OpenSecEd / appliedcrypto

Learning module for Applied Cryptography
5 stars 0 forks source link

Add steganography #29

Open dbosk opened 5 years ago

dbosk commented 5 years ago
@article{johnson1998exploring,                                                     
  title={Exploring steganography: Seeing the unseen},
  author={Johnson, Neil F and Jajodia, Sushil},
  journal={Computer},
  volume={31},
  number={2},
  pages={26--34},
  year={1998},
  publisher={IEEE},
  URL={http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4655281},
}
@article{anderson1998limits,
  title={On the limits of steganography},
  author={Anderson, Ross J and Petitcolas, Fabien AP},
  journal={Selected Areas in Communications, IEEE Journal on},
  volume={16},
  number={4},
  pages={474--481},
  year={1998},
  publisher={IEEE},
  URL={http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=668971},
}
@article{provos2003hide,
  title={Hide and seek: An introduction to steganography},
  author={Provos, Niels and Honeyman, Peter},
  journal={Security \& Privacy, IEEE},
  volume={1},
  number={3},
  pages={32--44},
  year={2003},
  publisher={IEEE},
  URL={http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1203220},
}