Uninformed: Informative Information for the Uninformed

Vol 8» 2007.Sep


Bibliography

1
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler.
Sip: Session initiation protocol.
RFC 3261, Internet Society (IETF), June 2002.

2
Wikipedia.
H.323 -- wikipedia, the free encyclopedia.
http://en.wikipedia.org/w/index.php?title=H.323&oldid=146577248, 2007.
[Online; accessed 2-September-2007].

3
Wikipedia.
Skinny client control protocol -- wikipedia, the free encyclopedia.
http://en.wikipedia.org/w/index.php?title=Skinny_Client_Control_Protocol&oldid=133621770, 2007.
[Online; accessed 2-September-2007].

4
H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson.
Rtp: A transport protocol for real-time applications.
RFC 1889, Internet Society (IETF), January 1996.

5
J. Postel.
User datagram protocol.
RFC 768, Internet Society (IETF), August 1980.

6
M. Baugher, D. McGrew, M. Naslund, E. Carrara, and K. Norrman.
The secure real-time transport protocol (srtp).
RFC 3711, Internet Society (IETF), March 2004.

7
Mehdi Kharrazi, Husrev T. Sencar, and Nasir Memon.
Image steganography: Concepts and practice.
Lecture Notes Series, Institute for Mathematical Sciences, National University of Singapore, 2004.

8
Huaiqing Wang and Shuozhong Wang.
Cyber warfare: steganography vs. steganalysis.
Commun. ACM, 47(10):76-82, 2004.

9
Tayana Morkel, Jan H P Eloff, and Martin S Olivier.
An overview of image steganography.
In Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, June/July 2005.
Published electronically.

10
Unknown.
S-tools 4.0.
ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/s-tools4.zip, August 2006.

11
Fabien A. P. Petitcolas.
mp3stego.
http://www.petitcolas.net/fabien/steganography/mp3stego/, June 2006.

12
Heinz Repp.
Hide 4 pgp.
http://www.rugeley.demon.co.uk/security/hide4pgp.zip, December 1996.

13
I)ruid.
An analysis of voip steganography research efforts.
http://druid.caughq.org/papers/An-Analysis-of-VoIP-Steganography-Research-Efforts.pdf, September 2007.

14
I)ruid.
Real-time steganography with rtp.
http://druid.caughq.org/presentations/Real-time-Steganography-with-RTP.pdf, August 2007.

15
Defcon 15.
http://www.defcon.org/html/defcon-15/dc-15-schedule.html, August 2007.

16
T. Takahashi and W. Lee.
An assessment of voip covert channel threats.
http://voipcc.gtisc.gatech.edu/download/securecomm.pdf, July 2007.

17
Wikipedia.
G.711 -- wikipedia, the free encyclopedia.
http://en.wikipedia.org/w/index.php?title=G.711&oldid=151887535, 2007.
[Online; accessed 6-September-2007].

18
Wikipedia.
Least significant bit -- wikipedia, the free encyclopedia.
http://en.wikipedia.org/w/index.php?title=Least_significant_bit&oldid=150766150, 2007.
[Online; accessed 6-September-2007].

19
Voip foro - codecs.
http://www.voipforo.com/en/codec/codecs.php, 2007.
[Online; accessed 5-September-2007].

20
I)ruid.
Steganrtp.
http://sourceforge.net/projects/steganrtp/, August 2007.

21
D. Eastlake 3rd and P. Jones.
Us secure hash algorithm 1 (sha1).
RFC 3174, Internet Society (IETF), September 2001.

22
X. Wang, Y.L. Yin, and H. Yu.
Finding collisions in the full SHA-1.
Advances in Cryptology-CRYPTO, 3621:17-36, 2005.

23
I)ruid.
libfindrtp.
http://sourceforge.net/projects/libfindrtp/, February 2007.

24
Netfilter.
http://www.netfilter.org/, 2007.
[Online; accessed 6-September-2007].

25
Wikipedia.
Type-length-value -- wikipedia, the free encyclopedia.
http://en.wikipedia.org/w/index.php?title=Type-length-value&oldid=128880452, 2007.
[Online; accessed 3-September-2007].

26
Bob Jenkins.
Netfilter.
http://www.burtleburtle.net/bob/c/lookup3.c, May 2006.
[Online; accessed 6-September-2007].

27
Wikipedia.
Exclusive or -- wikipedia, the free encyclopedia.
http://en.wikipedia.org/w/index.php?title=Exclusive_or&oldid=152332544, 2007.
[Online; accessed 5-September-2007].

28
J. Mason, K. Watkins, J. Eisner, and A. Stubblefield.
A natural language approach to automated cryptanalysis of two-time pads.
Proceedings of the 13th ACM conference on Computer and communications security, pages 235-244, 2006.

29
A. Griffing.
Solving XOR Plaintext Strings with the Viterbi Algorithm.
Cryptologia, 30(3):258-265, 2006.

30
E. Dawson and L. Nielsen.
AUTOMATED CRYPTANALYSIS OF XOR PLAINTEXT STRINGS.
Cryptologia, 20(2):165-181, 1996.

31
Wikipedia.
Forward error correction -- wikipedia, the free encyclopedia, 2007.
[Online; accessed 10-September-2007].