1 |
Edward Amoroso, Intrusion Detection, Intrusion.net Books, pp.26-28, 1999
|
2 |
Fabien A. P. & Petitcoals, Ross J. Anderson & Markus G. Kuhn, 'Information Hiding - A Survey,' Proceedings of the IEEE, 1999
DOI
ScienceOn
|
3 |
Neil F. Johnson & Sushil Jajodia, Steganalysis of Images Created Using Current Steganography Software, George Mason University, 1998
|
4 |
Neil F. Johnson & Sushil Jajodia, 'Exploring Steganography : Seeing the Unseen,' IEEE Computer, pp.26-34, 1998
DOI
|
5 |
Eugene T. Lin & Edward J. Delp, A Review of DataHiding in Digital Images, Purdue University, 1999
|
6 |
Qieng Cheng and Thomas S. Huang, 'An Additive Aproach to Transform-Domain Information Hiding and Optimum Detectio Structure,' IEEE Transactions on Mutimedia, Vol.3, No.3, September, 2001
DOI
ScienceOn
|
7 |
Online, Avalable : http://www.andrew.cmu.edu/~rdanyliw/ snort/snortacid.html
|
8 |
Jessica Fridrich & Miroslav Goljan, Practical Steganalysis of Digital Images, SUNY Binghamton, 2002
|
9 |
Andreas Westfeld & Andreas Pfitzmann, Attacks on Ste-ganographic Systems, Dresden University, 1999
|
10 |
Jian Zhao, A Digital Watermarking System for Multimedia Copyright Protection, Fraunhofer Center, 1996
|
11 |
Brian Laing, How To Guide-Implementing a Network Based Intrusion Detection System, Brian Laing sovereigh House, 2000
|