Bibliography
Home Introduction Existing Methods SSIS Details Results and Examples Code Bibliography

 

  1. Lisa M. Marvel, Charles G. Boncelet, Charles T. Retter, "Spread Spectrum Image Steganography", in IEEE trans. on Image Processing, Vol.8, No.8, August 1999, pp.1075-1083
  2. Neil F. Johnson, Sushil Jajodia, "Exploring Steganography: Seeing the Unseen", IEEE Computer, 1998, pp.26-34
  3. Stefan Hetzl, "A Survey of Steganography", January 2002
  4. Tu Ran, "Steganography: The Art of Hiding Data", Spring 2002
  5. W. Bender, D. Gruhl, N. Morimoto, A. Lu, "Techniques for Data Hiding", IBM Systems Journal, vol. 35, nos.3&4, 1996, pp.313-335
  6. J.R.Smith, B.O.Comisky, "Modulation and Information Hiding in Images", Proceedings of the First Information Hiding Workshop, Isaac Newton Institute, Cambridge, U.K., May 1996. Springer-Verlag Lecture Notes in Computer Science Volume 1174, pp.207-226
  7. Lisa M. Marvel, Charles T. Retter, "The Use of Side Information in Image Steganography", International Symposium on Information Theory and Its Applications, Honolulu, Hawaii, USA, November 5-8, 2000
  8. Lisa Marvel Home Page
  9. Steganography Software