Neil F. Johnson. Steganography. Technical Report. November 1995.

 [Table of Contents]  [previous]

5.1. Publications

[Aura95] Tuomas Aura, "Invisible Communication," EET 1995, ste/ ste_html.html, pub/ aaura/

[Brassil-Infocom95] J. Brassil, S. Low, N. Maxemchuk, L. O’Goram,
"Document Marking and Identification using Both Line and Word Shifting," Infocom95, dist/ brassil/ 1995/

[Brassil-Infocom94] J. Brassil, S. Low, N. Maxemchuk, L. O’Goram,
"Electronic Marking and Identification Techniques to Discourage Document Copying," Infocom94, dist/ brassil/ 1994/

[Brassil-CISS95] J. Brassil, S. Low, N. Maxemchuk, L. O’Goram,
"Hiding Information in Document Images," CISS95, dist/ brassil/ 1995/

[JDJ01] Neil F. Johnson, Zoran Duric, Sushil Jajodia, Information Hiding: Steganography and Watermarking - Attacks and Countermeasures
Kluwer Academic Press, Norwrll, MA, New York, The Hague, London, 2000.

[Kahn67] David Kahn, The Codebreakers,
The Macmillan Company. New York, NY 1967.

[Kurak92] C. Kurak, J. McHugh,
"A Cautionary Note On Image Downgrading," IEEE Eighth Annual Computer Security Applications Conference, 1992. pp. 153-159.

[Norman73] Bruce Norman, Secret Warfare,
Acropolis Books Ltd. Washington, DC 1973.

[Zevon] Warren Zevon, Lawyers, Guns, and Money.
Music track released in the albums Excitable Boy, 1978; Stand in the Fire, 1981; A Quiet Normal Life, 1986; Learning to Flinch, 1993.

[Zim48] Herbert S. Zim, Codes and Secret Writing,
William Marrow and Company. New York, NY, 1948.

5.2. Software References

There are many other software applications available that provide steganographic results. This is just a sample of software available for the PC platform. Every effort is being made to credit the authors of the software reviewed in this paper. However, some authors wish to remain anonymous. Only links to software outside the United States are made below.

[Arachelian] Ray Arachelian, White Noise Storm,
Shareware 1992, 1993, 1994. pub/ cypherpunks/ steganography/

[Brown] Andy Brown, S-Tools for Windows, Shareware 1994. (version 3.0) (version 4.0 - not yet reviewed).

[Hastur] Henry Hastur, Stealth for PGP v1.1,
MandelSteg v1.0 and GIFExtract v1.0,

[Maroney] Colin Maroney, Hide and Seek v4.1, Freeware. pub/ cypherpunks/ steganography/

[JSteg] Independent JPEG Group, Jpeg-Jsteg v 4. pub/ crypt/ steganography.

[StegoDos] Author alias: Black Wolf,
StegoDos - Black Wolf's Picture Encoder v0.90B, Public Domain. pub/ cypherpunks/ steganography/

5.3. WEB Page Resources

AT&T Bell Laboratories Research Web Page,

Carl Landwehr (ed), Cipher -
Electronic Newsletter of the IEEE Computer Society’s TC on Security and Privacy, ITD/ 5540/ ieee/ cipher/ (see also ITD/ 5540/ ieee/ cipher/ cipher-links.html for an excellent listing of links to organizations and publications related to security).

Codex Links to Law Enforcement, Security, Intelligence, Investigative and Other sites, t_links.html.

Cypherpunks, pub/ cypherpunks/ index.html.

Digimarc® Corporation Web Site,

Electronic Privacy Information Center (EPIC),

National Security Institute Library, Library/ Library.html.

Security and Privacy Issues by Neil Johnson,

Steganography News Mailing List maintained by Markus Kuhn.
Information about the list can be found at ../sec/steglist.htm.


 [Table of Contents]  [previous]

Copyright, ©1995-2007 Neil F. Johnson. All Rights Reserved. Send comments to nfj(at)jjtc(dot)com.