Список литературы к разделу Стеганография

From CryptoWiki
Revision as of 21:03, 2 December 2013 by 13-03-KolobovDG (Talk | contribs)

Jump to: navigation, search

1. Г00

Генне О.В., ООО "Конфидент" Опубликовано: журнал "Защита информации. Конфидент", №3, 2000 интернет-ресурс http://citforum.ru/internet/securities/stegano.shtml [дата обращения 04.11.2013]

Г02

Грибунин В.Г., Оков И.Н., Туринцев И.В. Цифровая стеганография. — М.: Солон-Пресс, 2002. — 272 с.

S96

B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed. New York // John Wiley and Sons, 1996.

K97

Kutter M., Jordan F., Bossen F. Digital signature of color images using amplitude modulation // Proc. of the SPIE Storage and Retrieval for Image and Video Databases V. 1997. Vol. 3022. P. 518-526.

K95

Koch E., Zhao J. Towards Robust and Hidden Image Copyright Labeling // IEEE Workshop on Nonlinear Signal and Image Processing. 1995. P. 123-132.

W97

Wu T., Wu S. Selective encryption and watermarking of MPEG video // International Conference on Image Science, Systems, and Technology. 1997.

L96

Langelaar G., van der Lubbe J., Biemond J. Copy Protection for Multimedia Data based on Labeling Techniques // 17th Symposium on Information Theory in the Benelux. 1996.

L96

Langelaar G. Feasibility of security concept in hardware. 1996. AC-018, SMASH, SMS-TUD-633-1.

L97

Langelaar G., Lagendijk R., Biemond J. Real-time Labeling Methods for MPEG Compressed Video // 18th Symposium on Information Theory in the Benelux. 1997.

L98

Langelaar G., Lagendijk R., Biemond J. Real-time Labeling of MPEG-2 Compressed Video // Journal of Visual Communication and Image Representation. 1998. Vol. 9. № 4. P. 256-270.

L98

Langelaar G., Lagendijk R., Biemond J. Watermark Removal based on Non-linear Filtering // ASCI'98 Conference. 1998.

L98

Langelaar G., Lagendijk R., Biemond J. Removing Spatial Spread Spectrum Watermarks by Non-linear Filtering // IX European Signal Processing Conference. 1998.

B

Bassia P., Pitas I., Robust audio watermarking in the time domain // De-partment of Informatics, University of Tressaloniki.

B96

Bender W., Gruhl B., Morimoto N., Lu A. Techniques for data hiding // IBM systems journal. 1996. Vol, 35. № 3.

Г98

Громов В.И., Васильев Г.А. Энциклопедия безопасности — М: Москва, 1998.

Г79

ГОСТ 17657—79 «Передача данных. Термины и определения»

К06

Конахович Г.Ф., Пузыренко А.Ю. Компьютерная стеганография. Теория и практика — М: МК-Пресс, 2006.