R. Böhme, An Epistemological Approach to Steganography, Lecture Notes in Computer Science, vol.29, pp.15-30, 2009.
DOI : 10.1007/978-3-540-77370-2_22

H. Bojinov, E. Burszstein, X. Boyen, and D. Boneh, Kamouflage: Loss-Resistant Password Management, European Symposium on Research in Computer Security (ESORICS), pp.286-302, 2010.
DOI : 10.1007/978-3-642-15497-3_18

URL : http://bojinov.org/professional/esorics2010-kamouflage.pdf

J. Bonneau, Guessing human-chosen secrets, 2012.

C. Cachin, An Information-Theoretic Model for Steganography, Lecture Notes in Computer Science, vol.1525, pp.306-318, 1998.
DOI : 10.1007/3-540-39568-7_32

R. Chatterjee, J. Bonneau, A. Juels, and T. Ristenpart, Cracking-Resistant Password Vaults Using Natural Language Encoders, 2015 IEEE Symposium on Security and Privacy, pp.481-498, 2016.
DOI : 10.1109/SP.2015.36

URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=7163043

T. Filler, J. Judas, and J. Fridrich, Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes, IEEE Transactions on Information Forensics and Security, vol.6, issue.3, pp.920-935, 2011.
DOI : 10.1109/TIFS.2011.2134094

URL : http://dde.binghamton.edu/filler/pdf/Fill10tifs-stc.pdf

D. Florencio and C. Herley, A large-scale study of web password habits, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.656-666, 2007.
DOI : 10.1145/1242572.1242661

J. Fridrich, Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes, pp.67-81, 2005.
DOI : 10.1007/978-3-540-30114-1_6

J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications, 2009.
DOI : 10.1017/CBO9781139192903

M. Golla, B. Beuscher, and M. Dürmuth, On the Security of Cracking-Resistant Password Vaults, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.1230-1241, 2016.
DOI : 10.1109/ReConFig.2014.7032529

A. Juels and T. Ristenpart, Honey Encryption: Encryption beyond the Brute-Force Barrier, Advances in Cryptology -EUROCRYPT, pp.293-310, 2014.
DOI : 10.1109/MSP.2014.67

B. Kaliski, PKCS# 5: Password-based cryptography specification version 2.0, RFC, vol.2289, 2000.
DOI : 10.17487/rfc2898

Z. Li, W. He, D. Akhawe, and D. Song, The emperor's new password manager: security analysis of web-based password managers, USENIX Security Symposium, pp.465-479, 2014.
DOI : 10.21236/ADA614474

U. M. Maurer, A unified and generalized treatment of authentication theory, 13th Annual Symposium on Theoretical Aspects of Computer Science, pp.387-398, 1996.
DOI : 10.1007/3-540-60922-9_32

P. Sallee, Model-Based Steganography, Digital Watermarking, pp.254-260, 2004.
DOI : 10.1007/978-3-540-24624-4_12

D. Silver, S. Jana, D. Boneh, and E. Chen, Password managers: attacks and defenses, USENIX Security Symposium, pp.449-464, 2014.

P. Wayner, MIMIC FUNCTIONS, Cryptologia, vol.16, issue.3, pp.193-214, 1992.
DOI : 10.1080/0161-119291866883