-
2
-
-
33947624454
-
Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Infor-mation in Text
-
Purdue University
-
K. Bennett, Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Infor-mation in Text, Technical Report CERIAS Tech Report, Purdue University, 2004.
-
(2004)
Technical Report CERIAS Tech Report
-
-
Bennett, K.1
-
4
-
-
84879517703
-
-
An edited version, issue of Forensic Science Communications. Technical Report, July
-
G. C. Kessler, An Overview of Steganography for the Computer Forensics Examiner, An edited version, issue of Forensic Science Communications. Technical Report, vol. 6, no. 3, July 2004.
-
(2004)
An Overview of Steganography for the Computer Forensics Examiner
, vol.6
, Issue.3
-
-
Kessler, G.C.1
-
5
-
-
0032680807
-
Information Hiding V A survey
-
July
-
F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, Information Hiding V A survey, Proceedings of IEEE, vol. 87, pp. 1062-1078, July 1999.
-
(1999)
Proceedings of IEEE
, vol.87
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
6
-
-
84950895792
-
Mimic Functions
-
July
-
P. Wayner, Mimic Functions, Cryptologia, vol. 16, no. 3, pp. 193-214, July 1992.
-
(1992)
Cryptologia
, vol.16
, Issue.3
, pp. 193-214
-
-
Wayner, P.1
-
7
-
-
1842794723
-
Disappearing Cryptography
-
2nd Ed
-
P. Wayner, Disappearing Cryptography, Morgan Kaufmann, pp. 81-128, 2nd Ed.2002.
-
(2002)
Morgan Kaufmann
, pp. 81-128
-
-
Wayner, P.1
-
10
-
-
0005013984
-
Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text
-
Springer, Beijing, P. R. China November
-
M. Chapman and G. Davida, Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text, Proc. of International Conference on Information and Communications Security, Lecture Notes in Computer Science, Springer, Beijing, P. R. China, vol. 1334, pp. 335-345, November 1997.
-
(1997)
Proc. of International Conference on Information and Communications Security, Lecture Notes in Computer Science
, vol.1334
, pp. 335-345
-
-
Chapman, M.1
Davida, G.2
-
11
-
-
84947255170
-
A practical and effective approach to large-scale automated linguistic steganog-raphy
-
Malaga, Spain
-
M. Chapman, et al., A practical and effective approach to large-scale automated linguistic steganog-raphy, Proc. of Information Security Conference (ISC 01), Malaga, Spain, pp. 156V165, 2001.
-
(2001)
Proc. of Information Security Conference (ISC 01)
-
-
Chapman, M.1
-
12
-
-
33746582127
-
Translation-based steganography
-
Purdue University
-
C. Grothoff, et al., Translation-based steganography, Technical Report CSD, TR# 05-009, Purdue University, 2005.
-
(2005)
Technical Report CSD, TR# 05-009
-
-
Grothoff, C.1
-
13
-
-
33750898917
-
Translation-based steganography
-
Springer-Verlag, Barcelona, Spain, June
-
C. Grothoff, et al., Translation-based steganography. Proc. of Information Hiding Workshop (IH 2005), Springer-Verlag, Barcelona, Spain, pp. 213V233, June 2005.
-
(2005)
Proc. of Information Hiding Workshop (IH 2005)
-
-
Grothoff, C.1
-
15
-
-
34548292448
-
Information hiding through errors: A confusing approach
-
January
-
Mercan Topkara, Umut Topkara and Mikhail J. Atallah, Information hiding through errors: A confusing approach, Proc. of SPIE International Conference on Security, Steganography, and Wa-termarking of Multimedia Contents, January 2007.
-
(2007)
Proc. of SPIE International Conference on Security, Steganography, and Wa-termarking of Multimedia Contents
-
-
Topkara, M.1
Topkara, U.2
Atallah, M.J.3
-
17
-
-
57849094995
-
Nostega: A Novel Noiseless Steganography Paradigm
-
March
-
A. Desoky, Nostega: A Novel Noiseless Steganography Paradigm, Journal of Digital Forensic Prac-tice, Vol. 2, No. 3, pp. 132-139, March 2008.
-
(2008)
Journal of Digital Forensic Prac-tice
, vol.2
, Issue.3
, pp. 132-139
-
-
Desoky, A.1
-
21
-
-
77956001264
-
Notestega: Notes-Based Steganography Methodology
-
January
-
A. Desoky, Notestega: Notes-Based Steganography Methodology, Information Security Journal: A Global Perspective, vol. 18, No 4, pp. 178-193, January 2009.
-
(2009)
Information Security Journal: A Global Perspective
, vol.18
, Issue.4
, pp. 178-193
-
-
Desoky, A.1
-
23
-
-
0038420284
-
Steganography its history and its application to computer based data files
-
School of Computing, Dublin City University
-
P. Davern, and M. Scott, Steganography its history and its application to computer based data files, Technical Report Internal Report Working Paper: CA-0795, School of Computing, Dublin City University 1995.
-
(1995)
Technical Report Internal Report Working Paper: CA-0795
-
-
Davern, P.1
Scott, M.2
-
24
-
-
0020885283
-
Design of a knowledge-based report generator
-
Cambridge, MA, June
-
K. Kukich, Design of a knowledge-based report generator, Proc. of the 21st Annual Meeting of the ACL, Massachusetts Institute of Technology, Cambridge, MA, pp. 145-150, June 1983.
-
(1983)
Proc. of the 21st Annual Meeting of the ACL, Massachusetts Institute of Technology
, pp. 145-150
-
-
Kukich, K.1
-
25
-
-
84879541318
-
-
CoGenTex Inc
-
CoGenTex Inc., WeatherReporter http://www.cogentex.com/
-
WeatherReporter
-
-
-
27
-
-
84879544277
-
-
Chessmaster: http://chessmaster.com
-
Chessmaster
-
-
-
28
-
-
84879511866
-
-
Spam Mimic: http://www.spammimic.com
-
Spam Mimic
-
-
-
29
-
-
68449090598
-
PSM: Public Steganography Methodology
-
University of Maryland, Baltimore County, November
-
A. Desoky and M. Younis, PSM: Public Steganography Methodology, Technical Report TR-CS-06-07, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, November 2006.
-
(2006)
Technical Report TR-CS-06-07, Department of Computer Science and Electrical Engineering
-
-
Desoky, A.1
Younis, M.2
-
30
-
-
40749156338
-
Graphstega: Graph Steganography Methodology
-
January
-
A. Desoky and M. Younis, Graphstega: Graph Steganography Methodology, Journal of Digital Forensic Practice, vol. 2, No. 1, pp. 27-36, January 2008.
-
(2008)
Journal of Digital Forensic Practice
, vol.2
, Issue.1
, pp. 27-36
-
-
Desoky, A.1
Younis, M.2
-
33
-
-
0026953429
-
Random texts exhibit Zipf's-law-like word frequency distribution
-
W. Li, Random texts exhibit Zipf's-law-like word frequency distribution, IEEE Trans. Information Theory, vol. 38, no. 6, pp. 1842-1845, 1992.
-
(1992)
IEEE Trans. Information Theory
, vol.38
, Issue.6
, pp. 1842-1845
-
-
Li, W.1
-
37
-
-
84879514996
-
-
University Of Florida, Gainesville
-
Graduate Catalog 2005-2006 University Of Florida, Gainesville: http://gradschool.rgp.u.edu/currentfiles/current-catalog.pdf
-
Graduate Catalog 2005-2006
-
-
-
39
-
-
84879532664
-
-
University of Otago
-
University of Otago, Postgraduate Catalog of Zoology: http://www.otago.ac.nz/Zoology/pdf/postgraduate handbook.pdf
-
Postgraduate Catalog of Zoology
-
-
-
40
-
-
84874774908
-
-
The Los Angeles Superior Court Civil
-
The Los Angeles Superior Court Civil, General Information: http://www.lasuperiorcourt.org/civil/main.htm#3
-
General Information
-
-
|