References
[1]. Anderson, R.J., and Petitcolas F.A.P., (1998). “On the
Limits of Steganography,” Journal on Selected Areas in
Comm., Vol. 16, No. 4, pp. 474–481.
[2]. Petitcolas F.A.P., Anderson, R.J, and Kuhn, M.G,
(1999). “InformationHiding—A Survey,” Proc. IEEE, Vol. 87,
No. 7, pp. 1062–1078.
[3]. Fridrich, J., and Goljan, M., (2002). “Practical
Steganalysis—Stateof the Art,” Proc. SPIE Photonics
Imaging, Security and Watermarking of Multimedia
Contents, Vol. 4675, SPIE Press, pp. 1–13.
[4]. Chen, B. and Wornell, G.W. (2001). Quantization Index
Modulation: “A Class of Provably Good Methods for Digital
Watermarking and Information Embedding,” IEEE Trans.
Information Theory, Vol. 47, No. 4, pp.1423–1443.
[5]. Johnson, N.F. and Jajodia, S., (1998). “Exploring
Steganography: Seeing the Unseen,” Computer, Vol. 31,
No. 2, pp.26–34.
[6]. Kerckhoffs, A., “La Cryptographie Militaire (Military
Cryptography),” Journal on Sciences Militaires (J. Military
Science, inFrench).
[7]. Robert., K,. Steganography and steganalysis.
[8]. Udit Budhiaa, Deepa Kundura. “Digital video
steganalysis exploiting collusion sensitivity”.
[9]. Katzenbeisser, Petitcolas, “Information Hiding
Techniques for Steganography and Digital Watermarking”.
[10]. Jacokes, B., Kodysh,Y., Lisy, A., “Audio
Steganography”.
[11]. Brainos, A.C., II. “A Study of Steganography and the Art of Hiding Information”.
[12]. Ahsan, K. & Kundur, D., (2002). “Practical Data hiding
in TCP/IP”, Proceedings of the Workshop on Multimedia
Security at ACM Multimedia.
[13]. Handel, T. & Sandford, M., (1996). “Hiding data in the
OS network model”, Proceedings of the 1st International
Workshop on Information Hiding.
[14]. Chan, C.K., Cheng, L.M., (2004). “Hiding data in
images by simple LSB substitution”. Pattern Recognition,
37, 469–474.
[15]. Sharp, T. (2001). “An implementation of key-based
digital signal steganography,” in Proc. Information Hiding
Workshop, Vol. 2137, Springer LNCS, pp. 13–26.
[16]. Chandramouli, R. and Memon, N., (2001). "Analysis
of LSB Based Image Steganography Techniques", IEEE.
[17]. Johnson, N. F., Katzenbeisser, S.C., “A survey of
steganography technique.”