-
2
-
-
77953750858
-
Natural language watermarking: Design, analysis, and a proof-of-concept implementation
-
Moskowitz, I.S, ed, Information Hiding: Fourth International Workshop, Springer, Heidelberg
-
Atallah, M.J., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., Naik, S.: Natural language watermarking: Design, analysis, and a proof-of-concept implementation. In: Moskowitz, I.S. (ed.) Information Hiding: Fourth International Workshop. LNCS, vol. 2137, pp. 185-199. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2137
, pp. 185-199
-
-
Atallah, M.J.1
Raskin, V.2
Crogan, M.3
Hempelmann, C.4
Kerschbaum, F.5
Mohamed, D.6
Naik, S.7
-
3
-
-
35248834521
-
Natural language watermarking and tamperproofing
-
Fabien A. P. Petitcolas, editor, Information Hiding: Fifth International Workshop, of, Springer October
-
Mikhail J. Atallah, Victor Raskin, Christian F. Hempelmann, Mercan Topkara, Radu Sion, Umut Topkara, and Katrina E. Triezenberg. Natural language watermarking and tamperproofing. In Fabien A. P. Petitcolas, editor, Information Hiding: Fifth International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 196-212. Springer (October 2002)
-
(2002)
Lecture Notes in Computer Science
, vol.2578
, pp. 196-212
-
-
Atallah, M.J.1
Raskin, V.2
Hempelmann, C.F.3
Topkara, M.4
Sion, R.5
Topkara, U.6
Triezenberg, K.E.7
-
4
-
-
33947624454
-
-
Survey, analysis, and robustness concerns for hiding information in text May
-
Bennett, K.: Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text (May 2004)
-
(2004)
Linguistic steganography
-
-
Bennett, K.1
-
5
-
-
38049165748
-
-
Bergmair, R.: Towards linguistic steganography: A systematic investigation of approaches, systems, and issues, final year project, April 2004 submitted in partial fulfillment of the degree requirements for B.Sc (Hons.) to the University of Derby (2004)
-
Bergmair, R.: Towards linguistic steganography: A systematic investigation of approaches, systems, and issues, final year project, April 2004 submitted in partial fulfillment of the degree requirements for B.Sc (Hons.) to the University of Derby (2004)
-
-
-
-
6
-
-
38049098167
-
-
Bergmair, R., Katzenbeisser, S.: Towards human interactive proofs in the text-domain. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, 3225, Springer, Heidelberg (2004)
-
Bergmair, R., Katzenbeisser, S.: Towards human interactive proofs in the text-domain. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, Springer, Heidelberg (2004)
-
-
-
-
7
-
-
35048885080
-
-
Bolshakov, I.A.: A method of linguistic steganography based on collocationally-verified synonymy. In: Fridrich, J.J. (ed.) IH 2004. LNCS, 3200, pp. 180-191. Springer, Heidelberg (2004)
-
Bolshakov, I.A.: A method of linguistic steganography based on collocationally-verified synonymy. In: Fridrich, J.J. (ed.) IH 2004. LNCS, vol. 3200, pp. 180-191. Springer, Heidelberg (2004)
-
-
-
-
8
-
-
34548242205
-
Using selectional preferences for extending a synonymous paraphrasing method in steganography
-
Sossa Azuela, J.H, ed, October
-
Calvo, H., Bolshakov, I.A.: Using selectional preferences for extending a synonymous paraphrasing method in steganography. In: Sossa Azuela, J.H. (ed.) Avances en Ciencias de la Computacion e Ingenieria de Computo - CIC'2004: XIII Congreso Internacional de Computacion, pp. 231-242 (October 2004)
-
(2004)
Avances en Ciencias de la Computacion e Ingenieria de Computo - CIC'2004: XIII Congreso Internacional de Computacion
, pp. 231-242
-
-
Calvo, H.1
Bolshakov, I.A.2
-
11
-
-
0005013984
-
Hiding the hidden: A software system for concealing ciphertext in innocuous text
-
Han, Y, Quing, S, eds, ICICS 1997, Springer, Heidelberg
-
Chapman, M., Davida, G.I.: Hiding the hidden: A software system for concealing ciphertext in innocuous text. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 11-14. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1334
, pp. 11-14
-
-
Chapman, M.1
Davida, G.I.2
-
12
-
-
84944053897
-
Plausible deniability using automated linguistic steganography
-
Davida, G, Frankel, Y, eds, InfraSec 2002, Springer, Heidelberg
-
Chapman, M., Davida, G.I.: Plausible deniability using automated linguistic steganography. In: Davida, G., Frankel, Y. (eds.) InfraSec 2002. LNCS, vol. 2437, Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2437
-
-
Chapman, M.1
Davida, G.I.2
-
13
-
-
84947255170
-
-
Chapman, M., Davida, G.I., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, 2200, Springer, Heidelberg (2001)
-
Chapman, M., Davida, G.I., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, Springer, Heidelberg (2001)
-
-
-
-
14
-
-
33749047587
-
-
Chew, M., Tygar, J.D.: Image recognition CAPTCHAs. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, 3225, Springer, Heidelberg (2004)
-
Chew, M., Tygar, J.D.: Image recognition CAPTCHAs. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, Springer, Heidelberg (2004)
-
-
-
-
15
-
-
35048888203
-
-
Chiang, Y.-L., Chang, L.-P., Hsieh, W.-T., Chen, W.-C.: Natural language watermarking using semantic substitution for Chinese text. In: Kalker, T., Cox, I.J., Ro, Y.M. (eds.) IWDW 2003. LNCS, 2939, pp. 129-140. Springer, Heidelberg (2004)
-
Chiang, Y.-L., Chang, L.-P., Hsieh, W.-T., Chen, W.-C.: Natural language watermarking using semantic substitution for Chinese text. In: Kalker, T., Cox, I.J., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 129-140. Springer, Heidelberg (2004)
-
-
-
-
16
-
-
84957887122
-
On public-key steganography in the presence of an active warden
-
Aucsmith, D, ed, IH, Springer, Heidelberg
-
Craver, S.: On public-key steganography in the presence of an active warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 355-368. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1525
, pp. 355-368
-
-
Craver, S.1
-
17
-
-
1442360452
-
Quantitative steganalysis of digital images: Estimating the secret message length
-
Fridrich, J., Goljan, M., Hogea, D., Soukal, D.: Quantitative steganalysis of digital images: estimating the secret message length. Multimedia Systems 9, 298-302 (2003)
-
(2003)
Multimedia Systems
, vol.9
, pp. 298-302
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
Soukal, D.4
-
18
-
-
33746654158
-
Translationbased steganography
-
Barni, M, Herrera-Joancomarti, J, Katzenbeisser, S, Pérez-González, F, eds, Information Hiding, 7th International Workshop IH, Barcelona, Spain, Springer, Heidelberg
-
Grothoff, C., Grothoff, K., Alkhutova, L., Stutsman, R., Atallah, M.: Translationbased steganography. In: Barni, M., Herrera-Joancomarti, J., Katzenbeisser, S., Pérez-González, F. (eds.) Information Hiding, 7th International Workshop (IH 2005), Barcelona, Spain. LNCS, vol. 3727, pp. 219-233. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3727
, pp. 219-233
-
-
Grothoff, C.1
Grothoff, K.2
Alkhutova, L.3
Stutsman, R.4
Atallah, M.5
-
21
-
-
38049156072
-
Text information hiding with preserved meaning - a case for Japanese documents
-
Nakagawa, H., Sampei, K., Matsumoto, T., Kawaguchi, S., Makino, K., Murase, I.: Text information hiding with preserved meaning - a case for Japanese documents. IPSJ Transaction 42(9), 2339-2350 (2001)
-
(2001)
IPSJ Transaction
, vol.42
, Issue.9
, pp. 2339-2350
-
-
Nakagawa, H.1
Sampei, K.2
Matsumoto, T.3
Kawaguchi, S.4
Makino, K.5
Murase, I.6
-
22
-
-
34548235364
-
A framework of text-based steganography using sd-form semantics model
-
August
-
Niimi, M., Minewaki, S., Noda, H., Kawaguchi, E.: A framework of text-based steganography using sd-form semantics model. IPSJ Journal, 44(8) (August 2003)
-
(2003)
IPSJ Journal
, vol.44
, Issue.8
-
-
Niimi, M.1
Minewaki, S.2
Noda, H.3
Kawaguchi, E.4
-
24
-
-
21844446383
-
Natural language watermarking
-
Delp, E.J, Wong, P.W.eds, January
-
Topkara, M., Taskiran, C.M., Delp, E.J.: Natural language watermarking. In: Delp, E.J., Wong, P.W.(eds) Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681 (January 2005)
-
(2005)
Security, Steganography, and Watermarking of Multimedia Contents VII
, vol.5681
-
-
Topkara, M.1
Taskiran, C.M.2
Delp, E.J.3
-
25
-
-
38049132335
-
-
von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: HIPs. http://www.aladdin.es.emu.edu/hips/
-
von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: HIPs. http://www.aladdin.es.emu.edu/hips/
-
-
-
-
26
-
-
35248831179
-
CAPTCHA: Using hard ai problems for security
-
Advances in Cryptology, Eurocrypt 2003, Springer, Heidelberg
-
von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: using hard ai problems for security. In: Advances in Cryptology, Eurocrypt 2003. LNCS, vol. 2656, pp. 294-311. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 294-311
-
-
von Ahn, L.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
27
-
-
84950895792
-
Mimic functions
-
Wayner, P.: Mimic functions. Cryptologia XVI/3, 193-214 (1992)
-
(1992)
Cryptologia
, vol.XVI 3
, pp. 193-214
-
-
Wayner, P.1
-
28
-
-
0005008029
-
Strong theoretical steganography
-
Wayner, P.: Strong theoretical steganography. Cryptologia XIX/3, 285-299 (1995)
-
(1995)
Cryptologia
, vol.XIX 3
, pp. 285-299
-
-
Wayner, P.1
|