메뉴 건너뛰기




Volumn , Issue , 2005, Pages 1-548

Coding for data and computer communications

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84892221723     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/b102531     Document Type: Book
Times cited : (31)

References (166)
  • 2
    • 84994401544 scopus 로고    scopus 로고
    • Robust audio watermarking in the time domain
    • Rhodes, Greece, 8-11 September
    • Bassia, P. and I. Pitas (1998) "Robust Audio Watermarking in the Time Domain," in IX European Signal Processing Conference (EUSIPCO'98), Rhodes, Greece, vol. I, pp. 25-28, 8-11 September.
    • (1998) IX European Signal Processing Conference (EUSIPCO'98) , vol.1 , pp. 25-28
    • Bassia, P.1    Pitas, I.2
  • 4
    • 84892282177 scopus 로고    scopus 로고
    • BBB
    • BBB (2003) is URL www.bbbonline.com.
    • (2003)
  • 7
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • Blakley, G. R. (1979) "Safeguarding Cryptographic Keys," in AFIPS Conference Proceedings, 48:313-317.
    • (1979) AFIPS Conference Proceedings , vol.48 , pp. 313-317
    • Blakley, G.R.1
  • 8
    • 0002161311 scopus 로고
    • The quefrency alanysis of time series for echoes: Cepstrum, pseudo-autocovariance, cross-cepstrum, and saphe cracking
    • Rosenthal, M. (ed.), New York, John Wiley
    • Bogert, B. P., M. J. R. Healy, and J. W. Tukey (1963) "The Quefrency Alanysis of Time Series for Echoes: Cepstrum, Pseudo-Autocovariance, Cross-Cepstrum, and Saphe Cracking," in Proceedings of the Symposium on Time Series Analysis, Rosenthal, M. (ed.), New York, John Wiley, pp. 209-243.
    • (1963) Proceedings of the Symposium on Time Series Analysis , pp. 209-243
    • Bogert, B.P.1    Healy, M.J.R.2    Tukey, J.W.3
  • 9
    • 84892312900 scopus 로고    scopus 로고
    • BPCS
    • BPCS (2003) is URL http://www.know.comp.kyutech.ac.jp/BPCSe/ file BPCSe-principle.html.
    • (2003)
  • 11
    • 84892242375 scopus 로고    scopus 로고
    • How to break gifford's cipher
    • July
    • Cain, Thomas R., and Alan T. Sherman (1997) "How to Break Gifford's Cipher," Cryptologia, 21(3)237-286, July.
    • (1997) Cryptologia , vol.21 , Issue.3 , pp. 237-286
    • Cain, T.R.1    Sherman, A.T.2
  • 13
    • 0033707358 scopus 로고    scopus 로고
    • A secure data hiding scheme for two-color images
    • Also available (in PDF format) from URL
    • Chen Yu-Yuan, Hsiang-Kuang Pan, and Yu-Chee Tseng (2000) "A Secure Data Hiding Scheme for Two-Color Images," in IEEE Symposium on Computers and Communications, ISCC 2000, pp. 750-755. Also available (in PDF format) from URL http://citeseer.nj.nee.com/chenOOsecure.html
    • (2000) IEEE Symposium on Computers and Communications, ISCC 2000 , pp. 750-755
    • Yu-Yuan, C.1    Pan, H.2    Tseng, Y.3
  • 14
    • 85014948392 scopus 로고    scopus 로고
    • General solution of the adfgvx cipher system
    • Aegean Park Press
    • Childs, J. Rives (2000) General Solution of the ADFGVX Cipher System, Laguna Hills, Calif., Aegean Park Press, vol. C-88.
    • (2000) Laguna Hills, Calif. , vol.C-88
    • Childs, J.R.1
  • 15
  • 16
    • 0021405335 scopus 로고
    • Data compression using adaptive coding and partial string matching
    • April. Conceptlabs (2004) is URL
    • Cleary, J. G., and I. H. Witten (1984) "Data Compression Using Adaptive Coding and Partial String Matching," IEEE Transactions on Communications COM-32(4):396-402, April. Conceptlabs (2004) is URL http://www.conceptlabs.co.uk/alicebob.html.
    • (1984) IEEE Transactions on Communications , vol.COM-32 , Issue.4 , pp. 396-402
    • Cleary, J.G.1    Witten, I.H.2
  • 19
    • 0001553281 scopus 로고    scopus 로고
    • AA secure, robust watermark for multimedia
    • Newton Institute, Cambridge University, May. Also available in PDF format from URL
    • Cox, Ingemar J., Joe Kilian, Tom Leighton, and Talal Shamoon (1996) aA Secure, Robust Watermark for Multimedia," Workshop on Information Hiding, Newton Institute, Cambridge University, May. Also available in PDF format from URL ftp://ftp.nj.nee.com/pub/ingemar/papers/cam96.zip.
    • (1996) Workshop on Information Hiding
    • Cox, I.J.1    Kilian, J.2    Leighton, T.3    Shamoon, T.4
  • 20
    • 0004026002 scopus 로고    scopus 로고
    • San Francisco, Morgan Kaufmann
    • Cox, Ingemar J. (2002) Digital Watermarking, San Francisco, Morgan Kaufmann.
    • (2002) Digital Watermarking
    • Cox, I.J.1
  • 21
    • 84892217333 scopus 로고    scopus 로고
    • Crap
    • Crap (2003) is URL http://www.mat .dtu.dk/people/Lars.R.Knudsen/crap. html.
    • (2003)
  • 22
    • 84892205444 scopus 로고    scopus 로고
    • Cryptologia
    • Cryptologia (2003) is URL http://www.dean.usma.edu/math/pubs/cryptologia/ .
    • (2003)
  • 23
    • 84892346053 scopus 로고    scopus 로고
    • Cryptology
    • Cryptology (2003) is URL h t t p : / / l i n k . springer. de/link/service/journals/00145/.
    • (2003)
  • 24
    • 84892309229 scopus 로고    scopus 로고
    • cypherpunks
    • cypherpunks (2004) is ftp://ftp.csua.berkeley.edu/pub/cypherpunks/ steganography/.
    • (2004)
  • 25
    • 84892354781 scopus 로고    scopus 로고
    • CSE, is URL, CSE http://www.cse.dnd.ca/
    • CSE (2001) is URL http://www.cse.dnd.ca/. CSE (2003) is URL http://www.cse.dnd.ca/.
    • (2001)
  • 26
    • 84892330715 scopus 로고    scopus 로고
    • DES
    • DES (1999) is http://csrc.nist.gOv/publications/fips/fips46-3/fips46~3. pdf.
    • (1999)
  • 27
    • 84892340036 scopus 로고    scopus 로고
    • Despan
    • Despan (2004) is URL http://www.oneoffcd.com/info/historycd.cfm.
    • (2004)
  • 28
    • 84892350951 scopus 로고    scopus 로고
    • DSD
    • DSD (2003) is URL http://www.dsd.gov.au/.
    • (2003)
  • 30
    • 0029707854 scopus 로고    scopus 로고
    • Lossless compression of gray images via context tree weighting
    • in Storer, James A. (ed.), Los Alamitos, CA, IEEE Computer Society Press, April
    • Ekstrand, Nicklas (1996) "Lossless Compression of Gray Images via Context Tree Weighting," in Storer, James A. (ed.), DCC '96: Data Compression Conference, Los Alamitos, CA, IEEE Computer Society Press, pp. 132-139, April.
    • (1996) DCC '96: Data Compression Conference , pp. 132-139
    • Ekstrand, N.1
  • 31
    • 84892323310 scopus 로고    scopus 로고
    • FAQS
    • FAQS (2004) is URL http://www.faqs.org/faqs/compression-faq/partl/.
    • (2004)
  • 32
    • 0002163975 scopus 로고
    • Discrete cosine transform algorithms for image data compression
    • Boston, MA
    • Feig, Ephraim N,, and Elliot Linzer (1990) "Discrete Cosine Transform Algorithms for Image Data Compression," in Proceedings Electronic Imaging '90 East, pages 84-87, Boston, MA.
    • (1990) Proceedings Electronic Imaging '90 East , pp. 84-87
    • Feig, E.N.1    Linzer, E.2
  • 33
    • 0024135240 scopus 로고
    • Zero knowledge proofs of identity
    • Feige, Uriel, Amos Fiat, and Adi Shamir (1988) "Zero Knowledge Proofs of Identity," Journal of Cryptology, 1(2)77-94.
    • (1988) Journal of Cryptology , vol.1 , Issue.2 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 34
    • 0001820140 scopus 로고
    • Cryptography and computer privacy
    • 15-23, May
    • Feistel, Horst (1973) "Cryptography and Computer Privacy," Scientific American, 228(5) 15-23, May.
    • (1973) Scientific American , vol.228 , Issue.5
    • Feistel, H.1
  • 36
    • 84892285092 scopus 로고    scopus 로고
    • Fraimhofer, FreeBSD Words (2003) is URL ftp://www.freebsd.org/usr/share/ dict/words
    • Fraimhofer (2001) is URL http://syscop.igd.fhg.de/. FreeBSD Words (2003) is URL ftp://www.freebsd.org/usr/share/dict/words.
    • (2001)
  • 39
    • 84892244237 scopus 로고    scopus 로고
    • Punet
    • Punet (2003) is URL ftp://nic.funet.fi/pub/graphics/misc/test-images/.
    • (2003)
  • 42
    • 0542373633 scopus 로고
    • The mathematics of identification numbers
    • Gallian,, J. A. (1991) "The Mathematics of Identification Numbers," College Mathematics Journal, 22(3):194-202.
    • (1991) College Mathematics Journal , vol.223 , pp. 194-202
    • Gallian, J.A.1
  • 43
    • 0001594973 scopus 로고
    • Mathematical games
    • August
    • Gardner, Martin (1972) "Mathematical Games," Scientific American, 227(2): 106, August.
    • (1972) Scientific American , vol.227 , Issue.2 , pp. 106
    • Gardner, M.1
  • 45
    • 84892338552 scopus 로고    scopus 로고
    • GCHQ
    • GCHQ (2003) is URL http://www.gchq.gov.uk/.
    • (2003)
  • 46
    • 0022062271 scopus 로고
    • The application of digital broadcast communications to large-scale information systems
    • May
    • Gifford, David K., et al. (1985) "The Application of Digital Broadcast Communications to Large-Scale Information Systems," IEEE Journal on Selected Areas in Communications, SAC-3(3)457-467, May.
    • (1985) IEEE Journal on Selected Areas in Communications , vol.SAC-3 , Issue.3 , pp. 457-467
    • Gifford, D.K.1
  • 47
    • 84892300116 scopus 로고    scopus 로고
    • GnuPG
    • GnuPG (2004) is http://www.gnupg.org/.
    • (2004)
  • 48
    • 84892363822 scopus 로고    scopus 로고
    • Goettingen
    • Goettingen (2004) is URL http://www.num.math.uni-goettingen.de/Lehre/ Lehrmaterial/Vorlesungen/Informatik/1998/skript/texte/abthesis.html.
    • (2004)
  • 49
    • 0000499681 scopus 로고
    • Notes on digital coding
    • Golay, Marcel (1949) "Notes on Digital Coding," Proceedings of the IRE, 37:657.
    • (1949) Proceedings of the IRE , vol.37 , pp. 657
    • Golay, M.1
  • 54
    • 84892223829 scopus 로고    scopus 로고
    • Grafica
    • Grafica (1996) is URL http://www.sgi.com/grafica/huffmaui/.
    • (1996)
  • 55
    • 0004086411 scopus 로고
    • United States Patent 2,632,058, March 17
    • Gray, Frank (1953) "Pulse Code Communication," United States Patent 2,632,058, March 17.
    • (1953) Pulse Code Communication
    • Gray, F.1
  • 57
    • 84959165880 scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory
    • Berlin, Springer-Verlag
    • Guillou, Louis, and Jean-Jacques Quisquater (1988) "A Practical Zero-Knowledge Protocol Fitted to Security Microprocessors Minimizing Both Transmission and Memory," in Advances in Cryptology, Eurocrypt '88 Proceedings, pp. 123-128, Berlin, Springer-Verlag.
    • (1988) Advances in Cryptology, Eurocrypt '88 Proceedings , pp. 123-128
    • Guillou, L.1    Quisquater, J.2
  • 58
    • 84892303386 scopus 로고    scopus 로고
    • Gutenberg
    • Gutenberg (2004) is URL http://www.gutenberg.net/.
    • (2004)
  • 59
    • 0004236341 scopus 로고
    • 2nd edition, Englewood Cliffs, NJ, Prentice-Hall
    • Hamming, Richard (1986) Coding and Information Theory, 2nd edition, Englewood Cliffs, NJ, Prentice-Hall.
    • (1986) Coding and Information Theory
    • Hamming, R.1
  • 60
    • 0002161015 scopus 로고
    • Origins of the binary code
    • August
    • Heath, F. G. (1972) "Origins of the Binary Code," Scientific American, 227(2):76, August.
    • (1972) Scientific American , vol.227 , Issue.2 , pp. 76
    • Heath, F.G.1
  • 63
    • 84938015047 scopus 로고
    • A method for the construction of minimum redundancy codes
    • Huffman, David (1952) "A Method for the Construction of Minimum Redundancy Codes," Proceedings of the IRE, 40(9):1098-1101.
    • (1952) Proceedings of the IRE , vol.40 , Issue.9 , pp. 1098-1101
    • Huffman, D.1
  • 64
    • 0019038089 scopus 로고
    • International digital facsimile coding standards
    • July
    • Hunter, R., and A. H, Robinson (1980) "International Digital Facsimile Coding Standards," Proceedings of the IEEE, 68(7):854-867, July.
    • (1980) Proceedings of the IEEE , vol.68 , Issue.7 , pp. 854-867
    • Hunter, R.1    Robinson, A.H.2
  • 65
    • 84892301634 scopus 로고    scopus 로고
    • ISBN
    • ISBN (2004) is URL http://www.isbn-international.org/en/identifiers/, file allidentifiers.html
    • (2004)
  • 66
    • 0003482562 scopus 로고    scopus 로고
    • Information hiding: steganography and watermarking- attacks and countermeasures
    • Boston, Kluwer Academic
    • Johnson, Neil F., et al. (2001) Information Hiding: Steganography and Watermarking- Attacks and Countermeasures, Advances in Information Security, volume 1, Boston, Kluwer Academic.
    • (2001) Advances in Information Security , vol.1
    • Johnson, N.F.1
  • 69
    • 0003185688 scopus 로고
    • La cryptographic militaire
    • 161-191, January-February. Also available in html format from URL
    • Kerckhoffs, Auguste (1883) "La Cryptographic Militaire," Journal des Sciences Militaires, 9:5-38, 161-191, January-February. Also available in html format from URL http://www.petitcolas,net/fabien/kerckhoffs/ la-cryptographie jnilitaire-i.htm.
    • (1883) Journal des Sciences Militaires , vol.9 , pp. 5-38
    • Kerckhoffs, A.1
  • 73
    • 0001492890 scopus 로고
    • Dynamic huffman coding
    • Knuth, D. E. (1985) "Dynamic Huffman Coding," Journal of Algorithms 6:163-180.
    • (1985) Journal of Algorithms , vol.6 , pp. 163-180
    • Knuth, D.E.1
  • 76
    • 0021469033 scopus 로고
    • Implementation of a method guaranteeing retrieval in one access
    • July
    • Larson, P. A., and A. Kajla (1984) "Implementation of a Method Guaranteeing Retrieval in One Access," Communications of the ACM, 27(7)670-677, July.
    • (1984) Communications of the ACM , vol.27 , Issue.7 , pp. 670-677
    • Larson, P.A.1    Kajla, A.2
  • 79
    • 56849108755 scopus 로고    scopus 로고
    • New York, Viking
    • Levy, Steven (2001) Crypto, New York, Viking.
    • (2001) Crypto
    • Levy, S.1
  • 83
    • 84947944750 scopus 로고    scopus 로고
    • StegFS: A steganographic file system for linux
    • New York, Springer-Verlag, LNCS 1768
    • McDonald, Andrew D., and Markus G. Kuhn (1999) "StegFS: A Steganographic File System for Linux," in Proceedings of Information Hiding, New York, Springer-Verlag, LNCS 1768, pp. 463-477. Also available from http: //www.mcdonald.org.uk/StegFS/.
    • (1999) Proceedings of Information Hiding , pp. 463-477
    • McDonald, A.D.1    Kuhn, M.G.2
  • 86
    • 84892212729 scopus 로고    scopus 로고
    • is html file Gram-SchmidtOrthonormalization.html
    • MathWorld (2003) is html file Gram-SchmidtOrthonormalization.html in URL http://mathworld.wolfram.com/.
    • (2003)
    • Math, W.1
  • 88
    • 0019587141 scopus 로고
    • On the security of multiple encryption
    • Merkle, R. C, and M. Hellman (1981) "On the Security of Multiple Encryption," Communications of the ACM, 24(7)465-467.
    • (1981) Communications of the ACM , vol.24 , Issue.7 , pp. 465-467
    • Merkle, R.C.1    Hellman, M.2
  • 90
    • 0025516650 scopus 로고
    • Implementing the ppm data compression scheme
    • November
    • Moffat, Alistair (1990) "Implementing the PPM Data Compression Scheme," IEEE Transactions on Communications COM-38(11): 1917-1921, November.
    • (1990) IEEE Transactions on Communications , vol.COM-38 , Issue.11 , pp. 1917-1921
    • Moffat, A.1
  • 92
    • 84892360973 scopus 로고    scopus 로고
    • NCM
    • NCM (2003) is URL http://www.nsa.gov/museum/.
    • (2003)
  • 94
    • 84892235457 scopus 로고    scopus 로고
    • Nicetext
    • Nicetext (2004) is URL http://www.nicetext.com/.
    • (2004)
  • 95
    • 84892212731 scopus 로고    scopus 로고
    • NSA
    • NSA (2003) is URL http://www.nsa.gov/.
    • (2003)
  • 96
    • 84892315595 scopus 로고    scopus 로고
    • NSA
    • NSA (2004) is http://www.nsa.gov/venona/.
    • (2004)
  • 97
    • 79957590676 scopus 로고
    • Acertain topics in telegraph transmission theory
    • April
    • Nyquist, Harry (1928) aCertain Topics in Telegraph Transmission Theory," Transactions of the AIEE, 47(3):617-644, April.
    • (1928) Transactions of the AIEE , vol.47 , Issue.3 , pp. 617-644
    • Nyquist, H.1
  • 98
    • 84892206997 scopus 로고    scopus 로고
    • OpenPGP
    • OpenPGP (2004) is http://www.openpgp.org/.
    • (2004)
  • 99
    • 0040253703 scopus 로고
    • 3rd edition, Peterborough, N.H., Helmers Publishing
    • Palmer, Roger C. (1995) The Bar Code Book, 3rd edition, Peterborough, N.H., Helmers Publishing
    • (1995) The Bar Code Book
    • Palmer, R.C.1
  • 100
    • 0004091209 scopus 로고
    • Ph.D. dissertation, Dept. of Electrical Engineering, Stanford University, Stanford, Calif
    • Pasco, R. (1976) "Source Coding Algorithms for Fast Data Compression," Ph.D. dissertation, Dept. of Electrical Engineering, Stanford University, Stanford, Calif.
    • (1976) Source Coding Algorithms for Fast Data Compression
    • Pasco, R.1
  • 102
    • 84892363452 scopus 로고    scopus 로고
    • Petitcolas
    • Petitcolas (2003) is URL http://www.petitcolas.net/fabien/stegcinography/ bibliography/.
    • (2003)
  • 103
    • 84955568589 scopus 로고    scopus 로고
    • Information hiding terminology
    • New York, Springer Lecture Notes in Computer Science
    • Pfitzmann, B. (1996) "Information Hiding Terminology," in Information Hiding, New York, Springer Lecture Notes in Computer Science, 1174:347-350.
    • (1996) Information Hiding , vol.1174 , pp. 347-350
    • Pfitzmann, B.1
  • 104
    • 33745454562 scopus 로고
    • LZW data compression
    • Circuit Cellar Inc. June/July
    • Phillips, Dwayne (1992) "LZW Data Compression," The Computer Application Journal, Circuit Cellar Inc., 27:36-48, June/July.
    • (1992) The Computer Application Journal , vol.27 , pp. 36-48
    • Phillips, D.1
  • 105
    • 84892236814 scopus 로고    scopus 로고
    • PKCS
    • PKCS (2004) is http://www.rsasecurity.com/rsalabs/node.asp?id=2124.
    • (2004)
  • 110
  • 112
    • 0001174154 scopus 로고
    • Polynomial codes over certain finite fields
    • Reed, Irving S., and Gustave Solomon (1960) "Polynomial Codes over Certain Finite Fields," SIAM Journal of Applied Mathematics, 8(10):300-304.
    • (1960) SIAM Journal of Applied Mathematics , vol.8 , Issue.10 , pp. 300-304
    • Reed, I.S.1    Solomon, G.2
  • 114
    • 84892343132 scopus 로고    scopus 로고
    • RFC804
    • RFC804 (2003) is URL http://www.faqs.org/rfcs/rfc804.html.
    • (2003)
  • 115
    • 84892361012 scopus 로고    scopus 로고
    • rfcl321
    • rfcl321 (2003) is URL http://www. ietf .org/rf c/rf cl321 .txt.
    • (2003)
  • 116
    • 0000506580 scopus 로고
    • Generalized kraft inequality and arithmetic coding
    • May
    • Rissanen, Jorma (1976) "Generalized Kraft Inequality and Arithmetic Coding' IBM Journal of Research and Development, 20:198-203, May.
    • (1976) IBM Journal of Research and Development , vol.20 , pp. 198-203
    • Rissanen, J.1
  • 117
    • 84892354443 scopus 로고    scopus 로고
    • Ritter (2004) is URL http://www.ciphersbyritter.com/ARTS/PRACTLAT.HTM.
    • (2004)
    • Ritter1
  • 118
    • 78650922644 scopus 로고
    • The md4 message digest algorithm
    • in Menezes, A. J., and S. A. Vanstone, (eds.), New York, Springer-Verlag
    • Rivest, R. (1991) "The MD4 Message Digest Algorithm," in Menezes, A. J., and S. A. Vanstone, (eds.), Advances in Cryptology: CRYPTO '90 Proceedings, pp. 303-311, New York, Springer-Verlag.
    • (1991) Advances in Cryptology: CRYPTO '90 Proceedings , pp. 303-311
    • Rivest, R.1
  • 121
    • 84892263304 scopus 로고    scopus 로고
    • RSA
    • RSA (2001) is URL h t t p : //www. rsasecurity. com/rsalabs/challenges/f actoring/ file f aq.html.
    • (2001)
  • 122
    • 84892261712 scopus 로고    scopus 로고
    • RSA
    • RSA (2004) is URL http://www.rsasecurity.com/.
    • (2004)
  • 123
    • 0018542103 scopus 로고
    • Arithmetic stream coding using fixed precision registers
    • November
    • Rubin, F. (1979) "Arithmetic Stream Coding Using Fixed Precision Registers," IEEE Transactions on Information Theory 25(6):672-675, November.
    • (1979) IEEE Transactions on Information Theory , vol.25 , Issue.6 , pp. 672-675
    • Rubin, F.1
  • 127
    • 84892298561 scopus 로고    scopus 로고
    • Savard
    • Savard (2003) is URL http://home.ecn.ab. ca/~jsavard/crypto/jscrypt .htm.
    • (2003)
  • 128
    • 0001254670 scopus 로고
    • Fast software encryption
    • New York, Springer-Verlag. Also available from
    • Schneier, Bruce (1993) "Fast Software Encryption," in Cambridge Security Workshop Proceedings, pp. 191-204. New York, Springer-Verlag. Also available from http://www.counterpane.com/bfsverlag.html.
    • (1993) Cambridge Security Workshop Proceedings , pp. 191-204
    • Schneier, B.1
  • 130
    • 84892236347 scopus 로고    scopus 로고
    • Schneier, Bruce (2003) is URL http://www.counterpane.com/crypto-gram. html.
    • (2003)
    • Schneier, B.1
  • 131
    • 84892233393 scopus 로고
    • Some page photos from this old book are available at URL
    • Schotti, Gaspari (1665) Schola Steganographica, Jobus Hertz, printer. Some page photos from this old book are available at URL http://www.cl.cam.ac. uk/~fapp2/steganography/steganographica/index.html.
    • (1665) Schola Steganographica, Jobus Hertz, Printer
    • Schotti, G.1
  • 132
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • Shamir, Adi (1979) "How to Share a Secret," Communications of the ACM, 22(11):612-613, November.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 133
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • October
    • Shannon, Claude E, (1949) "Communication Theory of Secrecy Systems," Bell System Technical Journal, 28:656-715, October.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 134
    • 84944486544 scopus 로고
    • Prediction and entropy of printed english
    • January
    • Shannon, Claude E. (1951) "Prediction and Entropy of Printed English," Bell System Technical Journal, 30:50-64, January.
    • (1951) Bell System Technical Journal , vol.30 , pp. 50-64
    • Shannon, C.E.1
  • 135
    • 77953864168 scopus 로고    scopus 로고
    • The des, an extensive documentation and evaluation
    • Aegean Park Press
    • Simovits, Mikael J. (1996) The DES, an Extensive Documentation and Evaluation, Laguna Hills, Calif., Aegean Park Press, vol. C-68.
    • (1996) Laguna Hills, Calif. , vol.C-68
    • Simovits, M.J.1
  • 136
    • 0004034591 scopus 로고    scopus 로고
    • New York, Doubleday
    • Singh, Simon (1999) The Code Book, New York, Doubleday.
    • (1999) The Code Book
    • Singh, S.1
  • 137
    • 0003967331 scopus 로고
    • New Mathematical Library, No, 22, Washington, D.C., Mathematical Assn. of America
    • Sinkov, A. (1980) Elementary Crypt analysis: A Mathematical Approach (New Mathematical Library, No, 22), Washington, D.C., Mathematical Assn. of America.
    • (1980) Elementary Crypt Analysis: A Mathematical Approach
    • Sinkov, A.1
  • 138
    • 84950911208 scopus 로고
    • Cryptologia, January. An addendum is in 8(3)260-261
    • Sorkin, Arthur (1984) "Lucifer, A Cryptographic Algorithm," Cryptologia, 8(1):22-41, January. An addendum is in 8(3)260-261.
    • (1984) Lucifer, A Cryptographic Algorithm , vol.8 , Issue.1 , pp. 22-41
    • Sorkin, A.1
  • 140
    • 84892237790 scopus 로고    scopus 로고
    • Steganosaurus
    • Steganosaurus (2004) is URL http://www.fourmilab.to/stego/.
    • (2004)
  • 141
    • 84892319181 scopus 로고    scopus 로고
    • Stego
    • Stego (2004) is URL http://www.stego.com/.
    • (2004)
  • 143
    • 0020190931 scopus 로고
    • Data compression via textual substitution
    • Storer, J, A., and T, G. Szymanski (1982) "Data Compression via Textual Substitution," Journal of the A CM 29:928-951.
    • (1982) Journal of the A CM , vol.29 , pp. 928-951
    • Storer, J.A.1    Szymanski, T.G.2
  • 146
    • 0038080571 scopus 로고
    • Trithemius, Johannes (1606) Steganographia. Available (for private use only) from URL http://www.esotericarchives.com/tritheim/stegano.htm.
    • (1606) Steganographia
    • Trithemius, J.1
  • 147
    • 0034998078 scopus 로고    scopus 로고
    • ASecure and invisible data hiding in 2-color images
    • Tseng, Yu-Chee, and Hsiang-Kuang Pan (2001) aSecure and Invisible Data Hiding in 2-Color Images," IEEE Infocom 2001. Also available from URL http://www.ieee-infocom.org/2001/paper/20.pdf.
    • (2001) IEEE Infocom 2001
    • Tseng, Y.-C.1    Pan, H.2
  • 148
    • 84892282263 scopus 로고    scopus 로고
    • UCC
    • UCC (2004) is URL http://www.uc-council.org/.
    • (2004)
  • 150
    • 84892307010 scopus 로고    scopus 로고
    • Error detecting decimal codes
    • Unicode Amsterdam, Verhoeff Jacobus (1969)
    • Unicode (2003) is URL http://www.unicode.org. Verhoeff, Jacobus (1969) "Error Detecting Decimal Codes," Mathematical Center Tract 29, Amsterdam.
    • (2003) Mathematical Center Tract 29
  • 152
    • 0023436103 scopus 로고
    • Design and analysis of dynamic huffman codes
    • October
    • Vitter, Jeffrey S. (1987) "Design and Analysis of Dynamic Huffman Codes," Journal of the ACM, 34(4):825-845, October.
    • (1987) Journal of the ACM , vol.34 , Issue.4 , pp. 825-845
    • Vitter, J.S.1
  • 153
    • 84892358116 scopus 로고    scopus 로고
    • WatermarkingWorld, is located at URL
    • WatermarkingWorld (2003) is located at URL http://www.watermarkingworld. org/.
    • (2003)
  • 154
    • 0029710367 scopus 로고    scopus 로고
    • LOCO-I: A low complexity, context-based, lossless image compression algorithm
    • in Storer J., (ed.), IEEE Computer Society Press
    • Weinberger, M. J., G, Seroussi, and G. Sapiro (1996) "LOCO-I: A Low Complexity, Context-Based, Lossless Image Compression Algorithm," in Storer J., (ed.), Proceedings of Data Compression Conference, Los Alamitos, Calif., IEEE Computer Society Press, pp. 140-149.
    • (1996) Proceedings of Data Compression Conference, Los Alamitos, Calif. , pp. 140-149
    • Weinberger, M.J.1    Seroussi, G.2    Sapiro, G.3
  • 155
    • 0021439618 scopus 로고
    • A technique for high-performance data compression
    • June
    • Welch, T. A. (1984) "A Technique for High-Performance Data Compression," IEEE Computer, 17(6):8-19, June.
    • (1984) IEEE Computer , vol.17 , Issue.6 , pp. 8-19
    • Welch, T.A.1
  • 156
    • 0542421135 scopus 로고
    • Error detecting schemes using dihedral groups
    • Winters, S. J. (1990) "Error Detecting Schemes Using Dihedral Groups," UMAP Journal, ll(4):299-308.
    • (1990) UMAP Journal , vol.11 , Issue.4 , pp. 299-308
    • Winters, S.J.1
  • 158
    • 84950895792 scopus 로고
    • Mimic functions
    • July
    • Wayner, Peter (1992) "Mimic Functions," Cryptologia, XVI(3): 193-214, July.
    • (1992) Cryptologia , vol.14 , Issue.3 , pp. 193-214
    • Wayner, P.1
  • 161
    • 0000863143 scopus 로고    scopus 로고
    • Wavelet-transform based watermark for digital images
    • December 7
    • Xia, Xiang-Gen, Charles G. Boncelet, and Gonzalo R. Arce (1998) "Wavelet-Transform Based Watermark for Digital Images," Optics Express 3(12):497-511, December 7.
    • (1998) Optics Express , vol.3 , Issue.12 , pp. 497-511
    • Xia, X.-G.1    Boncelet, C.G.2    Arce, G.R.3
  • 164
    • 84892297390 scopus 로고    scopus 로고
    • Zimmermann, Philip (2001) is http://www.philzimmermann. com/.
    • (2001)
    • Zimmermann, P.1
  • 165
    • 0017493286 scopus 로고
    • A universal algorithm for sequential data compression
    • Ziv, J., and A. Lempel (1977) "A Universal Algorithm for Sequential Data Compression," IEEE Transactions on Information Theory, IT-23(3):337-343.
    • (1977) IEEE Transactions on Information Theory , vol.IT-23 , Issue.3 , pp. 337-343
    • Ziv, J.1    Lempel, A.2
  • 166
    • 0018019231 scopus 로고
    • Compression of individual sequences via variable-rate coding
    • Ziv, J., and A. Lempel (1978) "Compression of Individual Sequences via Variable-Rate Coding," IEEE Transactions on Information Theory IT-24(5):530-536.
    • (1978) IEEE Transactions on Information Theory , vol.IT-24 , Issue.5 , pp. 530-536
    • Ziv, J.1    Lempel, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.