Riferimenti bibliografici:

 

[1] G. J. Simmons: "The prisoners' problem and the subliminal channel",

in Advances in Cryptology: Proceedings of Crypto 83 (D. Chaum, ed.), pp. 51-67,

Plenum Press, 1984.

 

 

[2] Penn Leary: "The Second Cryptographic Shakespeare"

Westchester House; Revised edition (July 1990)

Riferimenti al libro al http://home.att.net/~mleary/

 

 

[3] USA Today: "Hatred, hidden messages",

Reperibile al http://www.usatoday.com/news/world/2002/07/10/web-terror-cover.htm

(link locale)

 

 

[4]Andreas Westfeld e Andreas Pfitzmann: "Attacks on Steganographic Systems",

Information Hiding, 3rd International Workshop, Proceedings, Dresden September/October 1999, LNCS 1768, Springer Verlag, Berlin 2000, 61-76

Reperibile al http://os.inf.tu-dresden.de/~westfeld/publikationen/ihw99.pdf

(link locale)

 

 

[5] Thomas Aura: "Practical Invisibility in Digital Communication"

 Information Hiding,1st International Workshop, Proceedings, Cambridge May/June 1996, LNCS 1174, Springer Verlag, Berlin 1996, 265-278

 

 

[6] Ron Crandall: "Some Notes on Steganography",1998

Reperibile al http://os.inf.tu-dresden.de/~westfeld/crandall.pdf

(link locale)

 

 

[7] Auguste Kerckhoff, "La cryptographie militaire", Journal des sciences militaires,

vol. IX, pp. 5-83, Jan. 1883, pp. 161-191, Feb. 1883. 

Riferimenti alle pagine originali di Kerckhoff al  http://www.petitcolas.net/fabien/kerckhoffs/

 

 

[8] Daniel Gruhl, Walter Bender, and Antony Lu, "Echo hiding"
Findings report, Massachusetts Institute of Technology Media Laboratory, 1996.

Reperibile al http://www.media.mit.edu/~druid/documents/edh2.ps   

(link locale)

 

 

[9] Knowledge Engineering Lab, A Large Capacity Steganography,

 Kyushu Institute of Tech., Japan

Reperibile al http://www.know.comp.kyutech.ac.jp/BPCSe/index.html

 

 

[10] Duncan Sellars: "An Introduction to Steganography",

Reperibile al http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/dsellars/stego.html

 

 

[11] Stefan Hetzl: "A Survey of Steganography",January 2002.

Reperibile al http://steghide.sourceforge.net/steganography/survey/steganography.html

 

 

[12] Graphics – The graphic file formats page

Reperibile al http://www.dcs.ed.ac.uk/~mxr/gfx/

Bmp format  (link locale)

Gif format  (link locali: Gif87a specifications, Gif89a specifications, Gif compression)

Jpg format  (link locale)  

 

 

[13] Tools steganografici

http://udsab.dia.unisa.it/ads.dir/corso-security/www/CORSO-0001/Steganografia.htm

 

 

 

Altri links

 

Elenco Software Steganografici

Reperibile al http://mscmese.tripod.com/steg/thesis-a.pdf

(link locale)

 

 

N.F. Johnson: Steganography
Reperibile al http://www.jjtc.com/stegdoc/ 
George Mason University.

 

 

Michael Berkowitz: Privacy on the net - steganography,1998.
Reperibile al http://www.tamos.com/privacy/steganoen.htm 

 

M. Kuhn: Steganography mailing list, 1995. 
Reperibile al http://www.jjtc.com/Steganography/steglist.htm 
Private Site, Hamburg, Germany.

 

 

P. Bassia and I. Pitas: Robust audio watermarking in the time domain.
Findings report, Dept. of Informatics, University of Thessaloniki, 1998.
Reperibile al http://poseidon.csd.auth.gr/ voyatzis/creus.zip

 

 

G.C. Langelaar, Jan C.A. van der Lubbe, and Reginald L. Lagendijk: Robust labelling methods for copy protection of images.
Findings report, Department of Electrical Engineering, Information Theory Group, Delft University of Technology, 1997.
Reperibile al http://www-it.et.tudelft.nl/ gerhard/spie97.zip

 

 

F.A.B. Petitcolas: The information hiding homepage -digital watermarking and steganography, 1997.
Reperibile al http://www.petitcolas.net/fabien/steganography/
University of Cambridge, Computer Laboratory, Security Group.

 

 

N.F. Johnson: Steganography and digital watermarking - information hiding, 1996.
Reperibile al  http://www.jjtc.com/Steganography/