by Sandra Shaw
Sources
Borse, Govinda, Vijay Anand, and Kailash Patel. (2013, Oct). Steganography: Exploring an
ancient art of Hiding Information from Past to the Future. Retrieved from
www.ijeit.com/Vol%203/Issue%204/…T1412201310_33.pdf.
Fortini, M. (n. d.). A brief history of steganography. Retrieved from
www.lia.deis.unibo.it/Courses/RetiDi…i/history.html.
Krystek, L. (2010). The Lines of Nazca Peru. Retrieved from www.unmuseum.org/mob/nazca.htm.
Mendick, R. (2014, Nov 22). Wartime spy finally accepts she is a French heroine. Retrieved from
www.telegraph.co.uk/history/world-w…ch-heroine.html.
Oldfield, Molly and John Mitchinson. (2014, Feb 18). How knitting was used as code in WW2.
Retrieved from www.telegraph.co.uk/men/the-filter/…ode-in-WW2.html.
Sipher, Alan, Roger Farley, and Craig Lombardo. (2005, May 6). The Rise of Steganography.
Retrieved from csis.pace.edu/~ctappert/srd2005/d1.pdf.
Templer, K. (2012, Jan 13). Knitting in code. Retrieved from
fringeassociation.com/2012/01/13/mor…tting-pattern/.
Zarrelli, N. (2017, Jun 1). The Wartime Spies Who Used Knitting as an Espionage Tool.
www.atlasobscura.com/articles/knitt…spies-wwi-wwii.
Music sources
All music was obtained from MusOpen (musopen.org/), a non-profit domain that provides sheet music and performances under Creative Commons.
“Chopin’s Op. 20 Scherzo No. 1 in Be Minor” by Alice Hwang musopen.org/music/2849/frederic…1-in-b-minor-op-20/
Camille Saint-Saens Danse Macabre by the University of Chicago Orchestra retrieved from musopen.org/music/2766/camille-…anse-macabre-op-40/
Chopin’s Ballade No. 1 in G Minor by Frank Levy retrieved from musopen.org/music/1953/frederic…ballade-no-1-op-23/
Chopin’s Op. 72 Nocturne in E Minor by Luke Faulkner retrieved from musopen.org/music/370/frederic-…-minor-op-posth-72/
Pablo de Sarasate Zigeunerweisen by Ivan Kivelidi retrieved from musopen.org/music/2676/pablo-de…en-op-20-piano-arr/
Leave a Reply