1Stefan Katzenbeisser et al 吴秋新 等.信息隐藏技术:E急写术与数字水印[M].北京:人民邮电出版社,2001..
2.信息E急藏全国学术研讨会论文集[c].西安:西安电子科技大学出版社,2001..
3Fabien A P Petitcolas, Ross J Anderson, Markus G Kuhn.Information Hiding : a Survey [ J ] . Proc. IEEE, Special Issue on Protection of Multimedia Content, 1999,87 (7) : 1062-1078.
4The SNOW Home Page. Available WWW: http ://www. dark-side. com. au/snow/, 2002-08.
5Craig H Rowland. (Nov. 1996)Covert Channels in the TCP/IP Protocol Suite Available WWW [ EB/OL ]. http ://www. psionic.com/papers/covertchannels, html, 2002-08.
6IETF RFC Page Available WWW[ EB/OL]. http://www, ietf.org/rfc, html, 2002-08.
7S. Katzenbeisser and F.A.P. Petitcolas, editors, Information Hiding:Techniques for Steganography and Digital Watermarking[M]. Artech House,2000.
8C. H. Rowland.Covert channels in the TCP/IP protocol suite[M].First Monday, 1996.
9B. Chor, A. Fiat, M. Naor and B. Pinkas[M].Tracing Traitors,IEEE Transactions on Information Theory, 46(3),May 2000.
10Banerjee and B. Bhattacharjee, Scalable Secure Group Communication over IP Multicast[J].International Conference on Network Protocols, Riverside, CA,November 10-14, 2001.