55
DAFTAR PUSTAKA
Abboud, G., Marean, J. & Yampolskiy, V. R. 2010. Steganography and Visual Cryptography in Computer Forensics. International Workshop on Systematic Approaches to Digital Forensic Engineering 5: 25-32
Begum, M. B. & Venkantaramani, Y. 2012. LSB Based Audio Steganography Based On Text Compression. Procedia Engineering 30 : 703-710
Boehm, B. 2014. StegExpose A Tool For Detecting LSB Steganography. Tesis. School of Computing University of Kent.
Chan, C.-K. & Cheng, L. M. 2004. Hiding Data In Images By Simple LSB Substitution.
The Journal Of Pattern Recognition 37: 469-474
Champakamala, B.S. Padmini, K. & Radhika, D. K. 2014. Least Significant Bit algorithm for image steganography. International Journal of Advance Computer Technology 3(4) : 34-38
Eisen, P. A. & Stinson, D. R. Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels. 2002. Design, Codes and Cryptography 25:15-61
Fransisco, N. C., Rodrigues, N. M. M., Silva, E. A. B., Carvalho, M. B., Faria, S. M. M. & Silva, V. M. M. 2010. Scanned Compound Document Encoding Using Multiscale Recurrent Patterns. IEEE Transactions On Image Processing 19: 2712-2724
Harris, R. 2006. Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem. Digital Investigation 3: 44-49
Ito, R., Kuwakado, H., & Tanaka, H. 1999. Image size invariant visual cryptography. 10 : 2172-2177
Jain, A. & Chhabra, G. S. 2014. Anti-forensics techniques: An analytical review.
Contemporary Computing (IC3) 7: 412-418
Katzenbeisser, S. Petitcolas, F. A. P. 2000. Information Hiding Techniques for
Steganography and Digital Watermarking. Rtech House Inc: Massachuttes.
Kessler, G. C. 2007. Anti-forensics and the digital investigator. Proceedings of
Australian Digital Forensics Conference 5: 1-7
Liu, F. & Yan, Q. W. 2014. Visual Cryptography for Image Processing and Security
Theory, Methods, and Applications. Springer International Publishing. Switzerland
Luo, X., Liu, B. & Liu, F. 2006. A Dynamic Compensation LSB Steganography Resisting RS Steganalysis. Proceedings of the IEEE 1: 244-249
56
Montanaro, D. &Branco, R. R. 2007. The Computer Forensics Challenge and
Anti-Forensics Techniques. Kuala Lumpur Press: Malaysia
Naor, M. & Shamir, A. 1995. Visual cryptography.EUROCRYPT ’94950: 1-12
Topkara, M., Riccardi, G., Tur, D. H. & Atallah, M. J. 2006. Natural Language Watermarking: Challenges in Building a Practical System. Proceedings of the SPIE
International Conference on Security, Steganography, and Watermarking of Multimedia Contents.
Provos, N. & Honeyman, P. 2003. Hide and Seek: An Introduction to Steganography.
IEEE Security & Privacy 1: 32-44
Sutoyo, T., Mulyanto, E., Suhartono, V., Nurhayati, D. N. & Wijayanto. 2009. Teori
Pengolahan Citra. Penerbit Andi : Yogyakarta
Tabriz, P. & Borisov, N. 2006. Breaking the collusion detection mechanism of morphmix.
Lecture Notes in Computer Science 4258: 368–383.
Wayner, P. 2009. Dissappearing Cryptography, Information Hiding: Steganography &
Watermarking Third Edition. Elsevier: USA
Weir, J. & Yan, W. 2012. Visual Cryptography and Its Applications. Ventus Publishing Aps: New York
Wu, X., Duncan, S., & Li, Q. 2010. Extended Visual Cryptography Scheme for Color Images With No Pixel Expansion. Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on, Athens. 1 : 1-4
Yusoff, Y., Ismail, R. & Hasan, Z. 2011. Common Phases of Computer Forensics Investigation Models. International Journal of Computer Science & Information
Technology (IJCSIT) 3: 121-127.
Zang, L., Zhou, Y. & Fan, J. 2014. The forensic analysis of encrypted Truecrypt volumes.
Progress in Informatics and Computing (PIC) 1: 405-409
Yang, C-N. 2004. New visual secret sharing schemes using probabilistic method", Pattern Recognition Letters. 25 : 481-494