4. Ramkumar M. Data Hiding in Multimedia. PhD Thesis. New Jersey Institute of Technology, 1999. 72 p.
5. Simmons G. The prisoner`s problem and the subliminal channel // Proc. Workshop on Communications Security (Crypto`83), 1984. P. 51–67.
6. Simmons G. The History of Subliminal Channels // IEEE Journal on Selec-ted Areas of Communications. 1998. Vol. 16, № 4. P. 452–461.
7. Fridrich J., Du R., Long M. Steganalysis of LSB encoding in color images // ICME, 2000.
8. Voloshynovskiy S., Pereira S., Iquise V., Pun T. Attack Modelling: Towards a Second Generation Watermarking Benchmark // Preprint. University of Geneva, 2001. 58 p.
9. Marvel L. Image Steganography for hidden communication. PhD Thesis. Univ.of Delaware, 1999. 115 p.
10. Cox J., Miller M., McKellips A. Watermarking as communications with side information // Proceedings of the IEEE. 1999. Vol. 87. № 7. P. 1127–1141.
11. Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed. New York // John Wiley and Sons, 1996.
12. Anderson R. Stretching the Limits of Steganography // Information Hiding, Springer Lecture Notes in Computer Science. 1996. Vol. 1174. P. 39–48.
13. Craver S. On Public-Key Steganography in the Presence of an Active Warden // Intel Corp., 1997. 13 p.
14. Craver S. Zero Knowledge Watermark Detection // Princeton Univ., 1999. 16 p.
15. Pitas I. A Method for Signature Casting on Digital Images // Proceedings of ICIP. 1996. Vol.3. P. 215– 218.
1. Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed. New York // John Wiley and Sons, 1996.
2. Hartung F., Su J., Girod B. Spread Spectrum Watermarking: Malicious Attacks and Counterattacks.
3. Petitcolas F., Anderson R., Kuhn M. Attacks on Copyright Marking Systems // Lecture Notes in Computer Science. 1998. P. 218–238.
4. Langelaar G., Lagendijk R., Biemond J. Removing spatial spread spectrum watermarks by non-linear filtering // Proceedings EUSIPCO-98. 1998.
5. Kutter M., Voloshynovskiy S., Herrigel A. The Watermark Copy Attack // Proceedings of SPIE: Security and Watermarking of Multimedia Content II. 2000. Vol. 3971.
6. Su J., Girod B. On the imperceptibility and robustness of digital fingerprints // IEEE ICMCS-99. 1999.
7. Voloshynovskiy S., Herrigel, A., Baumgrtner N., Pun T. A stochastic approach to content adaptive digital image watermarking // Proceeding of International Workshop on Information hiding. 1999.
8. Cox I., Linnartz J. Some general methods for tampering with watermarks // IEEE Journal on Selected Areas of Communications. 1997.
9. Kutter M. Digital Image Watermarking: Hiding Information in Images. PhD thesis, Swiss Federal Institute of Technology, Lausanne, Switzerland, 1999.
10. Petitcolas F. Weakness of existing watermarking schemes. http://www.cl.cam.ac.uk/~fapp2/w atermarking/image_watermarking. 1997.
11. Lin C. Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection. PhD Thesis, Columbia University, 2000.
12. Wu M. Multimedia Data Hiding. PhD Thesis, Princeton University, 2001.
13. Craver S., Memon N., Yeo B., Yeung M. Can Invisible Watermarks Resolve Rightful Ownerships? // IBM Research Report. 1996.
14. Craver S., Memon N., Yeo B., Yeung M. On the Invertibility of Invisible Watermarking Techniques // Proc. of ICIP. 1997.
15. Craver S., Memon N., Yeo B., Yeung M. Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications // IEEE Journal on Selected Areas in Communication. 1998. Vol. 16. № 4. P. 573–586.
16. Deguillaume F., Csurka G., Pun T. Countermeasures for unintentional and intentional video watermarking attacks // SPIE Electronic Imaging. 2000.
17. Maes M. Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks // Proceeding of International Workshop on Information hiding. 1998.
1. Шеннон К. Работы по теории информации и кибернетики / Пер. с англ. —М.: Иностранная литература, 1963. — 829 с.
2. Moulin P., O’Sullivan J. Information-theoretic analysis of information hiding. 1999. 43 p.
3. Su J.K., Eggers J.J., Girod B. Analysis of Digital Watermarks Subjected to Optimum Linear Filtering and Additive Noise // Signal Processing. Special Issue on Information Theoretic Issues in Digital Watermarking. 2001. Vol. 81. № 6. P. 1141–1175.
4. Marvel L. Image Steganography for Hidden Communication. PhD Thesis. University of Delavare, 1999. 115 p.
5. Ramkumar M. Data Hiding in Multimedia — Theory and applications. PhD Thesis. University Heights, 1999. 68 p.
6. Petitcolas F., Anderson R.J., Kuhn M.G. Information Hiding — A Survey // Proceedings IEEE, Special Issue on Identification and Protection of Multimedia Information. 1999. Vol. 87. №. 7. P. 1069–1078.
7. Hartung F., Kutter M. Multimedia Watermarking Techniques // Proceedings IEEE, Special Issue on Identification and Protection of Multimedia Information. 1999. Vol. 87. №. 7. P. 1079–1107.
8. Быков С.Ф. Алгоритм сжатия JPEG c позиций компьютерной стеганографии // Защита информации. Конфидент. 2000. № 3.
9. Swanson M.D., Kobayahi M., Tewfik A.H. Multimedia Data-Embedding and Watermarking Strategies // Proceeding of IEEE. 1998. Vol. 86. №. 6. P. 1064–1087.
10. Wolgang R.B., Podilchuk C.I., Delp E.J. Perceptual Watermarking for Digital Images and Video // Proceeding IEEE, Special Issue on Identification and Protection of Multimedia Information. 1999. Vol. 87. №. 7. P. 1088–1126.
11. Wong P.W. A Public Key Watermark for Image Verification and Authentication // Proc. Int. Conf. Im. Proc. 1998. Vol. I. P. 455–459.
12. Bender W., Gruhl D., Morimoto N. Techniques for Data Hiding // Proc. SPIE. 1995. Vol. 2420. P.40.
13. Busch C., Funk W., Wolthusen S. Digital Watermarking: From Concepts to Real-Time Video Applications // IEEE Computer Graphics and Applications. 1999. P. 25–35.
14. Hartung F., Girod B. Digital Watermarking of Uncompressed Video // Signal Processing. 1998. Vol. 66. P. 283–301.
15. Cox I.J., Miller M.L., McKellips A.L. Watermarking as Communication with Side Information // Proceeding IEEE, Special Issue on Identification and Protection of Multimedia Information. 1999. Vol. 87. №. 7. P. 1127– 1141.
16. Kutter M. Digital image watermarking: hiding information in images. PhD Thesis. University of Lausanne, EPFL, 1999.
17. Cachin C. An Information-Theoretic Model for Steganography // Proceeding of the Workshop on Information Hiding. 1998.
18. Чиссар И., Кернер Я. Теория информации: Теоремы кодирования для дискретных систем без памяти / Перевод с англ. — М.: Мир, 1985, –400 с.
19. Wyner A.D. The wire-tap channel // Bell System Tech. J. 1975. Vol. 54. № 8. P. 1355–1387.
20. Яковлев В.А. Защита информации на основе кодового зашумления. Часть 1. Теория кодового зашумления. / Под ред. В.И. Коржика. — С.Пб.: ВАС, 1993.–245 с.
21. Коршунов Ю.М. Математические основы кибернетики.—М.: Энергия, 1980.— 424 с.
22. Voloshynovkiy S., Pereira S., Pun T., Eggers J., Su J. Attacks on digital watermarks: classification,