References
- Xu, J., Sung, A. H., Shi, P. and Liu, Q. Text stegano-graphy using wavelet transform, Proc. 7th IASTED Int. Conf. on Internet and Multimedia Systems and Applications, 13–15 August, 2003, pp. 473–478 (Acta Press).
- Westfield, A. and Pfitzmann, A. Attacks on stegano-graphic systems, Proc. 3rd Int. Workshop, IH’99, Dresden, Germany, October, 1999, pp. 61–76.
- Fridrich J. A new steganographic method for palette-based images, IS&T’s PICS Conf., 1999, Center for Intelligent Systems, SUNY Binghamton, Binghamton, NY, pp. 285–289.
- Machado, R. EzStego, Stego Online, http://www.stego.com, 1996.
- Kwan, M. How GifShuffle works, http://www.darkside.com.au/gifshuffle/description.html, 1998.
- Lee, Y. K. and Chen, L. H. Object-based image steganography using affine transformation. Int. J. Pattern Artif. Intell., 2002, 12(2), 681–696.
- Lee, Y. K. and Chen, L. H. Secure error-free steganography for JPEG images. Int. J. Pattern Artif. Intell., 2002, 11(1), 22–29.
- Fridrich, J. and Du, R. Secure steganographic methods for palette images, Center for Intelligent Systems, Dept. of SS&IE, SUNY Binghamton, Binghamton, NY, Information Hiding, Proc. 3rd Int. Workshop, IH’99, Dresden, Germany, October, 1999, pp. 47–60.
- Murray, J. D. and van Ryper, W. Encyclopedia of Graphics File Formats, 1996, 2nd edn (O’Reilly).
- Johnson, N. F. and Jajodia, S. Steganalysis of images created using current steganography software, Centre for Secure Information Systems, George Mason University, Fairfax, VA, Information Hiding, 2nd Int. Workshop, IH’98, Portland, OR, April 1998, pp. 273–289.
- Johnson, N. F. Steganography: Art & Science of Hidden Communication, 2002 (Office of Naval Research (ONR) Naval-Industry Partnership Conference, Washington, DC).
- Mahoney, S. and Johnson, N. F. Audio steganography and steganalysis, Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, Johns Hopkins University, 11–13 June, 2002.
- Hansmann, F., Steganos. Deus ex machina communications, http://www.steganography.com, 1996.
- Maroney, C. HideSeek v5.0, 1996, www.rugeley.demon.co.uk/security/hdsk50.zip
- Brown A. S-Tools for Windows V.3, 1994, ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools3.zip
- Zollner J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G. and Wolf, G. Modelling the security of steganographic systems, Information Hiding, 2nd Int. Workshop, IH’98, Portland, OR, April 1998, Computer Science, 1998, 1525, 344–354.