This page is optimized for mobile devices, if you would prefer the desktop version just click here

0.2 Works cited

Works cited

Cabeen, Ken, and Peter Gent.“Image Compression and the Discrete Cosine Transform.”College of the Redwoods.< (External Link) >

Johnson, Neil F., and Sushil Jajodia.“Exploring Steganography: Seeing the Unseen.”George Mason University.< (External Link) >

Johnson, Neil F., and Sushil Jajodia.“Steganalysis: The Investigation of Hidden Information.”George Mason University.< (External Link)&arnumber=713394&isnumber=15421 >

Judge, James C.“Steganography: Past, Present, Future.”< (External Link) >

Provos, Niels, and Peter Honeyman.“CITI Technical Report 01-11. Detecting Steganographic Content on theInternet.”University of Michigan.< (External Link) >

Provos, Niels, and Peter Honeyman.“Hide and Seek: An Introduction to Steganography.”University of Michigan.< (External Link) >

Sallee, Phil.“Model-based Steganography.”University of California, Davis.< (External Link) >

Silman, Joshua.“Steganography and Steganalysis: An Overview.”< (External Link)&pa=showpage&pid=241 >

Wang, Huaiqing, and Shuozhong Wang.“Cyber warfare: Steganography vs. steganalysis.”Communications of the ACM, Volume 47, Number 10.< (External Link)&pa=showpage&pid=241 >

<< Chapter < Page Page > Chapter >>

Read also:

OpenStax, Elec 301 - steganography - what's in your picture?. OpenStax CNX. Dec 14, 2005 Download for free at http://cnx.org/content/col10316/1.2
Google Play and the Google Play logo are trademarks of Google Inc.
Jobilize.com uses cookies to ensure that you get the best experience. By continuing to use Jobilize.com web-site, you agree to the Terms of Use and Privacy Policy.