-
1
-
-
0032680807
-
Information hiding - a survey
-
July
-
F. Petitcolas, R. Anderson, and M. Kuhn, "Information hiding - a survey," Proceedings of the IEEE, vol. 87, no. 7, pp. 1062-1078, July 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.1
Anderson, R.2
Kuhn, M.3
-
2
-
-
51849145995
-
-
S. V. Hart, Forensic examination of digital evidence: a guide for law enforcement, National Institute of Justice NIJ-US, Washington DC, USA, Tech. Rep. NCJ 199408, September 2004.
-
S. V. Hart, "Forensic examination of digital evidence: a guide for law enforcement," National Institute of Justice NIJ-US, Washington DC, USA, Tech. Rep. NCJ 199408, September 2004.
-
-
-
-
3
-
-
34247227824
-
-
Home Office Crime and Policing Group, Washington DC, USA, Tech. Rep. 62/04
-
S. Morris, "The future of netcrime now: Part 1 - threats and challenges," Home Office Crime and Policing Group, Washington DC, USA, Tech. Rep. 62/04, 2004.
-
(2004)
The future of netcrime now: Part 1 - threats and challenges
-
-
Morris, S.1
-
8
-
-
0038576916
-
Getting the message
-
April
-
P. Wallich, "Getting the message," IEEE Spectrum, vol. 40, no. 4, pp. 38-40, April 2003.
-
(2003)
IEEE Spectrum
, vol.40
, Issue.4
, pp. 38-40
-
-
Wallich, P.1
-
9
-
-
0037900670
-
Listening in
-
April
-
S. Cass, "Listening in," IEEE Spectrum, vol. 40, no. 4, pp. 32-37, April 2003.
-
(2003)
IEEE Spectrum
, vol.40
, Issue.4
, pp. 32-37
-
-
Cass, S.1
-
10
-
-
0038576933
-
Mission impossible?
-
April
-
J. Kumagai, "Mission impossible?" IEEE Spectrum, vol. 40, no. 4, pp. 26-31, April 2003.
-
(2003)
IEEE Spectrum
, vol.40
, Issue.4
, pp. 26-31
-
-
Kumagai, J.1
-
11
-
-
3042742327
-
Hide and seek: An introduction to steganography
-
March
-
N. Provos and P. Honeyman, "Hide and seek: an introduction to steganography," IEEE Security & Privacy Magazine., vol. 1, no. 3, pp. 32-44, March 2003.
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, Issue.3
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
-
12
-
-
0032070303
-
On the limits of steganography
-
May
-
R. Anderson and F. Petitcolas, "On the limits of steganography," Journal of Selected Areas in Communications (JSAC), vol. 16, no. 4, pp. 474-481, May 1998.
-
(1998)
Journal of Selected Areas in Communications (JSAC)
, vol.16
, Issue.4
, pp. 474-481
-
-
Anderson, R.1
Petitcolas, F.2
-
15
-
-
51849097108
-
Camaleão: Um software de esteganografia para proteção e seguranca digital
-
A. Rocha, S. Goldenstein, H. A. X. Costa, and L. M. Chaves, "Camaleão: um software de esteganografia para proteção e seguranca digital," in Simpósio de Segurança em Informática (SSI), 2004.
-
(2004)
Simpósio de Segurança em Informática (SSI)
-
-
Rocha, A.1
Goldenstein, S.2
Costa, H.A.X.3
Chaves, L.M.4
-
16
-
-
84937814312
-
-
A. Westfeld, F5 - a steganographic algorithm: High capacity despite better steganalysis, in Intl. Workshop in Information Hiding (IHW), 2001, pp. 289?-302.
-
A. Westfeld, "F5 - a steganographic algorithm: High capacity despite better steganalysis," in Intl. Workshop in Information Hiding (IHW), 2001, pp. 289?-302.
-
-
-
-
18
-
-
85084160704
-
Defending against statistical steganalysis
-
N. Provos, "Defending against statistical steganalysis," in Usenix Security Symposium, vol. 10, 2001, pp. 24-36.
-
(2001)
Usenix Security Symposium
, vol.10
, pp. 24-36
-
-
Provos, N.1
|