Cryptography Reference
In-Depth Information
Bibliographic Notes
This topic is quite incomplete because it offers the reader an intro-
duction to many of the topics. Some topics are simply left out be-
cause of time and space constraints. Others are only touched briefly.
This preface to the bibliography is intended to offer some sugges-
tions for further reading and exploration.
A good place to begin is with history. David Kahn's Codebreakers
is an excellent survey of the history of cryptology [Kah67]. There are
numerous descriptions of steganographic solutions like secret inks
and microdots. More recent histories are published in Cryptologia .
There are a number of other good topics on the subject. Stefan
Katzenbeisser and Fabien A.P. Petitcolas edited a collection of es-
says from the leading researchers entitled Information Hiding Tech-
niques for Steganography and Digital Watermarking . [SKE00] Neil
Johnson, Zoran Duric, and Sushil Jajodia's recent addition, Infor-
mation Hiding: Steganography and Watermarking ,isthefirstpart
of a series. [JDJ01]. Ross Anderson's general survey, Security En-
gineering , also includes some information on steganography and
watermarking.[And01]
Some of the best material can be found, in it's original form, in the
Proceedings of the Information Hiding Workshop. There have been
nine conferences and more are on their way.
Other more specific information can be found in these areas.
Error-CorrectingCodes The chapter in this topic can not do justice
to this wide field. There are many different types of codes with
different applications. Some of the better introductions are:
[LJ83] and [Ara88].
Compression Algorithms Compression continues to be a hot topic
and many of the latest topics aren't current any longer. The
best solution is to combine topics like [Bar88, BS88] with pa-
pers from the the procedings from academic conferences like
Search WWH ::




Custom Search