[1] | Stefan Katzenbeisse, Information Hiding Techniques for Steganography and Digital Watermarking, Fabien, Ed.: Artech, 99. |
[2] | Wikipedia.[Online].http://en.wikipedia.org/wiki/Steganography. |
[3] | JiuchaoFeng, Guangzhou Bo Wang, "A chaos-based steganography algorithm for H.264 standard video sequences," Communications, Circuits and Systems, ICCCAS 08. International Conference. |
[4] | Ling-Hwei Chen Wen-Chao Yang, "A novel steganography method via various animation effects in PowerPoint files," IEEE, Machine Learning and Cybernetics, International Conference, vol. 6, pp. 3102-3107, July 08. |
[5] | Jana Dittmann, Andreas Lang, Tobias Kühne Christian Krätzer, "WLAN Steganography: A First Practical Review," ACM, International Multimedia Conference, pp. 17 - 22, 06. |
[6] | NatthawutSamphaiboon and Matthew N. Dailey, “Steganography in Thai Text”, ECTI-CON 08. |
[7] | Mohammad Shirali-Shahreza, SajadShirali-Shahreza, “Persian/Arabic Unicode Text Steganography”, The Fourth International Conference on Information Assurance and Security, 08. |
[8] | Changder, S. Debnath, N.C. Ghosh, D, “A New Approach to Hindi Text Steganography by Shifting Matra”, International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom '09, pp. 199-202. |
[9] | I.V. Karpinskyy, M.P. Sagan, A.M. Vasiltsov, "Development of VHDL-based core with embedded steganography function," CAD Systems in Microelectronics, CADSM 03. Proceedings of the 7th International Conference, pp. 260- 261. |
[10] | J.H.P. Eloff, M.S. Olivier T. Morkel, "An Overview Of Image Steganography," Proceedings of the Fifth Annual Information Security South Africa Conference. |
[11] | M., Tehran Shirali-Shahreza, "Text Steganography by Changing Words Spelling," Advanced Communication Technology, ICACT 08 10th International Conference, vol. 3, pp. 1912-1913. |
[12] | Alla, K. Prasad, R.S.R., “An Evolution of Hindi Text Steganography," Information Technology: New Generations, ITNG 09 Sixth International Conference, pp. 1577-1578. |
[13] | The Unicode Standard, http://www.unicode.org, last visited: 14 May 2010. |
[14] | Wikipedia,[Online].http://en.wikipedia.org/wiki/Chinese_character#Number_of_Chinese_characters. |
[15] | Wikipedia,[Online].http://en.wikipedia.org/wiki/Han_unification. |
[16] | Yong-Won Kim, Kyung-Ae Moon, and II-Seok Oh, "A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statics," 03. |
[17] | V.M. Han, S. Chang, E, Potdar, "Dictionary Module and UDC: Two new approaches to Enhance Embedding Capacity of a Steganographic Channel," Industrial Informatics, INDIN '05. 3rd IEEE International Conference, pp. 697- 700. |
[18] | (2010, December) Tech-faq.com.[Online].http://www.tech-faq.com/cryptography.html. |
[19] | (2010, Devember) Mycrypto.net.[Online].http://www.mycrypto.net/encryption/crypto_algorithms.html. |
[20] | (2010, September) Tools.ietf.org.[Online].http://tools.ietf.org/html/rfc1896. |
[21] | PeterWayner, Disappearing Cryptography Information Hiding Steganography and Watermarking, 3rd ed.: Morgan Kaufmann, 2002. |
[22] | Ajith Abraham, Computational Social Network Analysis: Trends, Tools and Research Advances (Computer Communications and Networks), 1st ed., Aboul-Ella Hassanien, Ed.: Springer, 2009. |
[23] | Rainer Böhme, Advanced Statistical Steganalysis (Information Security and Cryptography), 1st ed.: Springer, 2010. |
[24] | Hiding in Plain Sight: Steganography and the Art of Covert Communication: Wiley, 2003. |
[25] | Stefan Katzenbeisser, Information Hiding Techniques for Steganography and Digital Watermarking: Artech, 1999. |
[26] | Jatinder N. D. Gupta, Handbook of Research on Information Security and Assurance, 1st ed.: Information Science Reference, 2008. |
[27] | Barry J. Blake, Secret Language: Codes, Tricks, Spies, Thieves, and Symbols: Oxford University Press, 2010. |
[28] | Dorothy Elizabeth Robling Denning, Cryptography and Data Security: Addison-Wesley, 1982. |