Цифровая стеганография
Шрифт:
4. Ramkumar M. Data Hiding in Multimedia. PhD Thesis. New Jersey Institute of Technology, 1999. 72 p.
5. Simmons G. The prisoner`s problem and the subliminal channel // Proc. Workshop on Communications Security (Crypto`83), 1984. P. 51–67.
6. Simmons G. The History of Subliminal Channels // IEEE Journal on Selec-ted Areas of Communications. 1998. Vol. 16, № 4. P. 452–461.
7. Fridrich J., Du R., Long M. Steganalysis of LSB encoding in color images // ICME, 2000.
8. Voloshynovskiy S., Pereira S., Iquise V., Pun T. Attack Modelling: Towards a Second Generation Watermarking Benchmark // Preprint. University of Geneva, 2001. 58 p.
9. Marvel L. Image Steganography for hidden communication. PhD Thesis. Univ.of Delaware, 1999. 115 p.
10. Cox J., Miller M., McKellips A. Watermarking as communications with side information // Proceedings of the IEEE. 1999. Vol. 87. № 7. P. 1127–1141.
11. Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed. New York // John Wiley and Sons, 1996.
12. Anderson R. Stretching the Limits of Steganography // Information Hiding, Springer Lecture Notes in Computer Science. 1996. Vol. 1174. P. 39–48.
13. Craver S. On Public-Key Steganography in the Presence of an Active Warden // Intel Corp., 1997. 13 p.
14. Craver S. Zero Knowledge Watermark Detection // Princeton Univ., 1999. 16 p.
15. Pitas I. A Method for Signature Casting on Digital Images // Proceedings of ICIP. 1996. Vol.3. P. 215–218.
1. Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed. New York // John Wiley and Sons, 1996.
2. Hartung F., Su J., Girod B. Spread Spectrum Watermarking: Malicious Attacks and Counterattacks.
3. Petitcolas F., Anderson R., Kuhn M. Attacks on Copyright Marking Systems // Lecture Notes in Computer Science. 1998. P. 218–238.
4. Langelaar G., Lagendijk R., Biemond J. Removing spatial spread spectrum watermarks by non-linear filtering // Proceedings EUSIPCO-98. 1998.
5. Kutter M., Voloshynovskiy S., Herrigel A. The Watermark Copy Attack // Proceedings of SPIE: Security and Watermarking of Multimedia Content II. 2000. Vol. 3971.
6. Su J., Girod B. On the imperceptibility and robustness of digital fingerprints // IEEE ICMCS-99. 1999.
7. Voloshynovskiy S., Herrigel, A., Baumgrtner N., Pun T. A stochastic approach to content adaptive digital image watermarking // Proceeding of International Workshop on Information hiding. 1999.
8. Cox I., Linnartz J. Some general methods for tampering with watermarks // IEEE Journal on Selected Areas of Communications. 1997.
9. Kutter M. Digital Image Watermarking: Hiding Information in Images. PhD thesis, Swiss Federal Institute of Technology, Lausanne, Switzerland, 1999.
10. Petitcolas F. Weakness of existing watermarking schemes.1997.
11. Lin C. Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection. PhD Thesis, Columbia University, 2000.
12. Wu M. Multimedia Data Hiding. PhD Thesis, Princeton University, 2001.
13. Craver S., Memon N., Yeo B., Yeung M. Can Invisible Watermarks Resolve Rightful Ownerships? // IBM Research Report. 1996.
14. Craver S., Memon N., Yeo B., Yeung M. On the Invertibility of Invisible Watermarking Techniques // Proc. of ICIP. 1997.
15. Craver S., Memon N., Yeo B., Yeung M. Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications // IEEE Journal on Selected Areas in Communication. 1998. Vol. 16. № 4. P. 573–586.
16. Deguillaume F., Csurka G., Pun T. Countermeasures for unintentional and intentional video watermarking attacks // SPIE Electronic Imaging. 2000.
17. Maes M. Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks // Proceeding of International Workshop on Information hiding. 1998.
1. Шеннон
2. Moulin P., O’Sullivan J. Information-theoretic analysis of information hiding. 1999. 43 p.
3. Su J.K., Eggers J.J., Girod B. Analysis of Digital Watermarks Subjected to Optimum Linear Filtering and Additive Noise // Signal Processing. Special Issue on Information Theoretic Issues in Digital Watermarking. 2001. Vol. 81. № 6. P. 1141–1175.
4. Marvel L. Image Steganography for Hidden Communication. PhD Thesis. University of Delavare, 1999. 115 p.
5. Ramkumar M. Data Hiding in Multimedia — Theory and applications. PhD Thesis. University Heights, 1999. 68 p.
6. Petitcolas F., Anderson R.J., Kuhn M.G. Information Hiding — A Survey // Proceedings IEEE, Special Issue on Identification and Protection of Multimedia Information. 1999. Vol. 87. №. 7. P. 1069–1078.
7. Hartung F., Kutter M. Multimedia Watermarking Techniques // Proceedings IEEE, Special Issue on Identification and Protection of Multimedia Information. 1999. Vol. 87. №. 7. P. 1079–1107.
8. Быков С.Ф. Алгоритм сжатия JPEG c позиций компьютерной стеганографии // Защита информации. Конфидент. 2000. № 3.
9. Swanson M.D., Kobayahi M., Tewfik A.H. Multimedia Data-Embedding and Watermarking Strategies // Proceeding of IEEE. 1998. Vol. 86. №. 6. P. 1064–1087.
10. Wolgang R.B., Podilchuk C.I., Delp E.J. Perceptual Watermarking for Digital Images and Video // Proceeding IEEE, Special Issue on Identification and Protection of Multimedia Information. 1999. Vol. 87. №. 7. P. 1088–1126.