-
1
-
-
0013295432
-
The history of steganography, proceedings: Information hiding
-
Cambridge UK
-
D Kanh, The History of Steganography, Proceedings: Information Hiding. First International Workshop, Cambridge UK pp1-5 1996
-
(1996)
First International Workshop
, pp. 1-5
-
-
Kanh, D.1
-
2
-
-
0030384775
-
-
15. Craig H. Rowland, Covert Channels in the TCP/IP protocol suite. First Monday
-
W Bender et al. Techniques for Data Hiding IBM Systems Journal Vol 35 Nos. 3&4, pp 313-336, 1996 15. Craig H. Rowland, Covert Channels in the TCP/IP protocol suite. First Monday, 2003.
-
(1996)
Techniques for Data Hiding IBM Systems Journal
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
-
3
-
-
2542419686
-
Transmission control protocol
-
Darpa Internet Program, Protocol Specification, September
-
RFC 793, Transmission Control Protocol, Darpa Internet Program, Protocol Specification, September 1981
-
(1981)
RFC
, vol.793
-
-
-
4
-
-
0003466371
-
Internet protocol
-
Darpa Internet Program, Protocol Specification, September
-
RFC 791 Internet Protocol, Darpa Internet Program, Protocol Specification, September 1981
-
(1981)
RFC
, vol.791
-
-
-
5
-
-
0001217738
-
Prisoners' problem arid the subliminal channel
-
D. Chaum, ed. Plenum, New York
-
Simmons, O. J. Prisoners' problem arid the subliminal channel., Advances in Cryptology: Proceedings of CRYTTO 83. D. Chaum, ed. Plenum, New York, 1983, pp. 51-67.
-
(1983)
Advances in Cryptology: Proceedings of CRYTTO 83
, pp. 51-67
-
-
Simmons, O.J.1
-
6
-
-
84904224992
-
Steganalysis of images created using current steganography software
-
Proceedings Second Information Hiding Workshop held in Portland, Oregon, USA, April 15-17
-
Neil F. Johnson and Sushil Jajodia, Steganalysis of Images Created Using Current Steganography Software, Proceedings Second Information Hiding Workshop held in Portland, Oregon, USA, April 15-17, 1998, Lecture Notes in Computer Science, Vol. 1525, pp 273-289
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 273-289
-
-
Johnson, N.F.1
Jajodia, S.2
-
7
-
-
0032298098
-
Hiding information in images
-
October 04 - 07 Chicago, Illinois
-
L.M. Marvel, C.T. Retter, C.G. Boncelet, Jr, Hiding information in images, 1998 International Conference on Image Processing (ICIP '98) 3-Volume Set-Volume 2 October 04 - 07, 1998 Chicago, Illinois
-
(1998)
1998 International Conference on Image Processing (ICIP '98)
, vol.2-3
-
-
Marvel, L.M.1
Retter, C.T.2
Boncelet Jr., C.G.3
-
8
-
-
84957728214
-
Steganalysis: The investigation of hidden information
-
Syracuse, New York, USA, September 1st - 3rd
-
Neil F. Johnson and Sushil Jajodia, Steganalysis: The Investigation of Hidden Information,. IEEE Information Technology Conference, Syracuse, New York, USA, September 1st - 3rd, 1998: 113-116.
-
(1998)
IEEE Information Technology Conference
, pp. 113-116
-
-
Johnson, N.F.1
Jajodia, S.2
-
9
-
-
0031996445
-
Exploring steganography: Seeing the unseen
-
February
-
Neil F. Johnson, Sushil Jajodia, Exploring Steganography: Seeing the Unseen, IEEE Computer, February 1998 (Vol. 31, No. 2) pp 26-34
-
(1998)
IEEE Computer
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
11
-
-
0036085154
-
An investigation into the application of linear feedback shift registers for steganography SoutheastCon, 2002
-
5-7 April
-
Jamil, T.; Ahmad, A.; An Investigation into the application of Linear Feedback Shift Registers for Steganography SoutheastCon, 2002. Proceedings IEEE, 5-7 April 2002 pp 239 - 244
-
(2002)
Proceedings IEEE
, pp. 239-244
-
-
Jamil, T.1
Ahmad, A.2
-
12
-
-
33646030169
-
Data hiding within audio signals telecommunications in modern satellite
-
13-15 Oct.
-
Petrovic, R.; Winograd, J.M.; Jemili, K.; Metois, E.; Data hiding within audio signals Telecommunications in Modern Satellite, Cable and Broadcasting Services, 1999. 4th International Conference on, Volume: 1, 13-15 Oct. 1999
-
(1999)
Cable and Broadcasting Services, 1999. 4th International Conference on
, vol.1
-
-
Petrovic, R.1
Winograd, J.M.2
Jemili, K.3
Metois, E.4
-
13
-
-
0034842091
-
MP3 resistant oblivious steganography acoustics, speech, and signal processing
-
7-11 May vol.3
-
Litao Gang; Akansu, A.N.; Ramkumar, M.; MP3 resistant oblivious Steganography Acoustics, Speech, and Signal Processing, 2001. Proceedings. (ICASSP '01). 2001 IEEE International Conference on, Volume: 3, 7-11 May 2001, pp:1365 - 1368 vol.3
-
(2001)
2001. Proceedings. (ICASSP '01). 2001 IEEE International Conference on
, vol.3
, pp. 1365-1368
-
-
Gang, L.1
Akansu, A.N.2
Ramkumar, M.3
-
14
-
-
11844252006
-
Cyber warfare: Steganography vs. steganalysis
-
October
-
Huaiqing Wang, Shuozhong Wang; Cyber warfare: Steganography vs. Steganalysis, Communications of the ACM archive, Volume 47, Issue 10 (October 2004) pp. 76 - 82
-
(2004)
Communications of the ACM Archive
, vol.47
, Issue.10
, pp. 76-82
-
-
Wang, H.1
Wang, S.2
-
16
-
-
33646073925
-
Active Steganalysis of spread spectrum image steganography Circuits and Systems
-
May 25-28
-
Chandramouli,R.; Subbalakshmi, K.P., Active Steganalysis of spread spectrum image steganography Circuits and Systems, 2003. ISCAS '03. Proceedings of the 2003 International Symposium on, Volume: 3, May 25-28, 2003
-
(2003)
2003. ISCAS '03. Proceedings of the 2003 International Symposium on
, vol.3
-
-
Chandramouli, R.1
Subbalakshmi, K.P.2
-
17
-
-
0032070303
-
On the limits of Steganography Comput. Lab
-
May
-
Anderson, R.J. Petitcolas, F.A.P., On the limits of Steganography Comput. Lab., IEEE Journal on Communications, May 1998, Volume: 16, Issue: 4 pp. 474-481
-
(1998)
IEEE Journal on Communications
, vol.16
, Issue.4
, pp. 474-481
-
-
Anderson, R.J.1
Petitcolas, F.A.P.2
|