Cryptography Reference
In-Depth Information
[HSG99]
Frank Hartung, Jonathan K. Su, and Bernd Girod.
Spread spectrum watermarking: Malicious attacks and
counterattacks. In Security and Watermarking of Multi-
media Contents, Proc. SPIE 3657, Jan. 1999 , pages 147-
158, Jan 1999.
[HU79]
John Hopcroft and Jeffrey Ullman. Introduction to Au-
tomata Theory, Languages and Computation . Addison-
Wesley, Reading, Massachusetts, 1979.
[Huf59]
D.A. Huffman. Canonical forms for information-
lossless finite-state machines. IRE Transactions on Cir-
cuit Theory (special supplement) and IRE Transactions
on Information Theory (special supplement) ,CT-6and
IT-5:41-59, May 1959. A slightly revised version ap-
peared in E.F. Moore, Editor, Sequential Machines: Se-
lected Papers , Addison-Wesley, Reading, Massachusetts,
1964.
[JDJ01]
Neil F. Johnson, Zoran Duric, and Sushil Jajodia. In-
formation Hiding : Steganography and Watermarking
- Attacks and Countermeasures (Advances in Informa-
tion Security, Volume 1) . Kluwer Academic Publishers,
February 2001.
[Jea06]
Sebastien Jeanquier. An Analysis of Port Knocking and
Single Packet Authorization . PhD thesis, Royal Holloway
College, University of London, September 2006.
[JJ98a]
Neil F. Johnson and Sushil Jajodia. Steganalysis of
images created using current steganography software.
In Information Hiding, Second International Workshop ,
pages 273-289, 1998.
[JJ98b]
Neil F. Johnson and Sushil Jajodia. Steganalysis: The
investigation of hidden information, 1998.
[JKM90] H.N.Jenda ,Y.J.B.Kuhn,andJ.L.Massey. An
information-theoretic treatment of homophonic sub-
stitution. In Advances in Cryptology-Eurocrypt '89 ,New
York, 1990. Springer-Verlag, Lecture Notes in Computer
Science.
[JKTS07]
Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, and
Sean W. Smith. Nymble: Anonymous ip-address block-
ing. In Borisov and Golle [BG07], pages 113-133.
Search WWH ::




Custom Search