1 |
F.L. Bauer, 'Decrypted secrets: methods and maxims of cryptology,' Berlin, Heidelberg, Germany, Springer-Verlag, 1997
|
2 |
C.Berrou, A. Glavirux and P. Thitimajshima, 'Near shannon limit error-correcting coding and decoding: Turbo-codes,' Proceedings of the 1993 International Conference on Communication (ICC'93), pp. 1064-1070, 1993
|
3 |
C.Berrou and A. Glavirux, 'Near optimum error correcting coding and decoding: Turbo-codes,' IEEE Transactions on Communications vol. 44, pp.1261-1271, Oct. 1996
|
4 |
Soonyoung Kim, Jinsu Chang and Moon Ho Lee, 'Simple iterative decoding stop criterion for wireless packet transmission,' Electronics Letters, Vol.36, pp.2026-2027, Nov. 2000
|
5 |
F. Alturki and R. Mersereau, 'Secure blind image steganographic technique using discrete fourier transformation,', 2001 International Conference on Image Processing, Vol. 2, pp. 542 -545, Oct. 2001
|
6 |
David Kahn, 'The Codebreakers: the comprehensive history of secret communication from ancient time to the Internet,' Scribner 1996
|
7 |
B.Pfitzmann, 'Trials of traced traitors,' Workshop on Information Hiding, Cambridge, Springer-Verlag, Berlin, pp.49-64. 1996
|
8 |
S.Katzenbeisser and F.A.Petitcolas, 'Information hiding techniques for steganography and digital watermarking,' Artech House, Boston, MA, 2000
|
9 |
T.M. Cover and J.A.Thomas, Elements of Information Theory, John Wiley, New York, 1991
|
10 |
I.J.Cox, J.Kilian, T.Leighton and T. Shamoon, 'Secure spread spectrum watermarking for images, audio and video,' Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland, pp.243-246, Sep. 1996
|
11 |
Chang Hsing Lee and Yeuan Kuen Lee, 'An adaptive digital image watermarking technique for copyright protection,' IEEE Transactions on Consumer Electronics, Vol.45, pp.1005-1015, Nov. 1999
|
12 |
C.Cachin, 'An information theoretic model for steganography,' Information Hiding: Second International Workshop, Lecture notes in Computer Science, Spring-Verlag, Germany, pp.306-318, 1998
|