Cryptography Reference
In-Depth Information
[Way95a]
Peter Wayner. Strong theoretical steganography.
Cryp-
tologia
, 19(3):285-299, July 1995.
[Way95b]
Peter C. Wayner.
Digital Cash: Commerce on the Net
.AP
Professional, Boston, 1995.
[Way97a]
Peter Wayner.
Digital Cash, 2nd Edition
.APProfes-
sional, Chestnut Hill, MA, 1997.
[Way97b]
Peter Wayner.
Digital Copyright Protection
.APProfes-
sional, Chestnut Hill, MA, 1997.
[Way99]
Peter Wayner.
Data Compression for Real Programmers
.
AP Professional, Chesnutt, Hill, MA, 1999.
[Way00]
PeterWayner.
Compression algorithms for real program-
mers
. Morgan Kaufmann Publishers Inc., San Francisco,
CA, USA, 2000.
[Way01]
Peter Wayner.
Translucent Databases
.FlyzonePress,
Baltimore, MD, USA, 2001.
[Way03]
Peter Wayner.
Translucent Databases
.FlyzonePress,
Baltimore, Maryland, 2003.
[Way05]
Peter Wayner.
Policing Online Games
.FlyzonePress,
Baltimore, Maryland, 2005.
[Wei76]
Joseph Weizenbaum.
Computer power and human rea-
son : from judgment to calculation
. W.H. Freeman, San
Fransisco, 1976.
[Wes01]
Andreas Westfeld. High capacity depsite better ste-
ganalysis: F5- a steganographic algorithm. In
Fourth
Information Hiding Workshop
, pages 301-315, 2001.
[WH94]
Peter Wayner and Dan Huttenlocher. Image analysis
to obtain typeface information.
U.S. Patent
, 5253307,
1994.
[WmC06]
Hao-Tian Wu and Yiu ming Cheung. A high-capacity
data hiding method for polygonal meshes.
In Ca-
menisch et al. [CCJS07], pages 188-200.
[Won98]
P.W. Wong. A public key watermark for image verifica-
tion and authentication. In
InProc. of ICIP'98
,volume1,
pages 425- 429, Chicago, USA, October 1998.