-
1
-
-
0032680807
-
Information Hidiiig-A Survey
-
FAP.Petitcolas, R.J.Anderson, and M.G.Kuhn, "Information Hidiiig-A Survey," Proceedings cf the IEEE, special issue on protection of multimedia content, pp. 1062-1078, 1999, 87(7).
-
(1999)
Proceedings cf the IEEE, special issue on protection of multimedia content
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
3
-
-
84950895792
-
Mimic Functions
-
P. Wayner, "Mimic Functions," Cryptologia XVI:3, pp. 192-213, 1992.
-
(1992)
Cryptologia
, vol.16
, Issue.3
, pp. 192-213
-
-
Wayner, P.1
-
4
-
-
1542698939
-
Hiding the hidden:A software system for concealing ciphertext as innocuous text,
-
Master's Thesis, Milwaukee: University of Wisconsin-Milwaukee
-
M. Chapman, "Hiding the hidden:A software system for concealing ciphertext as innocuous text," Master's Thesis, Milwaukee: University of Wisconsin-Milwaukee, 1998
-
(1998)
-
-
Chapman, M.1
-
5
-
-
21844446383
-
Natural Language Watermarking
-
M. Topkara, C. M. Taskiran, and E. J. Delp, "Natural Language Watermarking," Proceedings of the SPIE, International Conference on Security, Steganography, and Watermarking of Multimedia Contents VII, 2005.
-
(2005)
Proceedings of the SPIE, International Conference on Security, Steganography, and Watermarking of Multimedia Contents VII
-
-
Topkara, M.1
Taskiran, C.M.2
Delp, E.J.3
-
7
-
-
84947255170
-
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
-
M.Chapman, G.Davida, and M.Rennhard, "A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography," Lecture Notes in Computer Science (LNCS) 2200, pp. 156-165, 2001.
-
(2001)
Lecture Notes in Computer Science (LNCS)
, vol.2200
, pp. 156-165
-
-
Chapman, M.1
Davida, G.2
Rennhard, M.3
-
8
-
-
46449091134
-
-
TextHide: http://www.texthide.com/,2001.
-
(2001)
TextHide
-
-
-
9
-
-
35048885080
-
A Method of Linguistic Steganography Based on Collocationally-Verified Synonymy
-
Springer-Verlag, Berlin Heidelberg New York
-
I. A. Bolshakov, "A Method of Linguistic Steganography Based on Collocationally-Verified Synonymy," Lecture Notes in Computer Science, Vol. 3200, Springer-Verlag, Berlin Heidelberg New York, 2004, pp. 180-191.
-
(2004)
Lecture Notes in Computer Science
, vol.3200
, pp. 180-191
-
-
Bolshakov, I.A.1
-
10
-
-
34548233203
-
Synonymous Paraphrasing Using WordNet and Internet
-
Proc. 9th International Conference on Application of Natural Language to Information Systems NLDB-2004, Springer
-
I.A.Bolshakov, and A. Gelbukh, "Synonymous Paraphrasing Using WordNet and Internet," In: Proc. 9th International Conference on Application of Natural Language to Information Systems NLDB-2004, LNCS 3136, Springer, 2004.
-
(2004)
LNCS
, vol.3136
-
-
Bolshakov, I.A.1
Gelbukh, A.2
-
11
-
-
46449085170
-
-
H. Calvo, and I. A. Bolshakove, Using Selectional Preferences for Extending a Synonymous Paraphrasing Method in Steganography, In J. H. Sossa Azuela, editor, Avances en Ciencias de la Computacion e Ingenieria de Computo - CIC'2004: XIII Congreso Internacional de Computacion, 2004, pp.231-242.
-
H. Calvo, and I. A. Bolshakove, "Using Selectional Preferences for Extending a Synonymous Paraphrasing Method in Steganography," In J. H. Sossa Azuela, editor, Avances en Ciencias de la Computacion e Ingenieria de Computo - CIC'2004: XIII Congreso Internacional de Computacion, 2004, pp.231-242.
-
-
-
-
13
-
-
35048888203
-
Natural Language Watermarking Using Semantic Substitution for Chinese Text
-
Y.L. Chiang, L.P. Chang, W.T. Hsieh, and Chen WC, "Natural Language Watermarking Using Semantic Substitution for Chinese Text," LNCS 2939, pp. 129-140.
-
LNCS
, vol.2939
, pp. 129-140
-
-
Chiang, Y.L.1
Chang, L.P.2
Hsieh, W.T.3
Chen, W.C.4
-
14
-
-
33645695011
-
Attacks on Lexical Natural Language Steganography Systems
-
San Jose, CA
-
C. Taskiran, U. Topkara, M. Topkara, and E. J. Delp, "Attacks on Lexical Natural Language Steganography Systems," SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, 2006.
-
(2006)
SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents
-
-
Taskiran, C.1
Topkara, U.2
Topkara, M.3
Delp, E.J.4
-
15
-
-
33750907773
-
The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions
-
Geneva, Switzerland
-
U. Topkara, M. Topkara, and M. J. Atallah, "The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions," Proceedings of ACM Multimedia and Security Workshop, Geneva, Switzerland, 2006.
-
(2006)
Proceedings of ACM Multimedia and Security Workshop
-
-
Topkara, U.1
Topkara, M.2
Atallah, M.J.3
-
16
-
-
34548217225
-
Statistically Constrained Shallow Text'Marking: Techniques, Evaluation Paradigm, and Results
-
B. Murphy, and C. Vogel, "Statistically Constrained Shallow Text'Marking: Techniques, Evaluation Paradigm, and Results," In Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of 'Multimedia Contents, 2007.
-
(2007)
Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of 'Multimedia Contents
-
-
Murphy, B.1
Vogel, C.2
-
17
-
-
46449115775
-
-
ICTCLAS
-
ICTCLAS: http://mtgroup.ict.ac.cn/zhp/ICTCLAS.htm
-
-
-
-
18
-
-
26844491195
-
Chinese Lexical Analysis Using Hierarchical Hidden Markov Model
-
H.P.Zhang, Q.Liu, X.Q.Cheng, H.Zhang, and H.K.Yu, "Chinese Lexical Analysis Using Hierarchical Hidden Markov Model," Second SIGHAN workshop affiliated with 41th ACL, 2003, pp.63-70.
-
(2003)
Second SIGHAN workshop affiliated with 41th ACL
, pp. 63-70
-
-
Zhang, H.P.1
Liu, Q.2
Cheng, X.Q.3
Zhang, H.4
Yu, H.K.5
-
20
-
-
46449139488
-
-
PFR corpus
-
PFR corpus: http://www.ici.pku.edu.cn
-
-
-
-
21
-
-
33344475908
-
Research on Steganalysis of Stegotext Based on Noise Detecting
-
G. Luo, X.M. Sun, and Y.L.Liu, "Research on Steganalysis of Stegotext Based on Noise Detecting," Journal of Hunan University (Natural Science), 32(6), pp. 181-184, 2005.
-
(2005)
Journal of Hunan University (Natural Science)
, vol.32
, Issue.6
, pp. 181-184
-
-
Luo, G.1
Sun, X.M.2
Liu, Y.L.3
-
22
-
-
34250205672
-
Research on the detecting algorithm of text document information hiding
-
J.J.Zhou, Z.Yang, X.X.Niu, and Y.X.Yang, "Research on the detecting algorithm of text document information hiding," Journal of China Institute of Communication, 25(12), pp. 97-101, 2004.
-
(2004)
Journal of China Institute of Communication
, vol.25
, Issue.12
, pp. 97-101
-
-
Zhou, J.J.1
Yang, Z.2
Niu, X.X.3
Yang, Y.X.4
|