-
1
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Syst. J., vol. 35, no. 3-4, pp. 313-336, 1996.
-
(1996)
IBM Syst. J
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
2
-
-
0032680807
-
Information hiding - A survey
-
Jul
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding - A survey," Proc. IEEE, vol. 87, no. 7, pp. 1062-1078, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
3
-
-
0033312461
-
Multi-level data hiding for digital image and video
-
presented at the, Boston, MA
-
M. Wu, H. Yu, and A. Gelman, "Multi-level data hiding for digital image and video," presented at the SPIE Photonics East, Boston, MA, 1999.
-
(1999)
SPIE Photonics East
-
-
Wu, M.1
Yu, H.2
Gelman, A.3
-
5
-
-
33847692468
-
Image steganography and steganalysis concepts and practice
-
R. Chandramouli, M. Kharrazi, and N. Memon, "Image steganography and steganalysis concepts and practice," Digital Watermarking Lecture Notes in Computer Science 2939, pp. 35-49, 2004.
-
(2004)
Digital Watermarking Lecture Notes in Computer Science
, vol.2939
, pp. 35-49
-
-
Chandramouli, R.1
Kharrazi, M.2
Memon, N.3
-
6
-
-
0037410595
-
A steganographic method for images by pixel-value differencing
-
D. C. Wu and W. H. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognit. Lett., vol. 24, no. 9-10, pp. 1613-1626, 2003.
-
(2003)
Pattern Recognit. Lett
, vol.24
, Issue.9-10
, pp. 1613-1626
-
-
Wu, D.C.1
Tsai, W.H.2
-
7
-
-
0032637701
-
Copyright protection for the electronic distribution of text Documents
-
Jul
-
J. T. Brassil and N. F. Maxemchuk, "Copyright protection for the electronic distribution of text Documents," Proc. IEEE, vol. 87, no. 7, pp. 1181-1196, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1181-1196
-
-
Brassil, J.T.1
Maxemchuk, N.F.2
-
8
-
-
64249108718
-
-
online at: [Online, Available
-
M. Kwan, GIF Colourmap Steganography 2003, online at: [Online]. Available: http://www.darkside.com.au/gifshuffle/.
-
(2003)
Steganography
-
-
Kwan, M.1
Colourmap, G.I.F.2
-
9
-
-
0347130613
-
Bilingual generation of weather forecasts in an operations environment
-
Helsinki, Finland
-
L. Bourbeau, D. Carcagno, E. Goldberg, R. Kittredge, and A. Polguère, "Bilingual generation of weather forecasts in an operations environment," in Proc. 13th Int. Conf. Computational Linguistics, Helsinki, Finland, 1990, pp. 318-320.
-
(1990)
Proc. 13th Int. Conf. Computational Linguistics
, pp. 318-320
-
-
Bourbeau, L.1
Carcagno, D.2
Goldberg, E.3
Kittredge, R.4
Polguère, A.5
-
10
-
-
33847760796
-
-
Available
-
Spam Mimic, [Online]. Available: http://www.spammimic.com.
-
Spam Mimic, [Online]
-
-
-
11
-
-
33847749094
-
-
K. Bennett, Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text, Purdue Univ., West Lafayette, IN, CERIAS Tech. Rep. 2004-13, May 2004.
-
K. Bennett, "Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text," Purdue Univ., West Lafayette, IN, CERIAS Tech. Rep. 2004-13, May 2004.
-
-
-
-
12
-
-
33750898917
-
Translation-based steganography
-
C. Grothoff, K. Grothoff, L. Alkhutova, R. Stutsman, and M. Atallah, "Translation-based steganography," in Proc. Information Hiding Workshop, 2005, pp. 213-233.
-
(2005)
Proc. Information Hiding Workshop
, pp. 213-233
-
-
Grothoff, C.1
Grothoff, K.2
Alkhutova, L.3
Stutsman, R.4
Atallah, M.5
-
13
-
-
33751035525
-
Lost in just the translation
-
R. Stutsman, C. Grothoff, M. Attallah, and K. Grothoff, "Lost in just the translation," in Proc. ACM Symp. Applied Computing, 2006, pp. 338-345.
-
(2006)
Proc. ACM Symp. Applied Computing
, pp. 338-345
-
-
Stutsman, R.1
Grothoff, C.2
Attallah, M.3
Grothoff, K.4
-
14
-
-
84957728214
-
Steganalysis: The Investigation of Hidden Information
-
Syracuse, NY, Sep
-
F. Johnson and S. Jajodia, "Steganalysis: The Investigation of Hidden Information," in Proc. IEEE Information Technology Conf., Syracuse, NY, Sep. 1998, pp. 113-116.
-
(1998)
Proc. IEEE Information Technology Conf
, pp. 113-116
-
-
Johnson, F.1
Jajodia, S.2
-
15
-
-
20844453087
-
A new steganography method based on hypertext
-
Aug
-
G. Sui and H. Luo, "A new steganography method based on hypertext," in Proc. Radio Science Conf., Aug. 2004, pp. 181-184.
-
(2004)
Proc. Radio Science Conf
, pp. 181-184
-
-
Sui, G.1
Luo, H.2
-
16
-
-
84947255170
-
A practical and effective approach to large-scale automated linguistic steganography
-
Malaga, Spain, Oct
-
M. Chapman, I. D. George, and R. Marc, "A practical and effective approach to large-scale automated linguistic steganography," in Proc. Information Security Conf., Malaga, Spain, Oct. 2001, pp. 156-165.
-
(2001)
Proc. Information Security Conf
, pp. 156-165
-
-
Chapman, M.1
George, I.D.2
Marc, R.3
-
17
-
-
21844446383
-
Natural language text water-marking
-
presented at the, San Jose, CA, Jan
-
M. Topkara, C. Taskiran, and E. J. Delp, "Natural language text water-marking," presented at the SPIE Int. Conf. Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Jan. 2005.
-
(2005)
SPIE Int. Conf. Security, Steganography, and Watermarking of Multimedia Contents
, vol.6
-
-
Topkara, M.1
Taskiran, C.2
Delp, E.J.3
-
18
-
-
84950895792
-
Mimic functions
-
P. Wayner, "Mimic functions," Crypt., vol. XVI, no. 3, pp. 193-214, 1992.
-
(1992)
Crypt
, vol.16
, Issue.3
, pp. 193-214
-
-
Wayner, P.1
-
19
-
-
0013272272
-
Microsoft Office 97 Visual Basic Programmer's Guide
-
Microsoft Professional Editions
-
Microsoft Office 97 Visual Basic Programmer's Guide, Microsoft Professional Editions Series, 1997.
-
(1997)
Series
-
-
-
21
-
-
33847747928
-
-
WordNet v2.1, a lexical database for the English language. Princeton Univ., Princeton, NJ, 2005.
-
WordNet v2.1, a lexical database for the English language. Princeton Univ., Princeton, NJ, 2005.
-
-
-
-
23
-
-
35048885080
-
A method of linguistic steganography based on collocationally-verifled synonymy
-
Toronto, ON, Canada, May
-
I. A. Bolshakov, "A method of linguistic steganography based on collocationally-verifled synonymy," in Proc. 6th Information Hiding Workshop, Toronto, ON, Canada, May 2004, pp. 180-191.
-
(2004)
Proc. 6th Information Hiding Workshop
, pp. 180-191
-
-
Bolshakov, I.A.1
-
24
-
-
11844252006
-
Cyber warfare: Steganography vs. steganalysis
-
H. Wang and S. Wang, "Cyber warfare: Steganography vs. steganalysis," Commun. ACM, vol. 47, no. 10, pp. 76-82, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.10
, pp. 76-82
-
-
Wang, H.1
Wang, S.2
|