메뉴 건너뛰기




Volumn 2578, Issue , 2003, Pages 196-212

Natural language watermarking and tamperproofing

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL LINGUISTICS; SEMANTICS;

EID: 35248834521     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36415-3_13     Document Type: Article
Times cited : (133)

References (12)
  • 1
    • 77953750858 scopus 로고    scopus 로고
    • Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
    • I. S. Moskowitz (ed.), Pittsburgh, PA, USA, April 2001 Proceedings. Berlin: Springer
    • Atallah, M. J., V. Raskin, M. Crogan, C. F. Hempelmann, F. Kerschbaum, D. Mohamed, and S. Naik 2001. Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation. In: I. S. Moskowitz (ed.), Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 2001 Proceedings. Berlin: Springer, 185-199.
    • (2001) Information Hiding: 4th International Workshop, IH 2001 , pp. 185-199
    • Atallah, M.J.1    Raskin, V.2    Crogan, M.3    Hempelmann, C.F.4    Kerschbaum, F.5    Mohamed, D.6    Naik, S.7
  • 2
    • 0034593185 scopus 로고    scopus 로고
    • Natural Language Processing for Information Assurance and Security: An Overview and Implementations
    • M. Shaeffer (ed.), Cork, Ireland, September 2000. New York: ACM Press
    • Atallah, M. J., C. J. McDonough, V. Raskin, and S. Nirenburg 2001. Natural Language Processing for Information Assurance and Security: An Overview and Implementations. In: M. Shaeffer (ed.), NSPW '00: Proceedings of Workshop on New Paradigms in Information Security, Cork, Ireland, September 2000. New York: ACM Press, 51-65.
    • (2001) NSPW '00: Proceedings of Workshop on New Paradigms in Information Security , pp. 51-65
    • Atallah, M.J.1    McDonough, C.J.2    Raskin, V.3    Nirenburg, S.4
  • 3
    • 7244236102 scopus 로고    scopus 로고
    • Cambridge, MA: MIT Press (forthcoming). Pre-publication draft
    • Nirenburg, S., and V. Raskin 2003. Ontological Semantics. Cambridge, MA: MIT Press (forthcoming). Pre-publication draft, http://crl.nmsu.edu/Staff.Pages/Technical/sergei/book/index-book.html.
    • (2003) Ontological Semantics
    • Nirenburg, S.1    Raskin, V.2
  • 5
    • 0028592391 scopus 로고
    • Electronic Marking and Identification Technique to Discourage Document Copying
    • Brassil, J., N. F. Maxemchuk, and L. O'Gorman 1994. Electronic Marking and Identification Technique to Discourage Document Copying. Proceedings of INFOCOM '94, 1278-1287.
    • (1994) Proceedings of INFOCOM '94 , pp. 1278-1287
    • Brassil, J.1    Maxemchuk, N.F.2    O'Gorman, L.3
  • 6
    • 0028496330 scopus 로고
    • Electronic Document Distribution
    • September/October
    • Maxemchuk, N. F. 1994. Electronic Document Distribution. AT&T Technical Journal, September/October, 73-80.
    • (1994) AT&T Technical Journal , pp. 73-80
    • Maxemchuk, N.F.1
  • 7
    • 0000772864 scopus 로고    scopus 로고
    • Document Identification for Copyright Protection Using Centroid Detection
    • Low, S. H., N. F. Maxemchuk, and A. M. Lapone 1998. Document Identification for Copyright Protection Using Centroid Detection. IEEE Transactions on Communication 46(3), 372-383.
    • (1998) IEEE Transactions on Communication , vol.46 , Issue.3 , pp. 372-383
    • Low, S.H.1    Maxemchuk, N.F.2    Lapone, A.M.3
  • 8
    • 84950895792 scopus 로고
    • Mimic Functions
    • Wayner, P. 1992. Mimic Functions. Cryptologia XVI(3), 193-214.
    • (1992) Cryptologia , vol.16 , Issue.3 , pp. 193-214
    • Wayner, P.1
  • 9
    • 0005008029 scopus 로고
    • Strong Theoretical Steganography
    • Wayner, P. 1995. Strong Theoretical Steganography. Cryptologia XIX(3), 285-299.
    • (1995) Cryptologia , vol.19 , Issue.3 , pp. 285-299
    • Wayner, P.1
  • 10
    • 0005013984 scopus 로고    scopus 로고
    • Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text
    • Proceedings of the International Conference on Information and Communication Security. Berlin: Springer
    • Chapman, M., and G. Davida 1997. Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text. Proceedings of the International Conference on Information and Communication Security. Lecture Notes in Computer Sciences 1334. Berlin: Springer, 333-345.
    • (1997) Lecture Notes in Computer Sciences , vol.1334 , pp. 333-345
    • Chapman, M.1    Davida, G.2
  • 11
    • 84955563192 scopus 로고    scopus 로고
    • Stretching the limits of Steganography
    • R. Anderson (ed.), Information Hiding. First International Workshop. Cambridge, UK, May June 1996. Proceedings, Berlin: Springer
    • Anderson, R. J., 1996. Stretching the limits of Steganography. In: R. Anderson (ed.), Information Hiding. First International Workshop. Cambridge, UK, May June 1996. Proceedings, Lecture Notes in Computer Science 1174, Berlin: Springer, 39-48.
    • (1996) Lecture Notes in Computer Science , vol.1174 , pp. 39-48
    • Anderson, R.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.