5.1. Publications
- [Aura95] Tuomas Aura, "Invisible Communication," EET 1995,
- http://deadlock.hut.fi/
ste/
ste_html.html, ftp://saturn.hut.fi/
pub/
aaura/
ste1195.ps
- [Brassil-Infocom95] J. Brassil, S. Low, N. Maxemchuk, L. O’Goram,
- "Document Marking and Identification using Both Line and Word Shifting," Infocom95,
ftp://ftp.research.att.com/
dist/
brassil/
1995/
infocom95.ps.Z
- [Brassil-Infocom94] J. Brassil, S. Low, N. Maxemchuk, L. O’Goram,
- "Electronic Marking and Identification Techniques to Discourage Document Copying," Infocom94,
ftp://ftp.research.att.com/
dist/
brassil/
1994/
infocom94a.ps.Z.
- [Brassil-CISS95] J. Brassil, S. Low, N. Maxemchuk, L. O’Goram,
- "Hiding Information in Document Images," CISS95,
ftp://ftp.research.att.com/
dist/
brassil/
1995/
ciss95.ps.Z.
- [JDJ01] Neil F. Johnson, Zoran Duric, Sushil Jajodia, Information Hiding: Steganography and Watermarking - Attacks and Countermeasures
- Kluwer Academic Press, Norwrll, MA, New York, The Hague, London, 2000.
- [Kahn67] David Kahn, The Codebreakers,
- The Macmillan Company. New York, NY 1967.
- [Kurak92] C. Kurak, J. McHugh,
- "A Cautionary Note On Image Downgrading," IEEE Eighth Annual Computer Security Applications Conference, 1992. pp. 153-159.
- [Norman73] Bruce Norman, Secret Warfare,
- Acropolis Books Ltd. Washington, DC 1973.
- [Zevon] Warren Zevon, Lawyers, Guns, and Money.
- Music track released in the albums Excitable Boy, 1978; Stand in the Fire, 1981; A Quiet Normal Life, 1986; Learning to Flinch, 1993.
- [Zim48] Herbert S. Zim, Codes and Secret Writing,
- William Marrow and Company. New York, NY, 1948.
5.2. Software References
There are many other software applications available that provide
steganographic results. This is just a sample of software available
for the PC platform. Every effort is being made to credit the authors
of the software reviewed in this paper. However, some authors wish
to remain anonymous. Only links to software outside the United States
are made below.
- [Arachelian] Ray Arachelian, White Noise Storm,
- Shareware 1992, 1993, 1994. ftp://ftp.csua.berkeley.edu/
pub/
cypherpunks/
steganography/
wns210.zip.
- [Brown] Andy Brown, S-Tools for Windows, Shareware 1994.
- s-tools3.zip (version 3.0)
s-tools4.zip (version 4.0 - not yet reviewed).
- [Hastur] Henry Hastur, Stealth for PGP v1.1,
- ftp://ftp.netcom.com.
- MandelSteg v1.0 and GIFExtract v1.0, ftp://ftp.dsi.unimi.it/pub/security/crypt/code.
- [Maroney] Colin Maroney, Hide and Seek v4.1, Freeware.
- ftp://ftp.csua.berkeley.edu/
pub/
cypherpunks/
steganography/
hdsk41b.zip.
- [JSteg] Independent JPEG Group, Jpeg-Jsteg v 4.
- ftp://ftp.funet.fi/
pub/
crypt/
steganography.
- [StegoDos] Author alias: Black Wolf,
- StegoDos - Black Wolf's Picture Encoder v0.90B, Public Domain.
ftp://ftp.csua.berkeley.edu/
pub/
cypherpunks/
steganography/
stegodos.zip.
5.3. WEB Page Resources
AT&T Bell Laboratories Research Web Page,
http://www.research.att.com.
Carl Landwehr (ed), Cipher -
Electronic Newsletter of the IEEE Computer Society’s TC on Security and Privacy,
http://www.itd.nrl.navy.mil/
ITD/
5540/
ieee/
cipher/
(see also
http://www.itd.nrl.navy.mil/
ITD/
5540/
ieee/
cipher/
cipher-links.html
for an excellent listing of links to organizations and publications related
to security).
Codex Links to Law Enforcement, Security, Intelligence, Investigative and Other sites,
http://www.trcone.com/
t_links.html.
Cypherpunks,
ftp://ftp.csua.berkeley.edu/
pub/
cypherpunks/
index.html.
Digimarc® Corporation Web Site, http://www.teleport.com/~digimarc.
Electronic Privacy Information Center (EPIC), http://www.epic.org.
National Security Institute Library, http://nsi.org/
Library/
Library.html.
Security and Privacy Issues by Neil Johnson,
http://www.jjtc.com/Security.
Steganography News Mailing List maintained by Markus Kuhn.
Information about the list can be found at ../sec/steglist.htm.
·
Copyright, ©1995-2009 Neil F. Johnson. All Rights Reserved.
Send comments to nfj(at)jjtc(dot)com.