참고문헌
- J.Zollner, H.Federrath, H.Klimant, A.Pfitzmann, R.Piotraschke, A.Westfeld, G.Wicke, G.Wolf, 'Modeling the security of steganographic systems.' 2nd Workshop on Information Hiding, Portland, LNCS 1525, pp.345-355, Springer-Cerlag, April 1998
- S.K. Pal, P.K. Saxena, S.K. Muttoo, 'The Future of Audio Steganography,' STEG'02, July 11-12, 2002
- Neil F. Johnson, 'Introduction to steganography Hidden Information,' GMU 2001-Computer Crime Symposium, August 13-17, 2001, George Mason University, Fairfax, Virginia
- Stefan Katzenbeisser, and Fabien A.P.Petitcolas 'Information hiding techniques for steganography and digital watermarking,' Artech House Publishers, 2000
- Peter Wayner, 'Disappearing cryptography Information Hiding : Steganography & Watermarking,' second edition, chapter 17, Morgan Kauffman, 2002
- http://www.cbcis.wustl.edu/~adpol/courses/cs502/project/report/nodelhtm
- http://www.neobytesolutions.com/invsecr/index.html
- http://www.steganos.com/./en/
- Fabien A.P. Petitcolas, Ross J. Anderson and Markys G.Kuhn, 'Information Hiding-A Survey,' Proceedings of the IEEE, special issue on protec tion of multimedia content, 87(7):1062-1078, July 1999 https://doi.org/10.1109/5.771065
- 김현곤, 원동호 외 12, '지적 재산권 보호를 위한 정보은닉 기술 및 표준화 연구', 한국 전산원. pp.19-41, 2000
- Christian Cauchin, 'An Information-Theoretic Model for Steganography,' In Proceeding of 2nd Workshop on Information Hiding, Lecture Notes in Computer Science 1525, pp.306-318, Springer, 1998
- J. Zollner, H. Federath, H. Klimant, and A. Pfitzmann, 'Modeling the security of steganography systems,' In Proceeding of 2nd Workshop on Information Hiding, Lecture Notes in Computer Science 1525, pp.344-354, Springer, 1998
- Stefan Katzenbeisser and Fabien A.P. Petitcolas, 'Defining Security in Steganographic Systems,' SPIE Vol.4675, Security and Watermarking of Multimedia Contents IV, pp.260-268, 2002 https://doi.org/10.1117/12.465283
- Brian Chen and Gregory W. Wome.ll, 'Quantization Index Modulation: A Class of Probably Good Methods for Digital Watermarking and Information Embedding,' IEEE Transaction on Information Theory, Vol.47, NO.4, MAY 2001
- RG van Schyndel, AZ Trikel, CF Osborne, 'Digital Watermark,' International Conference on Image Processing, Vol.2, pp.86-90, 1994 https://doi.org/10.1109/ICIP.1994.413536
- Djimitri Wiggert, 'Codes for Error Control and Synchronization,' Artech House Inc, 1988
- BenZamin Arazi, 'A Commonsense Approach to the Theory of Error Correcting Codes,' MIT Press 1986
- http://members.tripod.com/steganography/stego/software.html
- http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/dsellars/stego.html
- htttp://debut.cis.nctu.edu.tw/~yklee/Reaserch/Steganography/Qalter_Bender/IHW96.pdf
- http://www.rfdh.com/bas_com/2- 10.htm
- Richard C. Cabot, Bruce Hofer, and Robert Metzler, 'Chapter 13.1 Audio Measurement and Analysis,' 2002
- Jerry Whitaker, Blair Benson, 'Chapter 13 Standard Handbook of Audio and Radio Engineering,' McGraw Hill Professional, 2002
- J.D.Gordy and L.T.Bruton IEEE MWSCAS 2000, 'Performance Evaluation of Digital Audio Watermarking Algorithms https://doi.org/10.1109/MWSCAS.2000.951682
- http://211.38.132.225/new_b24.htm
- Ira S. Moskowitz, Garth E. Longdon, and LiWu Chang, 'A New paradigm Hidden Steganography,' New Security Paradigms workshop 2000, September, 19th~21st, 2000, Cork Ireland https://doi.org/10.1145/366173.366189
- Ross J. Anderson, Fabieb A.P. Petitcolas, 'On The Limits of Steganography,' IEEE Journal of Selected Areas in Communication, 16(4):474-481, May 1998 https://doi.org/10.1109/49.668971
- GJ Simmoms, 'The Prisoners' Problem and the Subliminal Channel,' in Proceeding o CRYPTO '83, Plenum Press, pp.51 68, 1984
- http://www ccrma.stanford.edu/CCRMA/Courses/422/projects/WaveFormat
- RG van Schyndel, AZ Trikel, CF Osborne, 'A Digital Watermark,' International Conference on Image Processing, Vol.2, pp.86 90, 1994 https://doi.org/10.1109/ICIP.1994.413536