next up previous
Next: Appendix A: Code Up: Steganography Using Computer Images Previous: Conclusion

Bibliography

1
Kay, Russell. How Steganography Works URL
http://www.computerworld.com/securitytopics/security/story/0,10801,71728,00.html (visited 2003, May 20).

2
Latham, Allan. Steganography URL http://linux01.gwdg.de/ alatham/stego.html (visited 2002, October 16).

3
Provos, Niels. Steganography Detection with Stegdetect URL
http://www.outguess.org/detection.php (visited 2002, October 23).

4
Roelofs, Greg. Libpng Home URL
http://www.libpng.org/pub/png/libpng.html (visited 2003, June 11).

5
Wilson, Preston. Linkbeat.com URL
http://www.linkbeat.com/files (visited 2002, October 16).



William Barratt 2003-06-13