[1] G. J. Simmons: "The prisoners' problem and the subliminal channel",
in Advances in Cryptology: Proceedings of Crypto 83 (D. Chaum, ed.), pp. 51-67,
Plenum Press, 1984.
[2] Penn Leary: "The Second Cryptographic Shakespeare"
Westchester House; Revised edition (July 1990)
Riferimenti al libro al http://home.att.net/~mleary/
[3] USA Today: "Hatred, hidden messages",
Reperibile al http://www.usatoday.com/news/world/2002/07/10/web-terror-cover.htm
[4]Andreas Westfeld e Andreas Pfitzmann: "Attacks on Steganographic Systems",
Information Hiding, 3rd International Workshop, Proceedings, Dresden September/October 1999, LNCS 1768, Springer Verlag, Berlin 2000, 61-76
Reperibile al http://os.inf.tu-dresden.de/~westfeld/publikationen/ihw99.pdf
[5] Thomas Aura: "Practical Invisibility in Digital Communication"
Information Hiding,1st International Workshop, Proceedings, Cambridge May/June 1996, LNCS 1174, Springer Verlag, Berlin 1996, 265-278
[6] Ron Crandall: "Some Notes on Steganography",1998
Reperibile al http://os.inf.tu-dresden.de/~westfeld/crandall.pdf
[7] Auguste Kerckhoff, "La cryptographie militaire", Journal des sciences militaires,
vol. IX, pp. 5-83, Jan. 1883, pp. 161-191, Feb. 1883.
Riferimenti alle pagine originali di Kerckhoff al http://www.petitcolas.net/fabien/kerckhoffs/
[8] Daniel Gruhl, Walter Bender, and
Antony Lu, "Echo hiding"
Findings report, Massachusetts Institute of Technology Media Laboratory, 1996.
Reperibile al http://www.media.mit.edu/~druid/documents/edh2.ps
[9] Knowledge Engineering Lab, A Large Capacity Steganography,
Kyushu Institute of Tech., Japan
Reperibile al http://www.know.comp.kyutech.ac.jp/BPCSe/index.html
[10] Duncan Sellars: "An Introduction to Steganography",
Reperibile al http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/dsellars/stego.html
[11] Stefan Hetzl: "A Survey of Steganography",January 2002.
Reperibile al http://steghide.sourceforge.net/steganography/survey/steganography.html
[12] Graphics – The graphic file formats page
Reperibile al http://www.dcs.ed.ac.uk/~mxr/gfx/
Bmp format (link locale)
Gif format (link locali: Gif87a specifications, Gif89a specifications, Gif compression)
Jpg format (link locale)
[13] Tools steganografici
http://udsab.dia.unisa.it/ads.dir/corso-security/www/CORSO-0001/Steganografia.htm
Altri links
Elenco Software Steganografici
Reperibile al http://mscmese.tripod.com/steg/thesis-a.pdf
N.F.
Johnson: Steganography
Reperibile al
http://www.jjtc.com/stegdoc/
George Mason University.
Michael Berkowitz: Privacy on the net - steganography,1998.
Reperibile al
http://www.tamos.com/privacy/steganoen.htm
M.
Kuhn: Steganography mailing list, 1995.
Reperibile al
http://www.jjtc.com/Steganography/steglist.htm
Private Site, Hamburg, Germany.
P.
Bassia and I. Pitas: Robust audio watermarking in the time domain.
Findings report, Dept. of Informatics, University of Thessaloniki, 1998.
Reperibile al
http://poseidon.csd.auth.gr/ voyatzis/creus.zip
G.C.
Langelaar, Jan C.A. van der Lubbe, and Reginald L. Lagendijk: Robust labelling
methods for copy protection of images.
Findings report, Department of Electrical Engineering, Information Theory Group,
Delft University of Technology, 1997.
Reperibile al
http://www-it.et.tudelft.nl/ gerhard/spie97.zip
F.A.B.
Petitcolas: The information hiding homepage -digital watermarking and
steganography, 1997.
Reperibile al
http://www.petitcolas.net/fabien/steganography/
University of Cambridge, Computer Laboratory, Security Group.
N.F.
Johnson: Steganography and digital watermarking - information hiding, 1996.
Reperibile al
http://www.jjtc.com/Steganography/