參考文獻 |
[1] R. J. Anderson. Stretching the Limits of Steganography. In Information Hiding,
Springer Lecture Notes in Computer Science, volume 1174, pages 39{48, 1996.
[2] R. J. Anderson and F. A. P. Petitcolas. On the Limits of Steganography. IEEE
J. on Selected Areas in Communications, 16(4):474{481, May 1998.
[3] W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for Data Hiding. IBM
System, 35(3{4), February 1996.
[4] E. Franz et al. Computer-Based Steganography. In Information Hiding, Springer
Lecture Notes in Computer Science, volume 1174, pages 7{21, 1996.
[5] R. L. Graham, D. E. Knuth, and O. Patashnik. Concrete Mathematics (2nd ed.).
Addison-Wesley, 1994.
[6] D. Gruhl and W. Bender. Information Hiding to Foil the Casual Counterfeiter.
In Proceedings of the Workshop on Information Hiding, IH'98, Portland, Oregon,
USA, April 1998.
[7] D. Kohn. The Codebreakers: The Story of Secret Writing. Scribner, New York,
1996.
[8] M. Kutter, F. Jordan, and F. Bossen. Digital Signature of Color Images using
Amplitude Modulation. Electronic Imaging, 7(2):326{332, April 1998.
[9] G. J. Simmons. The Prisoners' Problem and the Subliminal Channel. In
CRYPTO'83, pages 51{67.
[10] G. J. Simmons. Results Concerning the Bandwidth of Subliminal Channels. IEEE
J. on Selected Areas in Communications, 16(4):463{473, May 1998.
[11] G. J. Simmons. The History of Subliminal Channels. IEEE J. on Selected Areas
in Communications, 16(4):452{462, May 1998.
[12] W. Stallings. Cryptography and Network Security. Prentice Hall, New Jersey,
1999.
[13] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A Digital Watermark. In
IEEE Int. Conf. Image Processing, volume 2, pages 86{90, 1994.
[14] R. Z. Wang, C. F. Lin, and J. C. Lin. Image Hiding by LSB Substitution and
Genetic Algorithm. In Proceedings of International Symposium on Multimedia
Information Processing, Chung-Li, Taiwan, R.O.C, December 1998.
[15] P. Wayner. Should encryption be regulated. Byte, May 1993.
[16] P. W. Wong. A Public key Watermark for Image Verication and Authentication.
In Proceedings of International Conference on Image Processing, Chicago, Illinois,
USA, October 1998.
[17] P. W. Wong. A Watermark for Image Integrity and Ownership Verication. In
Proceedings of IS&T PIC Conference, Portland, Oregon, USA, May 1998.
[18] M. Y. Wu and J. H. Lee. A Novel Data Embedding Method for Two-Color Facsim-
ile Images. In Proceedings of International Symposium on Multimedia Information
Processing, Chung-Li, Taiwan, R.O.C, December 1998. |