by Sandra Shaw

Borse, Govinda, Vijay Anand, and Kailash Patel. (2013, Oct). Steganography: Exploring an
ancient art of Hiding Information from Past to the Future. Retrieved from…T1412201310_33.pdf.

Fortini, M. (n. d.). A brief history of steganography. Retrieved from…i/history.html.

Krystek, L. (2010). The Lines of Nazca Peru. Retrieved from

Mendick, R. (2014, Nov 22). Wartime spy finally accepts she is a French heroine. Retrieved from…ch-heroine.html.

Oldfield, Molly and John Mitchinson. (2014, Feb 18). How knitting was used as code in WW2.
Retrieved from…ode-in-WW2.html.

Sipher, Alan, Roger Farley, and Craig Lombardo. (2005, May 6). The Rise of Steganography.
Retrieved from

Templer, K. (2012, Jan 13). Knitting in code. Retrieved from…tting-pattern/.

Zarrelli, N. (2017, Jun 1). The Wartime Spies Who Used Knitting as an Espionage Tool.…spies-wwi-wwii.

Music sources
All music was obtained from MusOpen (, a non-profit domain that provides sheet music and performances under Creative Commons.

“Chopin's Op. 20 Scherzo No. 1 in Be Minor” by Alice Hwang…1-in-b-minor-op-20/
Camille Saint-Saens Danse Macabre by the University of Chicago Orchestra retrieved from…anse-macabre-op-40/

Chopin's Ballade No. 1 in G Minor by Frank Levy retrieved from…ballade-no-1-op-23/

Chopin's Op. 72 Nocturne in E Minor by Luke Faulkner retrieved from…-minor-op-posth-72/

Pablo de Sarasate Zigeunerweisen by Ivan Kivelidi retrieved from…en-op-20-piano-arr/