Wojciech Mazurczyk; Krzysztof Szczypiorski (November 2008). 〈Steganography of VoIP Streams〉. 《On the Move to Meaningful Internet Systems: OTM 2008》. Lecture Notes in Computer Science 5332. 1001–1018쪽. arXiv:0805.2938. doi:10.1007/978-3-540-88873-4_6. ISBN978-3-540-88872-7. S2CID14336157.지원되지 않는 변수 무시됨: |name-list-style= (도움말)
Bartosz Jankowski; Wojciech Mazurczyk; Krzysztof Szczypiorski (2010년 5월 11일). “Information Hiding Using Improper Frame Padding”. arXiv:1005.1925 [cs.CR].더 이상 지원되지 않는 변수를 사용함 (도움말); 지원되지 않는 변수 무시됨: |name-list-style= (도움말)
Fridrich, Jessica; M. Goljan; D. Soukal (2004). Delp Iii, Edward J; Wong, Ping W (편집). 《Searching for the Stego Key》(PDF). 《Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI》. Security, Steganography, and Watermarking of Multimedia Contents VI 5306. 70–82쪽. Bibcode:2004SPIE.5306...70F. doi:10.1117/12.521353. S2CID6773772. 2023년 5월 10일에 원본 문서(PDF)에서 보존된 문서. 2014년 1월 23일에 확인함.
Steven J. Murdoch; Stephen Lewis (2005). “Embedding Covert Channels into TCP/IP”(PDF). 《Information Hiding Workshop》. 2010년 6월 16일에 확인함.지원되지 않는 변수 무시됨: |name-list-style= (도움말)
Fridrich, Jessica; M. Goljan; D. Soukal (2004). Delp Iii, Edward J; Wong, Ping W (편집). 《Searching for the Stego Key》(PDF). 《Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI》. Security, Steganography, and Watermarking of Multimedia Contents VI 5306. 70–82쪽. Bibcode:2004SPIE.5306...70F. doi:10.1117/12.521353. S2CID6773772. 2023년 5월 10일에 원본 문서(PDF)에서 보존된 문서. 2014년 1월 23일에 확인함.
Cheddad, Abbas; Condell, Joan; Curran, Kevin; Mc Kevitt, Paul (2010). 《Digital image steganography: Survey and analysis of current methods》. 《Signal Processing》 90. 727–752쪽. Bibcode:2010SigPr..90..727C. doi:10.1016/j.sigpro.2009.08.010.
Giannoula, A.; Hatzinakos, D. (2003). 〈Compressive data hiding for video signals〉. 《Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429)》 1. IEEE. I–529–32쪽. doi:10.1109/icip.2003.1247015. ISBN0780377508. S2CID361883.
Dittmann, Jana; Hesse, Danny; Hillert, Reyk (2005년 3월 21일). Delp Iii, Edward J; Wong, Ping W (편집). 《Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set》. 《Security, Steganography, and Watermarking of Multimedia Contents VII》 5681 (SPIE). 607쪽. Bibcode:2005SPIE.5681..607D. doi:10.1117/12.586579. S2CID206413447.
Ghosal, Sudipta Kr; Mukhopadhyay, Souradeep; Hossain, Sabbir; Sarkar, Ram (2020). 《Application of Lah transform for security and privacy of data through information hiding in telecommunication》. 《Transactions on Emerging Telecommunications Technologies》 32. doi:10.1002/ett.3984. S2CID225866797.
Cheddad, Zohra Adila; Cheddad, Abbas (2024). 〈Active Restoration of Lost Audio Signals Using Machine Learning and Latent Information〉. 《Proceedings 2023 Intelligent Systems Conference (IntelliSys'23)》. Lecture Notes in Networks and Systems 822. LNCS,Springer. 1–16쪽. doi:10.1007/978-3-031-47721-8_1. ISBN978-3-031-47720-1.
Cheddad, Abbas; Condell, Joan; Curran, Kevin; Mc Kevitt, Paul (2009). 《A skin tone detection algorithm for an adaptive approach to steganography》. 《Signal Processing》 89. 2465–2478쪽. Bibcode:2009SigPr..89.2465C. doi:10.1016/j.sigpro.2009.04.022.
Mazurczyk, Wojciech; Wendzel, Steffen; Cabaj, Krzysztof (2018년 8월 27일). 〈Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach〉. 《Proceedings of the 13th International Conference on Availability, Reliability and Security》. 1–10쪽. doi:10.1145/3230833.3233261. ISBN9781450364485. S2CID51976841.
Mileva, Aleksandra; Velinov, Aleksandar; Hartmann, Laura; Wendzel, Steffen; Mazurczyk, Wojciech (May 2021). 《Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels》. 《Computers & Security》 104. 102207쪽. doi:10.1016/j.cose.2021.102207. S2CID232342523.
Murdoch, Steven J.; Lewis, Stephen (2005), “Embedding Covert Channels into TCP/IP”, 《Information Hiding》 (Springer Berlin Heidelberg), 247–261쪽, doi:10.1007/11558859_19, ISBN9783540290391
Wojciech Mazurczyk; Krzysztof Szczypiorski (November 2008). 〈Steganography of VoIP Streams〉. 《On the Move to Meaningful Internet Systems: OTM 2008》. Lecture Notes in Computer Science 5332. 1001–1018쪽. arXiv:0805.2938. doi:10.1007/978-3-540-88873-4_6. ISBN978-3-540-88872-7. S2CID14336157.지원되지 않는 변수 무시됨: |name-list-style= (도움말)
Fridrich, Jessica; M. Goljan; D. Soukal (2004). Delp Iii, Edward J; Wong, Ping W (편집). 《Searching for the Stego Key》(PDF). 《Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI》. Security, Steganography, and Watermarking of Multimedia Contents VI 5306. 70–82쪽. Bibcode:2004SPIE.5306...70F. doi:10.1117/12.521353. S2CID6773772. 2023년 5월 10일에 원본 문서(PDF)에서 보존된 문서. 2014년 1월 23일에 확인함.
Cheddad, Abbas; Condell, Joan; Curran, Kevin; Mc Kevitt, Paul (2010). 《Digital image steganography: Survey and analysis of current methods》. 《Signal Processing》 90. 727–752쪽. Bibcode:2010SigPr..90..727C. doi:10.1016/j.sigpro.2009.08.010.
Dittmann, Jana; Hesse, Danny; Hillert, Reyk (2005년 3월 21일). Delp Iii, Edward J; Wong, Ping W (편집). 《Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set》. 《Security, Steganography, and Watermarking of Multimedia Contents VII》 5681 (SPIE). 607쪽. Bibcode:2005SPIE.5681..607D. doi:10.1117/12.586579. S2CID206413447.
Cheddad, Abbas; Condell, Joan; Curran, Kevin; Mc Kevitt, Paul (2009). 《A skin tone detection algorithm for an adaptive approach to steganography》. 《Signal Processing》 89. 2465–2478쪽. Bibcode:2009SigPr..89.2465C. doi:10.1016/j.sigpro.2009.04.022.
Fridrich, Jessica; M. Goljan; D. Soukal (2004). Delp Iii, Edward J; Wong, Ping W (편집). 《Searching for the Stego Key》(PDF). 《Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI》. Security, Steganography, and Watermarking of Multimedia Contents VI 5306. 70–82쪽. Bibcode:2004SPIE.5306...70F. doi:10.1117/12.521353. S2CID6773772. 2023년 5월 10일에 원본 문서(PDF)에서 보존된 문서. 2014년 1월 23일에 확인함.
Giannoula, A.; Hatzinakos, D. (2003). 〈Compressive data hiding for video signals〉. 《Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429)》 1. IEEE. I–529–32쪽. doi:10.1109/icip.2003.1247015. ISBN0780377508. S2CID361883.
Dittmann, Jana; Hesse, Danny; Hillert, Reyk (2005년 3월 21일). Delp Iii, Edward J; Wong, Ping W (편집). 《Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set》. 《Security, Steganography, and Watermarking of Multimedia Contents VII》 5681 (SPIE). 607쪽. Bibcode:2005SPIE.5681..607D. doi:10.1117/12.586579. S2CID206413447.
Ghosal, Sudipta Kr; Mukhopadhyay, Souradeep; Hossain, Sabbir; Sarkar, Ram (2020). 《Application of Lah transform for security and privacy of data through information hiding in telecommunication》. 《Transactions on Emerging Telecommunications Technologies》 32. doi:10.1002/ett.3984. S2CID225866797.
Mazurczyk, Wojciech; Wendzel, Steffen; Cabaj, Krzysztof (2018년 8월 27일). 〈Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach〉. 《Proceedings of the 13th International Conference on Availability, Reliability and Security》. 1–10쪽. doi:10.1145/3230833.3233261. ISBN9781450364485. S2CID51976841.
Mileva, Aleksandra; Velinov, Aleksandar; Hartmann, Laura; Wendzel, Steffen; Mazurczyk, Wojciech (May 2021). 《Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels》. 《Computers & Security》 104. 102207쪽. doi:10.1016/j.cose.2021.102207. S2CID232342523.
Wojciech Mazurczyk; Krzysztof Szczypiorski (November 2008). 〈Steganography of VoIP Streams〉. 《On the Move to Meaningful Internet Systems: OTM 2008》. Lecture Notes in Computer Science 5332. 1001–1018쪽. arXiv:0805.2938. doi:10.1007/978-3-540-88873-4_6. ISBN978-3-540-88872-7. S2CID14336157.지원되지 않는 변수 무시됨: |name-list-style= (도움말)
Liao, Xin; Wen, Qiao-yan; Shi, Sha (2011). 〈Distributed Steganography〉. 《2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing》. IEEE. 153–156쪽. doi:10.1109/IIHMSP.2011.20. ISBN978-1-4577-1397-2. S2CID17769131.
Kamran Ahsan; Deepa Kundur (December 2002). “Practical Data Hiding in TCP/IP”(PDF). 《ACM Wksp. Multimedia Security》. 2012년 10월 29일에 원본 문서(PDF)에서 보존된 문서. 2010년 6월 16일에 확인함.지원되지 않는 변수 무시됨: |name-list-style= (도움말)
Fridrich, Jessica; M. Goljan; D. Soukal (2004). Delp Iii, Edward J; Wong, Ping W (편집). 《Searching for the Stego Key》(PDF). 《Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI》. Security, Steganography, and Watermarking of Multimedia Contents VI 5306. 70–82쪽. Bibcode:2004SPIE.5306...70F. doi:10.1117/12.521353. S2CID6773772. 2023년 5월 10일에 원본 문서(PDF)에서 보존된 문서. 2014년 1월 23일에 확인함.
Kamran Ahsan; Deepa Kundur (December 2002). “Practical Data Hiding in TCP/IP”(PDF). 《ACM Wksp. Multimedia Security》. 2012년 10월 29일에 원본 문서(PDF)에서 보존된 문서. 2010년 6월 16일에 확인함.지원되지 않는 변수 무시됨: |name-list-style= (도움말)