Cryptography Reference
In-Depth Information
10. Katzenbeisser, S., Petitcolas, F.A.P. (2000): Information hiding techniques for
steganography and digital watermarking. Artech House, 7993
11. Johnson, N.F., Duric, Z., Jajodia, S. (2001): information hiding: steganography
and watermarking attacks and countermeasures. Kluwer Academic Publish-
ers, 4776
12. Wayner, P. (2002): Disappearing cryptography: information hiding: steganogra-
phy & watermarking. Morgan Kaufmann Publishers, 303314
13. Rabbani, M., Joshi R. (2002): An overview of JPEG 2000 still image compression
standard. Signal Processing: Image Communication,
17
, 348
14. Taubman,
D.
(2000):
High
performance
scalable
image
compression
with
EBCOT. IEEE Trans. Image Process.,
9
, 11581170
15. Shapiro, J.M. (1993): Embedded image coding using zerotrees of wavelet coef-
ficients. IEEE Trans. Signal Process.,
41
, 34453462
16. Said, A., Pearlman, W.A. (1996): A new, fast, and e
cient image codec based
on set partitioning in hierarchical trees. IEEE Trans. Circuits and Systems for
Video Technology,
6
, 243250
17.
http://jj2000.epfl.ch/index.html
18. Upham,
D.
(1997):
http://ftp.funet.fi/pub/crypt/cypherpunks/
steganography/jsteg/
19. Westfeld, A. (2001): F5 A steganographic algorithm: high capacity despite
better steganalysis. Lecture Notes in Computer Science,
2137
, 289302
20. Fridrich, J., Goljan M., Hogea, D. (2003): New methodology for breaking
steganographic techniques for JPEGs. Proc. of SPIE,
5020
, 143155
21. Chen, B., Wornell, G.W. (2001): Quantization index modulation: A class of
provably good methods for digital watermarking and information embedding.
IEEE Trans. on Information Theory,
47
, 14231443
22.
http://www.csdinc.co.jp/archiver/lib/main-e.html
http://www2.nsknet.or.jp/
∼
micco/english/unlha32 e.htm