|
|
|
|
|
|
|
|
|
|
|
|
5. References and Resources
Note: Many of the references and resources listed include
Internet references (URL), and are also available via my
Security and Privacy Issues Web Page.
Also see my Steganography page which
includes information specific to steganography and has
been developed to consolidate research topics for this paper.
|
|
|
|
|
|
|
|
|
|
|
|
5.1. Publications
- [Aura95] Tuomas Aura, "Invisible Communication," EET 1995,
- http://deadlock.hut.fi/
ste/
ste_html.html, ftp://saturn.hut.fi/
pub/
aaura/
ste1195.ps
- [Brassil-Infocom95] J. Brassil, S. Low, N. Maxemchuk, L. O’Goram,
- "Document Marking and Identification using Both Line and Word Shifting," Infocom95,
ftp://ftp.research.att.com/
dist/
brassil/
1995/
infocom95.ps.Z
- [Brassil-Infocom94] J. Brassil, S. Low, N. Maxemchuk, L. O’Goram,
- "Electronic Marking and Identification Techniques to Discourage Document Copying," Infocom94,
ftp://ftp.research.att.com/
dist/
brassil/
1994/
infocom94a.ps.Z.
- [Brassil-CISS95] J. Brassil, S. Low, N. Maxemchuk, L. O’Goram,
- "Hiding Information in Document Images," CISS95,
ftp://ftp.research.att.com/
dist/
brassil/
1995/
ciss95.ps.Z.
- [JDJ01] Neil F. Johnson, Zoran Duric, Sushil Jajodia, Information Hiding: Steganography and Watermarking - Attacks and Countermeasures
- Kluwer Academic Press, Norwrll, MA, New York, The Hague, London, 2000.
- [Kahn67] David Kahn, The Codebreakers,
- The Macmillan Company. New York, NY 1967.
- [Kurak92] C. Kurak, J. McHugh,
- "A Cautionary Note On Image Downgrading," IEEE Eighth Annual Computer Security Applications Conference, 1992. pp. 153-159.
- [Norman73] Bruce Norman, Secret Warfare,
- Acropolis Books Ltd. Washington, DC 1973.
- [Zevon] Warren Zevon, Lawyers, Guns, and Money.
- Music track released in the albums Excitable Boy, 1978; Stand in the Fire, 1981; A Quiet Normal Life, 1986; Learning to Flinch, 1993.
- [Zim48] Herbert S. Zim, Codes and Secret Writing,
- William Marrow and Company. New York, NY, 1948.
|
|
|
|
|
|
|
|
|
|
|
|
|