<< Chapter < Page Chapter >> Page >

Works cited

Cabeen, Ken, and Peter Gent.“Image Compression and the Discrete Cosine Transform.”College of the Redwoods.< (External Link) >

Johnson, Neil F., and Sushil Jajodia.“Exploring Steganography: Seeing the Unseen.”George Mason University.< (External Link) >

Johnson, Neil F., and Sushil Jajodia.“Steganalysis: The Investigation of Hidden Information.”George Mason University.< (External Link)&arnumber=713394&isnumber=15421 >

Judge, James C.“Steganography: Past, Present, Future.”< (External Link) >

Provos, Niels, and Peter Honeyman.“CITI Technical Report 01-11. Detecting Steganographic Content on theInternet.”University of Michigan.< (External Link) >

Provos, Niels, and Peter Honeyman.“Hide and Seek: An Introduction to Steganography.”University of Michigan.< (External Link) >

Sallee, Phil.“Model-based Steganography.”University of California, Davis.< (External Link) >

Silman, Joshua.“Steganography and Steganalysis: An Overview.”< (External Link)&pa=showpage&pid=241 >

Wang, Huaiqing, and Shuozhong Wang.“Cyber warfare: Steganography vs. steganalysis.”Communications of the ACM, Volume 47, Number 10.< (External Link)&pa=showpage&pid=241 >

Get Jobilize Job Search Mobile App in your pocket Now!

Get it on Google Play Download on the App Store Now




Source:  OpenStax, Elec 301 projects fall 2005. OpenStax CNX. Sep 25, 2007 Download for free at http://cnx.org/content/col10380/1.3
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'Elec 301 projects fall 2005' conversation and receive update notifications?

Ask