| |
- Lisa M. Marvel, Charles G. Boncelet, Charles T. Retter, "Spread
Spectrum Image Steganography", in IEEE trans. on Image Processing,
Vol.8, No.8, August 1999, pp.1075-1083
- Neil F. Johnson, Sushil Jajodia, "Exploring Steganography: Seeing the
Unseen", IEEE Computer, 1998, pp.26-34
- Stefan Hetzl, "A Survey of Steganography", January 2002
- Tu Ran, "Steganography: The Art of Hiding Data", Spring 2002
- W. Bender, D. Gruhl, N. Morimoto, A. Lu, "Techniques for Data Hiding",
IBM Systems Journal, vol. 35, nos.3&4, 1996, pp.313-335
- J.R.Smith, B.O.Comisky, "Modulation and Information Hiding in Images",
Proceedings of the First Information Hiding Workshop, Isaac Newton Institute,
Cambridge, U.K., May 1996. Springer-Verlag Lecture Notes in Computer Science
Volume 1174, pp.207-226
- Lisa M. Marvel, Charles T. Retter, "The Use of Side Information in
Image Steganography", International Symposium on Information Theory and
Its Applications, Honolulu, Hawaii, USA, November 5-8, 2000
- Lisa Marvel Home Page
- Steganography Software
|