|
[1] D. KAHN: "The history of steganography", First Workshop of Information Hiding Proceedings, Cambridge, U.K., Lecture Notes in Computer Science, Vol. 1174 (Springer-Verlag) , pp 1-5, May 30 - June 1, 1996 [2] W. BENDER, D. GRUH, N. MORIMOTO and A. LU: "Techniques for data hiding", IBM System Journal, 35, pp 313-336, 1996 [3] N.F. JOHNSON, and S. JAJODIA: "Steganography: seeing the unseen", IEEE Computer, pp. 26-34, February 1998 [4] D.C. Wu : "A Study on Data Hiding in Images" , a doctoral dissertation of NCTU. 2000 [5] N.F. JOHNSON, and S. JAJODIA: "Steganalysis: the investigation of hidden information", Information Technology Conference, IEEE, pp 113 -116, Sep 1998 [6] T. JAMIL: "Steganography: the art of hiding information in plain sight ", IEEE Potentials , Volume: 18 Issue: 1 , pp 10 -12 , Feb/Mar 1999 [7] R. CHANDRAMOULI : "Analysis of LSB Based Image Steganography techniques", Image Processing, IEEE, Vol 3, pp 1019-1022, 2001 [8] 李遠坤,陳玲慧: "數位影像之資訊隱藏技術探討",資安通訊第五期第四卷 [9] CompuServe Incorporated: "Cover Sheet for the GIFSpecification". [10] R. MACHADO: Stego Software from http://www.stego.com/ [11] J. FRIDRICH: "A New Steganographic Method for Palette-Based Images", submitted to The IS&T PICS Conference, Savannah, Georgia, April 25-28, 1999. [12] Stego Software, GIFSHUFF from http://www.jjtc.com/Security/ [13] C.H. LIN, T.C. LEE, "A Confused Document Encrypting Scheme and its Implementation", Computer&Security, Vol.17, No.6, pp 543-551,1998 [14] W.H. YEH, J.J. HWANG, "Hiding Digital Information Using a Novel System Scheme", Computer& Security, Vol.20, NO.6, pp 533-538, 2001 [15] 施威銘研究室: "PC影像處理技術(圖檔壓縮篇)",旗標出版社,民國82年10月 [16] 黃家輝: "Java網際網路程式設計(企業網路技術篇)",文魁資訊,民國91年1月 [17] LEMPEL, ZIV: "LZW Compression Algorithm", from:http://dogma.net/markn/ articles/lzw/lzw.htm [18] 楊宗誌: "JBuilder程式設計實務",文魁資訊,民國89年 [19] Y.K LEE and L.H.CHEN: "High Capacity image steganographymodel", IEE Proceeding, Image Signal Process, Vol.141, No.3, 2000 [20] 張真誠: "Data Compression Theory and Practice",松崗資訊,民國83年12月 [21] D.C. LOU, J.L. LIU: "Steganography Method for Secure Communication", Computer&Security, Vol. 21, No.5, pp 449- 460, 2002 [22] 賴溪松、韓亮、張真誠: "近代密碼學及其應用",松崗資訊,民國90年7月 [23] 曾志光、巫坤品: "密碼學與網路安全",碁峰資訊,民國91年 [24] V. GALLO: "Secret Steganography Techniques Revealed", Network Security, Issue 2, pp 4-8, 2003 [25] C. C. CHANG, T.S. CHEN, L.Z. CHUNG: "A steganography method upon JPEG and quantization table modification", Information Science 141, pp 123-138, 2002
|