-
1
-
-
33947624454
-
Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text
-
Purdue University, Vol
-
K. Bennett, "Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text", Purdue University, CERIAS Tech. Report, Vol. 13, p. 2004, 2004.
-
(2004)
CERIAS Tech. Report
, vol.13
, pp. 2004
-
-
Bennett, K.1
-
2
-
-
0005013984
-
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
-
M. Chapman and D. Davida, "Hiding the Hidden: A software system for concealing ciphertext as innocuous text", LECTURE NOTES IN COMPUTER SCIENCE, pp. 335-345, 1997. (Pubitemid 127148061)
-
(1997)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1334
, pp. 335-345
-
-
Chapman, M.1
Davida, D.2
-
3
-
-
0032680807
-
Information hiding-a survey
-
F. Petitcolas, R. Anderson, and M. Kuhn, "Information hiding-a survey", Proceedings of the IEEE, Vol. 87, No. 7, pp. 1062-1078, 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.1
Anderson, R.2
Kuhn, M.3
-
4
-
-
56749098016
-
Linguistic steganography detection using statistical characteristics of correlations between words
-
Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, p, Springer
-
Z. Chen, L. Huang, Z. Yu, W. Yang, L. Li, X. Zheng, and X. Zhao, "Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words", in Information Hiding: 10th International Workshop, Ih 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, p. 224, Springer, 2008.
-
(2008)
Information Hiding: 10th International Workshop, Ih 2008
, pp. 224
-
-
Chen, Z.1
Huang, L.2
Yu, Z.3
Yang, W.4
Li, L.5
Zheng, X.6
Zhao, X.7
-
5
-
-
49049104223
-
A statistical algorithm for linguistic steganography detection based on distribution of words
-
C. Zhi-li, H. Liu-sheng, Y. Zhen-shan, L. Ling-jun, and Y. Wei, "A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words", in Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, pp. 558-563, 2008.
-
(2008)
Availability, Reliability and Security, 2008. ARES 08. Third International Conference on
, pp. 558-563
-
-
Zhi-li, C.1
Liu-sheng, H.2
Zhen-shan, Y.3
Ling-jun, L.4
Wei, Y.5
-
6
-
-
70349585530
-
Effective linguistic steganography detection
-
Z. Chen, L. Huang, Z. Yu, X. Zhao, and X. Zhao, "Effective Linguistic Steganography Detection", in Computer and Information Technology Workshops, 2008. CIT Workshops 2008. IEEE 8th International Conference on, pp. 224-229, 2008.
-
(2008)
Computer and Information Technology Workshops, 2008. CIT Workshops 2008. IEEE 8th International Conference on
, pp. 224-229
-
-
Chen, Z.1
Huang, L.2
Yu, Z.3
Zhao, X.4
Zhao, X.5
-
8
-
-
85024115120
-
An empirical study of smoothing techniques for language modeling
-
Association for Computational Linguistics Morristown, NJ, USA
-
S. Chen and J. Goodman, "An empirical study of smoothing techniques for language modeling", in Proceedings of the 34th annual meeting on Association for Computational Linguistics, pp. 310-318, Association for Computational Linguistics Morristown, NJ, USA, 1996.
-
(1996)
Proceedings of the 34th Annual Meeting on Association for Computational Linguistics
, pp. 310-318
-
-
Chen, S.1
Goodman, J.2
|