Cryptography Reference
In-Depth Information
[Way95a]
Peter Wayner. Strong theoretical steganography. Cryp-
tologia , 19(3):285-299, July 1995.
[Way95b]
Peter C. Wayner. Digital Cash: Commerce on the Net .AP
Professional, Boston, 1995.
[Way97a]
Peter Wayner. Digital Cash, 2nd Edition .APProfes-
sional, Chestnut Hill, MA, 1997.
[Way97b]
Peter Wayner. Digital Copyright Protection .APProfes-
sional, Chestnut Hill, MA, 1997.
[Way99]
Peter Wayner. Data Compression for Real Programmers .
AP Professional, Chesnutt, Hill, MA, 1999.
[Way00]
PeterWayner. Compression algorithms for real program-
mers . Morgan Kaufmann Publishers Inc., San Francisco,
CA, USA, 2000.
[Way01]
Peter Wayner. Translucent Databases .FlyzonePress,
Baltimore, MD, USA, 2001.
[Way03]
Peter Wayner. Translucent Databases .FlyzonePress,
Baltimore, Maryland, 2003.
[Way05]
Peter Wayner. Policing Online Games .FlyzonePress,
Baltimore, Maryland, 2005.
[Wei76]
Joseph Weizenbaum. Computer power and human rea-
son : from judgment to calculation . W.H. Freeman, San
Fransisco, 1976.
[Wes01]
Andreas Westfeld. High capacity depsite better ste-
ganalysis: F5- a steganographic algorithm. In Fourth
Information Hiding Workshop , pages 301-315, 2001.
[WH94]
Peter Wayner and Dan Huttenlocher. Image analysis
to obtain typeface information. U.S. Patent , 5253307,
1994.
[WmC06]
Hao-Tian Wu and Yiu ming Cheung. A high-capacity
data hiding method for polygonal meshes.
In Ca-
menisch et al. [CCJS07], pages 188-200.
[Won98]
P.W. Wong. A public key watermark for image verifica-
tion and authentication. In InProc. of ICIP'98 ,volume1,
pages 425- 429, Chicago, USA, October 1998.
Search WWH ::




Custom Search