Cryptography Reference
In-Depth Information
10. Katzenbeisser, S., Petitcolas, F.A.P. (2000): Information hiding techniques for
steganography and digital watermarking. Artech House, 7993
11. Johnson, N.F., Duric, Z., Jajodia, S. (2001): information hiding: steganography
and watermarking attacks and countermeasures. Kluwer Academic Publish-
ers, 4776
12. Wayner, P. (2002): Disappearing cryptography: information hiding: steganogra-
phy & watermarking. Morgan Kaufmann Publishers, 303314
13. Rabbani, M., Joshi R. (2002): An overview of JPEG 2000 still image compression
standard. Signal Processing: Image Communication, 17 , 348
14. Taubman,
D.
(2000):
High
performance
scalable
image
compression
with
EBCOT. IEEE Trans. Image Process., 9 , 11581170
15. Shapiro, J.M. (1993): Embedded image coding using zerotrees of wavelet coef-
ficients. IEEE Trans. Signal Process., 41 , 34453462
16. Said, A., Pearlman, W.A. (1996): A new, fast, and e cient image codec based
on set partitioning in hierarchical trees. IEEE Trans. Circuits and Systems for
Video Technology, 6 , 243250
17. http://jj2000.epfl.ch/index.html
18. Upham,
D.
(1997):
http://ftp.funet.fi/pub/crypt/cypherpunks/
steganography/jsteg/
19. Westfeld, A. (2001): F5 A steganographic algorithm: high capacity despite
better steganalysis. Lecture Notes in Computer Science, 2137 , 289302
20. Fridrich, J., Goljan M., Hogea, D. (2003): New methodology for breaking
steganographic techniques for JPEGs. Proc. of SPIE, 5020 , 143155
21. Chen, B., Wornell, G.W. (2001): Quantization index modulation: A class of
provably good methods for digital watermarking and information embedding.
IEEE Trans. on Information Theory, 47 , 14231443
22. http://www.csdinc.co.jp/archiver/lib/main-e.html
http://www2.nsknet.or.jp/ micco/english/unlha32 e.htm
Search WWH ::




Custom Search