Bibliography

[JJ98-1] Neil F. Johnson, Sushil Jajodia, George Mason University, "Exploring Steganography: Seeing the Unseen", IEEE Computers, February 1998, pp. 26-34

[Ben96] W. Bender, D. Gruhl, N. Morimoto, A. Lu, "Techniques for Data Hiding" IBM Systems Journal, Vol. 35 Nos 3&4, 1996

[JJ98-2] Neil F. Johnson, Sushil Jajodia, Center for Secure Information System, George Mason University, "Steganalisys of Images Created Using Current Steganography Software", http://isse.gmu.edu/~csis

[AP97] Ross J. Anderson, Fabien A.P. Petitcolas, "On the limits of steganography"

[GB98] Daniel Gruhl and Walter Bender, "Information Hiding to Foil the Casual Counterfeiter", 2nd Information Hiding Workshop, 1998

[MBR98] Lisa M. Marvel, Charles G. Boncelet, and Charles T. Retter, "Reliable Blind Information Hiding for Images", 2nd Information Hiding Workshop, 1998

[ANS98] Ross Anderson, Roger Needham, Adi Shamir, "The Steganographic File System", 2nd Information Hiding Workshop, 1998

[WW98] Andreas Westfeld and Gritta Wolf, Dresden University of Technology, Germany, "Steganography in a Video Conferencing System", 2nd Information Hiding Workshop, 1998

[HRP98] Alexander Herringel, Joseph Ó Ruanaidh, Holger Petersen, Shelby Pereira, Thierry Pun, "Secure Copyright Protection Techniques for Digital Images", 2nd Information Hiding Workshop, 1998

[FBS98] Jiri Fridrich, 2 Lt Arnold C. Baldoza and Richard J. Simard, "Robust Digital Watermarking based on Key-dependent Basis Functions", 2nd Information Hiding Workshop, 1998

[HP98] Juan Ramón Hernández and Fernando Pérez-González, "Throwing More Light on Image Watermarks", 2nd Information Hiding Workshop, 1998

[PAK98] Fabien A. P. Petitcolas, Ross J. Anderson, and Markus J. Kuhn, "Attacks on copyright marking systems", 2nd Information Hiding Workshop, 1998

[LQR98] Jack Lacy, Schuyler R. Quackenbush, Amy Reibman, James H. Snyder, "Intellectual property protection systems and Digital Watermarking" , 2nd Information Hiding Workshop, 1998

[LD98] Jean-Paul M. G. Linnartz and Marten van Dijk, "Analisys of the Sensitivity Attack against Electronic Watermarks in Images", 2nd Information Hiding Workshop, 1998

Matteo Fortini