[Table of Contents]  [previous]

5.1. Publications

[Aura95] Tuomas Aura, "Invisible Communication," EET 1995,
http://deadlock.hut.fi/ ste/ ste_html.html, ftp://saturn.hut.fi/ pub/ aaura/ ste1195.ps

[Brassil-Infocom95] J. Brassil, S. Low, N. Maxemchuk, L. O’Goram,
"Document Marking and Identification using Both Line and Word Shifting," Infocom95, ftp://ftp.research.att.com/ dist/ brassil/ 1995/ infocom95.ps.Z

[Brassil-Infocom94] J. Brassil, S. Low, N. Maxemchuk, L. O’Goram,
"Electronic Marking and Identification Techniques to Discourage Document Copying," Infocom94, ftp://ftp.research.att.com/ dist/ brassil/ 1994/ infocom94a.ps.Z.

[Brassil-CISS95] J. Brassil, S. Low, N. Maxemchuk, L. O’Goram,
"Hiding Information in Document Images," CISS95, ftp://ftp.research.att.com/ dist/ brassil/ 1995/ ciss95.ps.Z.

[Kahn67] David Kahn, The Codebreakers,
The Macmillan Company. New York, NY 1967.

[Kurak92] C. Kurak, J. McHugh,
"A Cautionary Note On Image Downgrading," IEEE Eighth Annual Computer Security Applications Conference, 1992. pp. 153-159.

[Norman73] Bruce Norman, Secret Warfare,
Acropolis Books Ltd. Washington, DC 1973.

[Zim48] Herbert S. Zim, Codes and Secret Writing,
William Marrow and Company. New York, NY, 1948.

5.2. Software References

There are many other software applications available that provide steganographic results. This is just a sample of software available for the PC platform. Every effort is being made to credit the authors of the software reviewed in this paper. However, some authors wish to remain anonymous. Only links to software outside the United States are made below.

[Arachelian] Ray Arachelian, White Noise Storm,
Shareware 1992, 1993, 1994. ftp://ftp.csua.berkeley.edu/ pub/ cypherpunks/ steganography/ wns210.zip.

[Brown] Andy Brown, S-Tools for Windows, Shareware 1994.
s-tools3.zip (version 3.0) s-tools4.zip (version 4.0 - not yet reviewed).

[Hastur] Henry Hastur, Stealth for PGP v1.1,
ftp://ftp.netcom.com.
MandelSteg v1.0 and GIFExtract v1.0, ftp://ftp.dsi.unimi.it/pub/security/crypt/code.

[Maroney] Colin Maroney, Hide and Seek v4.1, Freeware.
ftp://ftp.csua.berkeley.edu/ pub/ cypherpunks/ steganography/ hdsk41b.zip.

[JSteg] Independent JPEG Group, Jpeg-Jsteg v 4.
ftp://ftp.funet.fi/ pub/ crypt/ steganography.

[StegoDos] Author alias: Black Wolf,
StegoDos - Black Wolf's Picture Encoder v0.90B, Public Domain. ftp://ftp.csua.berkeley.edu/ pub/ cypherpunks/ steganography/ stegodos.zip.

5.3. WEB Page Resources

AT&T Bell Laboratories Research Web Page,
http://www.research.att.com.

Carl Landwehr (ed), Cipher -
Electronic Newsletter of the IEEE Computer Society’s TC on Security and Privacy, http://www.itd.nrl.navy.mil/ ITD/ 5540/ ieee/ cipher/ (see also http://www.itd.nrl.navy.mil/ ITD/ 5540/ ieee/ cipher/ cipher-links.html for an excellent listing of links to organizations and publications related to security).

Codex Links to Law Enforcement, Security, Intelligence, Investigative and Other sites,
http://www.trcone.com/ t_links.html.

Cypherpunks, ftp://ftp.csua.berkeley.edu/ pub/ cypherpunks/ index.html.

Digimarc® Corporation Web Site, http://www.teleport.com/~digimarc.

Electronic Privacy Information Center (EPIC), http://www.epic.org.

National Security Institute Library, http://nsi.org/ Library/ Library.html.

Security and Privacy Issues by Neil Johnson,
http://www.jjtc.com/Security.

Steganography News Mailing List maintained by Markus Kuhn.
Information about the list can be found at ../sec/steglist.htm.

·


 [Table of Contents]  [previous]

Copyright, ©1995-2000 Neil F. Johnson. All Rights Reserved. Send comments to njohnson(at)gmu(dot)edu.
Association of Internet Professionals
Member
The author is a member of
The HTML Writers Guild