by Sandra Shaw

Sources
Borse, Govinda, Vijay Anand, and Kailash Patel. (2013, Oct). Steganography: Exploring an
ancient art of Hiding Information from Past to the Future. Retrieved from
www.ijeit.com/Vol%203/Issue%204/…T1412201310_33.pdf.

Fortini, M. (n. d.). A brief history of steganography. Retrieved from
www.lia.deis.unibo.it/Courses/RetiDi…i/history.html.

Krystek, L. (2010). The Lines of Nazca Peru. Retrieved from www.unmuseum.org/mob/nazca.htm.

Mendick, R. (2014, Nov 22). Wartime spy finally accepts she is a French heroine. Retrieved from
www.telegraph.co.uk/history/world-w…ch-heroine.html.

Oldfield, Molly and John Mitchinson. (2014, Feb 18). How knitting was used as code in WW2.
Retrieved from www.telegraph.co.uk/men/the-filter/…ode-in-WW2.html.

Sipher, Alan, Roger Farley, and Craig Lombardo. (2005, May 6). The Rise of Steganography.
Retrieved from csis.pace.edu/~ctappert/srd2005/d1.pdf.

Templer, K. (2012, Jan 13). Knitting in code. Retrieved from
fringeassociation.com/2012/01/13/mor…tting-pattern/.

Zarrelli, N. (2017, Jun 1). The Wartime Spies Who Used Knitting as an Espionage Tool.
www.atlasobscura.com/articles/knitt…spies-wwi-wwii.

Music sources
All music was obtained from MusOpen (musopen.org/), a non-profit domain that provides sheet music and performances under Creative Commons.

“Chopin’s Op. 20 Scherzo No. 1 in Be Minor” by Alice Hwang musopen.org/music/2849/frederic…1-in-b-minor-op-20/
Camille Saint-Saens Danse Macabre by the University of Chicago Orchestra retrieved from musopen.org/music/2766/camille-…anse-macabre-op-40/

Chopin’s Ballade No. 1 in G Minor by Frank Levy retrieved from musopen.org/music/1953/frederic…ballade-no-1-op-23/

Chopin’s Op. 72 Nocturne in E Minor by Luke Faulkner retrieved from musopen.org/music/370/frederic-…-minor-op-posth-72/

Pablo de Sarasate Zigeunerweisen by Ivan Kivelidi retrieved from musopen.org/music/2676/pablo-de…en-op-20-piano-arr/

Image: www.loc.gov/item/fsa1998024221/PP/#