참고문헌
- David Kahn, 'The Codebreakers: the comprehensive history of secret communication from ancient time to the Internet,' Scribner 1996
- F.L. Bauer, 'Decrypted secrets: methods and maxims of cryptology,' Berlin, Heidelberg, Germany, Springer-Verlag, 1997
- I.J.Cox, J.Kilian, T.Leighton and T. Shamoon, 'Secure spread spectrum watermarking for images, audio and video,' Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland, pp.243-246, Sep. 1996
- B.Pfitzmann, 'Trials of traced traitors,' Workshop on Information Hiding, Cambridge, Springer-Verlag, Berlin, pp.49-64. 1996
- C.Berrou, A. Glavirux and P. Thitimajshima, 'Near shannon limit error-correcting coding and decoding: Turbo-codes,' Proceedings of the 1993 International Conference on Communication (ICC'93), pp. 1064-1070, 1993
- C.Berrou and A. Glavirux, 'Near optimum error correcting coding and decoding: Turbo-codes,' IEEE Transactions on Communications vol. 44, pp.1261-1271, Oct. 1996
- Soonyoung Kim, Jinsu Chang and Moon Ho Lee, 'Simple iterative decoding stop criterion for wireless packet transmission,' Electronics Letters, Vol.36, pp.2026-2027, Nov. 2000
- S.Katzenbeisser and F.A.Petitcolas, 'Information hiding techniques for steganography and digital watermarking,' Artech House, Boston, MA, 2000
- C.Cachin, 'An information theoretic model for steganography,' Information Hiding: Second International Workshop, Lecture notes in Computer Science, Spring-Verlag, Germany, pp.306-318, 1998
- T.M. Cover and J.A.Thomas, Elements of Information Theory, John Wiley, New York, 1991
- F. Alturki and R. Mersereau, 'Secure blind image steganographic technique using discrete fourier transformation,', 2001 International Conference on Image Processing, Vol. 2, pp. 542 -545, Oct. 2001
- Chang Hsing Lee and Yeuan Kuen Lee, 'An adaptive digital image watermarking technique for copyright protection,' IEEE Transactions on Consumer Electronics, Vol.45, pp.1005-1015, Nov. 1999