tempbib12.bib

@MISC{Walker1994impl,
  author = {John Walker},
  title = {Steganosaurus},
  month = {December},
  year = {1994},
  howpublished = {circulating on the web},
  url = {http://www.fourmilab.ch/stego/stego.shar.gz},
  note = {\url{http://www.fourmilab.ch/stego/stego.shar.gz},
    accessed 2005-03-25},
  abstract = {Steganosaurus is a plain text steganography (secret writing)
    utility which encodes a (usually encrypted) binary file as gibberish text,
    based on either a spelling dictionary or words taken from a text document.
    In portable C; public domain.}
}
@MISC{Maher1995impl,
  author = {Kevin Maher},
  title = {Texto},
  month = {February},
  year = {1995},
  howpublished = {circulating on the web},
  url = {http://www.ecn.org/crypto/soft/texto.zip},
  note = {\url{http://www.ecn.org/crypto/soft/texto.zip},
    accessed 2005-03-22},
  abstract = {Texto is a rudimentary text steganography program which
    transforms uuencoded or pgp ascii-armoured ascii data into English
    sentences. This program was written to facilitate the exchange of binary
    data, especially encrypted data.  Why is this necessary?  People or
    programs may be reading your mail.  Recent events in the US congress may
    _require_ Internet Service Providers to monitor incoming mail and
    determine whether or not it is "obscene" or lives up to particular
    parochial moral standards.  Since they can't scan the contents of an
    encrypted message, and probably don't have time to manually look at each
    uuencoded message, such emails will probably go into the bit bucket. This
    program's output is hopefully close enough to normal English text that it
    will slip by any kind of automated scanning.}
}
@MISC{Chapman1997impl,
  author = {Mark T. Chapman and George I. Davida},
  title = {NICETEXT},
  month = {August},
  year = {1997},
  howpublished = {Website},
  url = {http://www.nicetext.com/},
  note = {\url{http://www.nicetext.com/},
    accessed 2005-03-09},
  abstract = {NICETEXT is a package that converts any file into
    pseudo-natural-language text.  It also has the ability to recover the
    original file from the text! The expandable set of tools allows
    experimentation with custom dictionaries, automatic simulation of writing
    style, and the use of Context-Free-Grammars to control text generation.}
}
@MISC{Wayner1997impl,
  author = {Peter Wayner},
  title = {Mimicry Applet},
  month = {August},
  year = {1997},
  howpublished = {Website},
  url = {http://www.wayner.org/texts/mimic/},
  note = {\url{http://www.wayner.org/texts/mimic/},
    accessed 2004-04-12},
  abstract = {This applet shows how data can be mutated into innocent sounding
    plaintext with the push of a button. In this case, the destination is a
    the voiceover from a hypothetical baseball game between two teams named
    the Blogs and the Whappers. The information is encoded by choosing the
    words, the players and the action in the game. In some cases, one message
    will lead to a string of homeruns and in other cases a different message
    will strike out three players in a row.}
}
@MISC{Winstein1999impl,
  author = {Keith Winstein},
  title = {Tyrannosaurus Lex},
  month = {January},
  year = {1999},
  howpublished = {Website},
  url = {http://alumni.imsa.edu/~keithw/tlex/},
  note = {\url{http://alumni.imsa.edu/~keithw/tlex/},
    accessed 2005-03-09},
  abstract = {Steganography is a field concerned with hiding information,
    typically within some unsuspicious "carrier". For instance, an online news
    site might use steganographic watermarking to encode their images with
    some copyright notice, allowing them to easily search for copies of the
    same images on another web site by searching for images containing the
    watermark. Schemes for hiding data in blocks of text exist, but are
    usually dependent on being able to modify the physical appearance of the
    text - usually by subtly moving lines up and down, etc. Lexical
    steganography is the encoding of data in blocks of text on the lexical,
    or word, level.}
}
@MISC{Hugg1999impl,
  author = {Steven E. Hugg},
  title = {Stegparty},
  month = {November},
  year = {1999},
  howpublished = {Website},
  url = {http://www.fasterlight.com/hugg/projects/stegparty.html},
  note = {\url{http://www.fasterlight.com/hugg/projects/stegparty.html},
    accessed 2005-03-25},
  abstract = {StegParty is a system for hiding information inside of
    plain-text files. Unlike similar tools currently available it does not use
    random gibberish to encode data -- it relies on small alterations to the
    message, like changes to spelling and punctuation. Because of this you can
    use any plain-text file as your carrier , and it will be more-or-less
    understandable after the secret message is embedded.}
}
@MISC{McKellar2000impl,
  author = {David McKellar},
  title = {Spammimic},
  month = {June},
  year = {2000},
  howpublished = {Website},
  url = {http://www.spammimic.com/},
  note = {\url{http://www.spammimic.com/},
    accessed 2004-04-12},
  abstract = {There is tons of spam flying around the Internet. Most people
    can't delete it fast enough. It's virtually invisible. This site gives you
    access to a program that will encrypt a short message into spam.
    Basically, the sentences it outputs vary depending on the message you are
    encoding. Real spam is so stupidly written it's sometimes hard to tell the
    machine written spam from the genuine article.}
}
@MISC{Shields2001impl,
  author = {Paul Shields},
  title = {Stegano},
  month = {November},
  year = {2001},
  howpublished = {circulating on the web},
  url = {http://zooid.org/~paul/crypto/natlang/stegano-1.02.tar.gz},
  note = {\url{http://zooid.org/~paul/crypto/natlang/stegano-1.02.tar.gz},
    accessed 2005-03-25},
  abstract = {This is a small set of heuristic tools intended for use in
    steganographic writings. How you use these tools is up to you.}
}
@MISC{Zalewski2002impl,
  author = {Michal Zalewski},
  title = {snowdrop},
  month = {September},
  year = {2002},
  howpublished = {freshmeat entry},
  url = {http://freshmeat.net/projects/snowdrop/},
  note = {\url{http://freshmeat.net/projects/snowdrop/},
    accessed 2005-03-20},
  abstract = {snowdrop is a steganographic text document and C code
    watermarking tool that uses redundant, tamper-evident and
    modification-proof information embedded in the content itself, instead of
    the medium, to simplify tracking of proprietary code leaks, sensitive
    information disclosure, etc.}
}
@MISC{ComprisXXXXimpl,
  corpauthor = {Compris Intelligence GmbH},
  key = {Compris Intelligence GmbH},
  institution = {Compris Intelligence GmbH},
  title = {TextHide},
  howpublished = {Website},
  url = {http://www.texthide.com/},
  note = {\url{http://www.texthide.com/},
    accessed 2005-03-20},
  abstract = {Compris Intelligence GmbH has developed a program which can
    automatically reformulate text. Nevertheless, the meaning of the text is
    retained completely. This feature can also be used to hide data in normal
    text. The technical term for this is steganography.}
}
@MISC{ComprisXXXXimpla,
  corpauthor = {Compris Intelligence GmbH},
  key = {Compris Intelligence GmbH},
  institution = {Compris Intelligence GmbH},
  title = {TextSign},
  howpublished = {Website},
  url = {\url{http://www.textmark.com/},
    http://www.textmark.com/},
  note = {accessed 2005-03-20},
  abstract = {Scanning, speech recognition, internet downloading, intelligent
    text processing systems: Text processing becomes increasingly simple,
    writing good texts remains difficult. With TextMark you protect your
    intellectual property. This innovation distinguishes itself by its broad
    applicability to all kinds of textual documents and its tamper proof
    characteristic.}
}