|
1.CNSS Policy No. 15, Fact Sheet No. 1, National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information , June 2006 [http://www.cnss.gov/Assets/pdf/cnssp_15_fs.pdf] 2.F.A.P. Peticolas, R.J. Anderson, and M.G. Kuhn, “Information Hiding – A Survey”, IEEE Trans. Proc. Thy, Vol. 87, No.7, pp. 1062-1078, July 1999. 3.Christian Grothoff, Krista Grothoff, Ludmila Alkhutova,Ryan Stutsman, and Mikhail J. Atallah. “Translation-based steganography”. In Proceedings of Information HidingWorkshop (IH 2005), pages 213–233. Springer-Verlag, 2005. 4.Bao, P.and Xiaohu Ma, “MP3-resistant music steganography based on dynamic range transform”, IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS 2004), 18-19 Nov. 2004, pp.266-271. 5.EasyBMP [http://easybmp.sourceforge.net/steganography.html] 6.Dorian A. Flowers, “Investigating Steganography”, ACM-SE 42, April 2004 7.Chin-Chen Chang, Richard Char-Tung Lee, Guang-Xue Xiao, Tung-Shou Chen “A new speech hiding scheme based upon subband coding”, IEEE Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. 8.ITU-T Recommendation G.711. Pulse Code Modulation for voice frequencies, Nov. 1988. 9.Daniel Collins, Carrier Grade Voice over IP, 2nd Ed., McGraw-Hill, September 2002. 10.Speex [http://www.speex.org/] 11.J.P. Campbell, Jr., T.E. Tremain and V.C. Welch, The Federal Standard 1016 4800 bps CELP voice coder, Digital Signal Processing 1:145–154 (1991). 12.Speex Reference Manual 1.2-beta2 [http://www.speex.org/docs/api/speex-api-reference.pdf] 13.Linphone [http://www.linphone.org/] 14.FIP PUB 197 : the official AES standard [http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf] 15.Implements of AES (Rijndael) in C/C++ and Assembler, Brian Gladman [http:// fp.gladman.plus.com]
|