Next: Appendix A: Code
Up: Steganography Using Computer Images
Previous: Conclusion
- 1
- Kay, Russell. How Steganography Works URL
http://www.computerworld.com/securitytopics/security/story/0,10801,71728,00.html (visited 2003, May 20).
- 2
- Latham, Allan. Steganography URL http://linux01.gwdg.de/ alatham/stego.html (visited 2002, October 16).
- 3
- Provos, Niels. Steganography Detection with Stegdetect URL
http://www.outguess.org/detection.php (visited 2002, October 23).
- 4
- Roelofs, Greg. Libpng Home URL
http://www.libpng.org/pub/png/libpng.html (visited 2003, June 11).
- 5
- Wilson, Preston. Linkbeat.com URL
http://www.linkbeat.com/files (visited 2002, October 16).
William Barratt
2003-06-13