2W.Mazurczyk,M.Smolarczyk,K. Szczypiorski, RSTEG-Retransmission Steganography and Its Detection,In: Soft C omputing, ISSN : 1432 - 7643(print version)ISSN : 1433 - 7479(electronic version),Joumal no.500 Springer.
3W.Mazurczyk,J.Lubacz,LACK-a VoIP Steganographic Method,In:Tele- communication Systems: Modelling, Analysis,Design and Management,Vol. 45,Numbers 2-3,2010,ISSN: 1018- 4864(print version), ISSN: 1572 - 9451 (electronic version) , Springer US,Journal no. 1123.
二级参考文献5
1Handel T,M Sandford.Hiding Data in the OSI Network Model[C]// Proceedings of the 1st International Workshop on Information Hiding.Cambridge,U.K:[s.n.],1996.
2Giffin J,Greenstadt R,Litwack P,et.al.Covert Messaging Through TCP Timestamps[C]//Proceedings of 2nd International Workshop on Privacy Enhancing Technologies.San Francisco,CA,USA:[s.n.],2003.
3Cauich E,Gardenas R G,Watanabe R.Data Hiding in Identification and Offset IP Fields[C]//Proceedings of 5th International Symposium on Advanced Distributed System,Guadalajara,Mexico:[s.n.],2005.
4Ahsan K,Kundur D.Practical Data Hiding in TCP/IP[C]// Proceedings of ACM Workshop on Multimedia Security.Juan-les-Pins,France:[s.n.],2002.