<< Chapter < Page Chapter >> Page >

Works cited

Cabeen, Ken, and Peter Gent.“Image Compression and the Discrete Cosine Transform.”College of the Redwoods.< (External Link) >

Johnson, Neil F., and Sushil Jajodia.“Exploring Steganography: Seeing the Unseen.”George Mason University.< (External Link) >

Johnson, Neil F., and Sushil Jajodia.“Steganalysis: The Investigation of Hidden Information.”George Mason University.< (External Link)&arnumber=713394&isnumber=15421 >

Judge, James C.“Steganography: Past, Present, Future.”< (External Link) >

Provos, Niels, and Peter Honeyman.“CITI Technical Report 01-11. Detecting Steganographic Content on theInternet.”University of Michigan.< (External Link) >

Provos, Niels, and Peter Honeyman.“Hide and Seek: An Introduction to Steganography.”University of Michigan.< (External Link) >

Sallee, Phil.“Model-based Steganography.”University of California, Davis.< (External Link) >

Silman, Joshua.“Steganography and Steganalysis: An Overview.”< (External Link)&pa=showpage&pid=241 >

Wang, Huaiqing, and Shuozhong Wang.“Cyber warfare: Steganography vs. steganalysis.”Communications of the ACM, Volume 47, Number 10.< (External Link)&pa=showpage&pid=241 >

Get Jobilize Job Search Mobile App in your pocket Now!

Get it on Google Play Download on the App Store Now




Source:  OpenStax, Elec 301 - steganography - what's in your picture?. OpenStax CNX. Dec 14, 2005 Download for free at http://cnx.org/content/col10316/1.2
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'Elec 301 - steganography - what's in your picture?' conversation and receive update notifications?

Ask