<< Chapter < Page | Chapter >> Page > |
Cabeen, Ken, and Peter Gent.“Image Compression and the Discrete Cosine Transform.”College of the Redwoods.< (External Link) >
Johnson, Neil F., and Sushil Jajodia.“Exploring Steganography: Seeing the Unseen.”George Mason University.< (External Link) >
Johnson, Neil F., and Sushil Jajodia.“Steganalysis: The Investigation of Hidden Information.”George Mason University.< (External Link)&arnumber=713394&isnumber=15421 >
Judge, James C.“Steganography: Past, Present, Future.”< (External Link) >
Provos, Niels, and Peter Honeyman.“CITI Technical Report 01-11. Detecting Steganographic Content on theInternet.”University of Michigan.< (External Link) >
Provos, Niels, and Peter Honeyman.“Hide and Seek: An Introduction to Steganography.”University of Michigan.< (External Link) >
Sallee, Phil.“Model-based Steganography.”University of California, Davis.< (External Link) >
Silman, Joshua.“Steganography and Steganalysis: An Overview.”< (External Link)&pa=showpage&pid=241 >
Wang, Huaiqing, and Shuozhong Wang.“Cyber warfare: Steganography vs. steganalysis.”Communications of the ACM, Volume 47, Number 10.< (External Link)&pa=showpage&pid=241 >
Notification Switch
Would you like to follow the 'Elec 301 - steganography - what's in your picture?' conversation and receive update notifications?