References
- IEEE Journal of Selected Areas in Communications v.16 no.4 On the limits of steganography R.J. Anderson;F.A.P. Petitcolas
- digital Watermarking I. J. Cox;M.L. Miller;J. A. Bloom
- Detecting Steganographic Messages in Digital Images. Technical Report TR2001-412 H. Farid
- SPIE Multimedia Systems and Applications Ⅳ. Denver. Colorado. USA Steganalysis based on JPEG compatibility J. Fridrich;M. Goljan;R. Du
- Lecture Note in Computer Science v.2137 Distron-free data embedding J. Fridrich;M. Goljan;R. Du
- Proceddings of the Electronic Imaging. SPIE San Jose. California(submitted) Practical stegsnalysis of digital images:State of the art J. Fridrich;M. Goljan;R. Du
- Lecture Note in Computer Science Steganalysis of images created using current steganography software N. Johnson;S. Jajodia
- Proceddings of the Electronic Imaging. SPIE San Jose. California(submitted) On defining security in steganographic systems S. Katzenbeisser;F.A.P. Petitcoals
- USA Today Terror groups hide behind web encryption J. Kelley
- Journal of Cryptology v.5 no.2 Universal statistical test for random bit generators U, M. Maurer
- Wired News Secret meassages come in waves D. McCullagh
- Proceedings of the IEEE v.87 no.7 Information Hiding : A survey E.A.P. Petitcolas;R.J. Anderson;M. Kuhn https://doi.org/10.1109/5.771065
- 10th USENIX Security Symposium. Washington DC . USA Defending against statistical steganalysis N. Provos
- Lecture Note in Computer Science v.1768 Attacks on steganographic systems A. Westfeld;A. Pfitzmann https://doi.org/10.1007/10719724_5
- 방송공학회논문지 v.6 no.3 블라인드 워터마킹:튜토리얼 김형중;여인권