Friday 26 October 2012

. Berghel, H. and O’Gorman, L. Protecting ownership rights through
digital watermarks. IEEE Comput. 29, 7 (July 1996), 101–103.
2. Chen, B. and Wornell, G. Quantization index modulation: A class of
provably good methods for watermarking and information embedding.
IEEE Transact. Info. Theory 47, 4 (May 2001), 1423–1443.
3. Fridrich, J. and Goljan, M. Practical steganalysis of digital images: State
of the art. In Proceedings of SPIE, Security and Watermarking Multimedia
Contents IV (San Jose, CA, Jan. 21–24). International Society for
Optical Engineering, 2002, 1–13.
4. Johnson, N. and Jajodia, S. Exploring steganography: Seeing the
unseen. IEEE Comput. 31, 2 (Feb. 1998), 26–34.
5. Katzenbeisser, S. and Petitcolas, F. Defining security in steganographic
systems. In Proceedings of SPIE, Security and Watermarking of Multimedia
Contents IV (San Jose, CA, Jan 21–24). International Society for
Optical Engineering, 2002, 50–56.
6. Kovacich, G. and Jones, A. What infosec professionals should know
about information warfare tactics by terrorists (Parts 1 and 2). Comput.
& Sec. 21, 1 (Jan. 2002), 35–41; 21, 2 (Mar. 2002), 113–119.
7. Marvel, L., Boncelet, C., Jr., and Retter, C. Spread-spectrum image
steganography. IEEE Transact. Image Process. 8, 8 (Aug. 1999),
1075–1083.
8. Memon, N. and Wong, P. Protecting digital media content. Commun.
ACM 41, 7 (July 1998), 34–43.
9. Moskowitz, I., Longdon, G., and Chang, L. A new paradigm hidden
in steganography. In Proceedings of the 2000 Workshop on New Security
Paradigms (Ballycotton, County Cork, Ireland, Sept. 18–21). ACM
Press, New York, 2000, 41–50.
10. Provos, N. and Honeyman, P. Detecting steganographic content on
the Internet. In Proceedings of Network and Distributed System Security
Symposium (San Diego, Feb. 6–8). Internet Society, Reston, VA, 2002.
11. Westfeld, A. F5-Steganographic algorithm: High capacity despite better
steganalysis. In Lecture Notes in Computer Science 2137. Springer-
Verlag, Berlin, 2001, 289–302.
12. Westfeld, A. Detecting low embedding rates. In Lecture Notes in Computer
Science 2137. Springer-Verlag, Berlin, 2003, 324–339.

No comments:

Post a Comment