communication Security, 1997.

Fortini, M., Steganography and Digital Watermarking: A Global View, University of California, Davis.

Fridrich, J., Applications of Hiding Data in Digital Images, Center for Intelligent Systems, 1998.

Johnson, N.F., Steganography and Digital Watermarking: Information Hiding, available at http://www.jjtc.com/Steganography/.

Judge, J.C., Steganography: Past, Present, and Future, SANS, 2001.

Katzenbeisser, S. and Petitcolas, F.A.P., (Eds.), Information Hiding: Techniques for Steganography and Watermarking, Artech House, Boston, 2000.

Lee, K-H, An Application of Discrete Fast Fourier Transform Algorithm, available at http://www.bridgeport.edu/sed/projects/cs597/Summer_2002/kunhlee/, University of Bridgeport, 2002.

Lin, E.T. and Delp, E.J., A Review of Data Hiding in Digital Images, Purdue University.

Marvel, L.M.,Boncelet, C.G., Jr., and Retter, C.T., "Reliable Blind Information for Hiding Images," International Workshop for Information Hiding, April, 1998.

McDonald, A.D. and Kuhn, M.G., StegFS: A Steganographic File System for Linux, University of Cambridge, Computer Laboratory, U.K.

Rabinovich, V., Steganography: A Cryptography Layer, 1999, http://www.rit.edu/~vxr8205/crypto2/cryptopaper.html.

Rowland, C.H., Covert Channels in the TCP/IP Protocol Suite, available at http://www.firstmonday.dk/issues/issue2_5/rowland/#dep2, 1996.

Категории