Список литературы к разделу Стеганография

From CryptoWiki
Revision as of 20:24, 2 December 2013 by 13-03-KolobovDG (Talk | contribs)

Jump to: navigation, search

Г00

Генне О.В., ООО "Конфидент" Опубликовано: журнал "Защита информации. Конфидент", №3, 2000 интернет-ресурс http://citforum.ru/internet/securities/stegano.shtml [дата обращения 04.11.2013]

Г02

Грибунин В.Г., Оков И.Н., Туринцев И.В. Цифровая стеганография. — М.: Солон-Пресс, 2002. — 272 с.
S96 B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed. New York // John Wiley and Sons, 1996.
4. Kutter M., Jordan F., Bossen F. Digital signature of color images using amplitude modulation // Proc. of the SPIE Storage and Retrieval for Image and Video Databases V. 1997. Vol. 3022. P. 518-526.
5. Koch E., Zhao J. Towards Robust and Hidden Image Copyright Labeling // IEEE Workshop on Nonlinear Signal and Image Processing. 1995. P. 123-132.
6. Wu T., Wu S. Selective encryption and watermarking of MPEG video // International Conference on Image Science, Systems, and Technology. 1997.
7. Langelaar G., van der Lubbe J., Biemond J. Copy Protection for Multimedia Data based on Labeling Techniques // 17th Symposium on Information Theory in the Benelux. 1996.
8. Langelaar G. Feasibility of security concept in hardware. 1996. AC-018, SMASH, SMS-TUD-633-1.
9. Langelaar G., Lagendijk R., Biemond J. Real-time Labeling Methods for MPEG Compressed Video // 18th Symposium on Information Theory in the Benelux. 1997.
10. Langelaar G., Lagendijk R., Biemond J. Real-time Labeling of MPEG-2 Compressed Video // Journal of Visual Communication and Image Representation. 1998. Vol. 9. № 4. P. 256-270.
11. Langelaar G., Lagendijk R., Biemond J. Watermark Removal based on Non-linear Filtering // ASCI'98 Conference. 1998.
12. Langelaar G., Lagendijk R., Biemond J. Removing Spatial Spread Spectrum Watermarks by Non-linear Filtering // IX European Signal Processing Conference. 1998.
13. Bassia P., Pitas I., Robust audio watermarking in the time domain // De-partment of Informatics, University of Tressaloniki.
14. Bender W., Gruhl B., Morimoto N., Lu A. Techniques for data hiding // IBM systems journal. 1996. Vol, 35. № 3.
15. Громов В.И., Васильев Г.А. Энциклопедия безопасности — М: Москва, 1998.
16. ГОСТ 17657—79 «Передача данных. Термины и определения»
17. Конахович Г.Ф., Пузыренко А.Ю. Компьютерная стеганография. Теория и практика — М: МК-Пресс, 2006.