1 |
E. Fanz, A. Jerichow, S. Moller, A. Pfitzmann, I. Stierand, 'Computer Based Steganography : How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, At Best,' Proceedings of Information Hiding Workshop, LNCS, Springer-verlag, Vol. 1174, pp. 7-21, 1996
DOI
ScienceOn
|
2 |
John L. Mitchell, William B Pennebaker, Chad E. Fogg, Didier J. Legall, 'MPEG Video Compression Standard,' Chapman and Hall, pp. 1003-1996
|
3 |
Black Wolf, StegoDos-Black Wolf's Picture Encoder V0.90B, Public Domain, ftp://ftp.csua.berkeley.edu/pub/cypherpunks/steganography/stegodos.zip
|
4 |
World Wide Web Consortium, 'Synchronized Multimedia Integration Language (SMIL 2.0),' W3C Recommendation, August, 2001
|
5 |
Anonymous, http://www.counterpane.com/blowfish.html, Counterpane Internet Security, Inc., 2001
|
6 |
Neil F. Johnson, Sushil Jajodia, 'Lecture Notes in Computer Science,' Workshop on Information Hiding Proceedings, Portland, Oregon, USA, Vol. 1525, pp. 273-289, April, 1998
DOI
|
7 |
Neil F. Johnson, Zoran Duric, Sushil Jajodia, 'Infomation Hiding - Steganography and Watermarking - Attacks and Countermeasures,' Kluwer Academic Publishers, pp. 18-44, 2001
|
8 |
후지와라 히로시, '그림으로 보는 최신 MPEG,' 교보문고, pp. 130-152, 1998
|
9 |
Ivy_research, 'Data Hidingㆍㆍㆍ,' http://vega.icu.ac.kr/~ivy/ivy_research/watermarking.html
|
10 |
Henry Hastur, Stealth for PGP v1.1, ftp://ftp.netcom.com. MandelSteg v1.0, ftp://ftp.dsi.unimi.it/pub/security/crypt/code
|
11 |
http://sasami2k.com
|