-
1
-
-
77953750858
-
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
-
I. S. Moskowitz (ed.), Pittsburgh, PA, USA, April 2001 Proceedings. Berlin: Springer
-
Atallah, M. J., V. Raskin, M. Crogan, C. F. Hempelmann, F. Kerschbaum, D. Mohamed, and S. Naik 2001. Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation. In: I. S. Moskowitz (ed.), Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 2001 Proceedings. Berlin: Springer, 185-199.
-
(2001)
Information Hiding: 4th International Workshop, IH 2001
, pp. 185-199
-
-
Atallah, M.J.1
Raskin, V.2
Crogan, M.3
Hempelmann, C.F.4
Kerschbaum, F.5
Mohamed, D.6
Naik, S.7
-
2
-
-
0034593185
-
Natural Language Processing for Information Assurance and Security: An Overview and Implementations
-
M. Shaeffer (ed.), Cork, Ireland, September 2000. New York: ACM Press
-
Atallah, M. J., C. J. McDonough, V. Raskin, and S. Nirenburg 2001. Natural Language Processing for Information Assurance and Security: An Overview and Implementations. In: M. Shaeffer (ed.), NSPW '00: Proceedings of Workshop on New Paradigms in Information Security, Cork, Ireland, September 2000. New York: ACM Press, 51-65.
-
(2001)
NSPW '00: Proceedings of Workshop on New Paradigms in Information Security
, pp. 51-65
-
-
Atallah, M.J.1
McDonough, C.J.2
Raskin, V.3
Nirenburg, S.4
-
3
-
-
7244236102
-
-
Cambridge, MA: MIT Press (forthcoming). Pre-publication draft
-
Nirenburg, S., and V. Raskin 2003. Ontological Semantics. Cambridge, MA: MIT Press (forthcoming). Pre-publication draft, http://crl.nmsu.edu/Staff.Pages/Technical/sergei/book/index-book.html.
-
(2003)
Ontological Semantics
-
-
Nirenburg, S.1
Raskin, V.2
-
5
-
-
0028592391
-
Electronic Marking and Identification Technique to Discourage Document Copying
-
Brassil, J., N. F. Maxemchuk, and L. O'Gorman 1994. Electronic Marking and Identification Technique to Discourage Document Copying. Proceedings of INFOCOM '94, 1278-1287.
-
(1994)
Proceedings of INFOCOM '94
, pp. 1278-1287
-
-
Brassil, J.1
Maxemchuk, N.F.2
O'Gorman, L.3
-
6
-
-
0028496330
-
Electronic Document Distribution
-
September/October
-
Maxemchuk, N. F. 1994. Electronic Document Distribution. AT&T Technical Journal, September/October, 73-80.
-
(1994)
AT&T Technical Journal
, pp. 73-80
-
-
Maxemchuk, N.F.1
-
7
-
-
0000772864
-
Document Identification for Copyright Protection Using Centroid Detection
-
Low, S. H., N. F. Maxemchuk, and A. M. Lapone 1998. Document Identification for Copyright Protection Using Centroid Detection. IEEE Transactions on Communication 46(3), 372-383.
-
(1998)
IEEE Transactions on Communication
, vol.46
, Issue.3
, pp. 372-383
-
-
Low, S.H.1
Maxemchuk, N.F.2
Lapone, A.M.3
-
8
-
-
84950895792
-
Mimic Functions
-
Wayner, P. 1992. Mimic Functions. Cryptologia XVI(3), 193-214.
-
(1992)
Cryptologia
, vol.16
, Issue.3
, pp. 193-214
-
-
Wayner, P.1
-
9
-
-
0005008029
-
Strong Theoretical Steganography
-
Wayner, P. 1995. Strong Theoretical Steganography. Cryptologia XIX(3), 285-299.
-
(1995)
Cryptologia
, vol.19
, Issue.3
, pp. 285-299
-
-
Wayner, P.1
-
10
-
-
0005013984
-
Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text
-
Proceedings of the International Conference on Information and Communication Security. Berlin: Springer
-
Chapman, M., and G. Davida 1997. Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text. Proceedings of the International Conference on Information and Communication Security. Lecture Notes in Computer Sciences 1334. Berlin: Springer, 333-345.
-
(1997)
Lecture Notes in Computer Sciences
, vol.1334
, pp. 333-345
-
-
Chapman, M.1
Davida, G.2
-
11
-
-
84955563192
-
Stretching the limits of Steganography
-
R. Anderson (ed.), Information Hiding. First International Workshop. Cambridge, UK, May June 1996. Proceedings, Berlin: Springer
-
Anderson, R. J., 1996. Stretching the limits of Steganography. In: R. Anderson (ed.), Information Hiding. First International Workshop. Cambridge, UK, May June 1996. Proceedings, Lecture Notes in Computer Science 1174, Berlin: Springer, 39-48.
-
(1996)
Lecture Notes in Computer Science
, vol.1174
, pp. 39-48
-
-
Anderson, R.J.1
|