Цитирование: | 1. Грибунин В.Г., Оков И.Н., Туринцев И.В. Цифровая стегранография. М.: Солон-Пресс, 2002. 272 с.
2. Westfeld A., Pfitzmann A. Attacks on steganographic systems. Breaking the steganographic utilities EzStego, Jsteg, Steganos and S-Tools- and some lessons learned // Lecture Notes in Comput. Sci. 2000. Vol. 1768. P. 61-75.
3. PROVOS N., Honeyman P. Hide and seek: an introduction to steganography // IEEE Security & Privacy. 2003. Vol. 5. P. 32-44.
4. Dabeer O., Sullivan K., Madhow U. et al. Detection of hiding in the least significant bit // IEEE Trans, on Signal Proc. 2004. Vol. 52. P. 3046-3058.
5. Fridrich J., GOLJAN M., Du R. Reliable detection of LSB steganography in color and grayscale images // Proc. of the ACM Workshop on Multimedia and Security. 2001. P. 27-30.
6. Mitra S., Roy Т., Mazumdar D., Saha A.B. Steganalysis of LSB encoding in uncompressed images by close colour pair analysis // Indian Institute of Technology at Kanpur Hacker's Workshop. Feb. 2003.
7. Ryabko B.Ya., FIONOV A.N. Basics of Contemporary Cryptography for IT Practitioners. World Sci. Publ. Co., 2005.
|