-
2
-
-
4544331263
-
Data-hiding in audio using frequency-selective phase alteration. Proceedings of ieee international conference on acoustics
-
Ansari, R., Malik, H., & Khokhar, A. (2004, May). Data-hiding in audio using frequency-selective phase alteration. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '04), 5(17-21), 389-92.
-
(2004)
Speech, and Signal Processing (ICASSP '04)
, vol.5
, Issue.17-21
, pp. 389-392
-
-
Ansari, R.1
Malik, H.2
Khokhar, A.3
-
3
-
-
0030384775
-
Techniques for data hiding
-
Bender, W. et al. (1996). Techniques for data hiding. IBM Systems Journal, 35(3 & 4), 313-336.
-
(1996)
IBM Systems Journal
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
-
4
-
-
33947624454
-
Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text
-
Purdue University.
-
Bennett, K. (2004). Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text. CERIAS Technical Report 2004-13, Purdue University.
-
(2004)
CERIAS Technical Report 2004-13
-
-
Bennett, K.1
-
9
-
-
34548233203
-
Synonymous paraphrasing using wordnet and internet
-
F. Meziane & E. Metais (Eds.), Berlin: Springer
-
Bolshakov, I. A., & Gelbukh, A. (2004, June). Synonymous paraphrasing using wordnet and Internet. In F. Meziane & E. Metais (Eds.), Natural language processing and information systems: 9th international conference on applications of natural language to information systems, NLDB 2004: Vol. 31-36. Lecture notes in computer science (pp. 312-323). Berlin: Springer.
-
(2004)
Natural Language Processing and Information Systems: 9Th International Conference on Applications of Natural Language to Information Systems, NLDB 2004: Vol. 31-36. Lecture Notes in Computer Science
, pp. 312-323
-
-
Bolshakov, I.A.1
Gelbukh, A.2
-
11
-
-
33749584675
-
Exploiting linguistic features in lexical steganography: Design and proof-of-concept implementation. proceedings of the 39th annual hawaii international conference on system sciences (hicss '06)
-
Chand, V., & Orgun, C. O. (2006, January). Exploiting linguistic features in lexical steganography: Design and proof-of-concept implementation. Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS '06). IEEE, 6, 126b.
-
(2006)
IEEE
, vol.6
-
-
Chand, V.1
Orgun, C.O.2
-
12
-
-
0005013984
-
Hiding the hidden: A software system for concealing ciphertext as innocuous text
-
Beijing, P. R. China. Berlin, Heidelberg: Springer-Verlag
-
Chapman, M., & Davida, G. (1997). Hiding the hidden: A software system for concealing ciphertext as innocuous text. In Proceedings of the International Conference on Information and Communications Security: Vol. 1334. Lecture notes in computer science (pp. 335-345). Beijing, P. R. China. Berlin, Heidelberg: Springer-Verlag.
-
(1997)
Proceedings of the International Conference on Information and Communications Security: Vol. 1334. Lecture Notes in Computer Science
, pp. 335-345
-
-
Chapman, M.1
Davida, G.2
-
16
-
-
3042637631
-
Increasing robustness of lsb audio steganography using a novel embedding method
-
Las Vegas, Nevada, April 5-7, 2004
-
Cvejic, N., & Seppanen, T. (2004). Increasing robustness of LSB audio steganography using a novel embedding method. Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), Las Vegas, Nevada, April 5-7, 2004.
-
(2004)
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04)
-
-
Cvejic, N.1
Seppanen, T.2
-
17
-
-
7644240420
-
Reduced distortion bit-modification for lsb audio steganography '04
-
Beijing, China, August 31-September 4, 2004.
-
Cvejic, N., & Seppanen, T. (2004). Reduced distortion bit-modification for LSB audio steganography '04. Proceedings of the 7th International Conference on Signal Processing (ICSP 04), Beijing, China, August 31-September 4, 2004.
-
(2004)
Proceedings of the 7Th International Conference on Signal Processing (ICSP 04)
-
-
Cvejic, N.1
Seppanen, T.2
-
18
-
-
0038420284
-
Steganography its history and its application to computer-based data files
-
Dublin City University. Retrieved August 3, 2006, from
-
Davern, P., & Scott, M. (1995). Steganography its history and its application to computer-based data files. Internal Report Working Paper: CA-0795. School of Computing, Dublin City University. Retrieved August 3, 2006, from http://computing.dcu.ie/research/papers/1995/0795.pdf
-
(1995)
Internal Report Working Paper: CA-0795. School of Computing
-
-
Davern, P.1
Scott, M.2
-
19
-
-
68449090598
-
Psm: Public steganography methodology
-
Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore, MD.
-
Desoky, A., & Younis, M. (2006, November). PSM: Public steganography methodology. Technical Report TR-CS-06-07, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore, MD.
-
(2006)
Technical Report TR-CS-06-07
-
-
Desoky, A.1
Younis, M.2
-
20
-
-
40749156338
-
Graphstega: Graph steganography methodology
-
Desoky, A., & Younis, M. (2008). Graphstega: Graph steganography methodology. Journal of Digital A novel Forensic Practice, 2(1), 27-36.
-
(2008)
Journal of Digital a Novel Forensic Practice
, vol.2
, Issue.1
, pp. 27-36
-
-
Desoky, A.1
Younis, M.2
-
21
-
-
57849094995
-
Nostega: Noiseless steganography paradigm
-
Desoky, A. (2008). Nostega: Noiseless steganography paradigm. Journal of Digital Forensic Practice, 2(3),132-139.
-
(2008)
Journal of Digital Forensic Practice
, vol.2
, Issue.3
, pp. 132-139
-
-
Desoky, A.1
-
26
-
-
33746582127
-
Translation-based steganography
-
Purdue University (CERIAS Tech Report 2005-39)
-
Grothoff, C., et al. (2005). Translation-based steganography. Technical Report CSD TR# 05-009. Purdue University (CERIAS Tech Report 2005-39).
-
(2005)
Technical Report CSD TR# 05-009
-
-
Grothoff, C.1
-
28
-
-
84955119830
-
-
Berlin, Heidelberg: Springer-Verlag
-
Gruhl, D., Lu, A., & Bender, W. (1996, May). Echo hiding. Proceedings of First International Workshop on Information Hiding. Lecture notes in computer science (pp. 295-316). Berlin, Heidelberg: Springer-Verlag.
-
(1996)
Echo Hiding. Proceedings of First International Workshop on Information Hiding. Lecture Notes in Computer Science
, pp. 295-316
-
-
Gruhl, D.1
Lu, A.2
Bender, W.3
-
29
-
-
33746069919
-
-
Berlin, Heidelberg: Springer-Verlag
-
Handel, T. G., & Sandford, M. T. (1996). Data hiding in the OSI network model. Information Hiding: First International Workshop, Proceedings: Vol. 1174. Lecture notes in computer science (pp. 23-38). Berlin, Heidelberg: Springer-Verlag.
-
(1996)
Data Hiding in the OSI Network Model. Information Hiding: First International Workshop, Proceedings: Vol. 1174. Lecture Notes in Computer Science
, pp. 23-38
-
-
Handel, T.G.1
Sandford, M.T.2
-
30
-
-
84928222576
-
Note-taking english as a simplified register
-
Janda, R. D. (1985). Note-taking English as a simplified register. Discourse Processes, 8(4), 437-454.
-
(1985)
Discourse Processes
, vol.8
, Issue.4
, pp. 437-454
-
-
Janda, R.D.1
-
31
-
-
0001931684
-
A survey of steganographic techniques
-
S. Katzenbeisser & F. Petitcolas (Eds.), Norwood, MA: Artech House
-
Johnson, N. F., & Katzenbeisser, S. (1999). A survey of steganographic techniques. In S. Katzenbeisser & F. Petitcolas (Eds.), Information hiding (pp. 43-78). Norwood, MA: Artech House.
-
(1999)
Information Hiding
, pp. 43-78
-
-
Johnson, N.F.1
Katzenbeisser, S.2
-
32
-
-
34547967524
-
Automatic summarizing: The state of the art. info
-
Jones, K. S. (2007). Automatic summarizing: The state of the art. Info. Processing Mgmt., 43(6), 1449-1481.
-
(2007)
Processing Mgmt.
, vol.43
, Issue.6
, pp. 1449-1481
-
-
Jones, K.S.1
-
34
-
-
33847675252
-
An overview of steganography for the computer forensics examiner. Forensic science communications
-
Kessler, G. C. (2004). An overview of steganography for the computer forensics examiner. Forensic Science Communications. Technical Report, 6(3) http://www.garykessler.net/library/fsc_stego.htm.
-
(2004)
Technical Report
, vol.6
, Issue.3
-
-
Kessler, G.C.1
-
36
-
-
0035791290
-
Spread-spectrum audio watermarking: Requirements, applications, and limitations
-
219-224, Cannes, France, October 3-5, 2001.
-
Kirovski, D., & Malvar, H. (2001). Spread-spectrum audio watermarking: Requirements, applications, and limitations. Proceedings of the 4th IEEE Workshop on Multimedia Signal Processing, 219-224, Cannes, France, October 3-5, 2001.
-
(2001)
Proceedings of the 4Th IEEE Workshop on Multimedia Signal Processing
-
-
Kirovski, D.1
Malvar, H.2
-
37
-
-
84880039971
-
-
Amsterdam, Philadelphia: John Benjamins Publishing Company
-
Mani, I. (2001). Automatic summarization. Amsterdam, Philadelphia: John Benjamins Publishing Company.
-
(2001)
Automatic Summarization
-
-
Mani, I.1
-
38
-
-
28944432343
-
Is image steganography natural?
-
Martin, A., Sapiro, G., & Seroussi, G. (2005). Is image steganography natural? IEEE Transactions on Image Processing, 14(12), 2040-2050.
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.12
, pp. 2040-2050
-
-
Martin, A.1
Sapiro, G.2
Seroussi, G.3
-
39
-
-
77953750858
-
Natural language watermarking: Design, analysis, and a proof-of-concept implementation
-
I. S. Moskowitz (Ed.), Berlin, Heidelberg: Springer-Verlag
-
Mikhail, J. A., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., & Naik, S. (2001, April). Natural language watermarking: Design, analysis, and a proof-of-concept implementation. In I. S. Moskowitz (Ed.), Information Hiding: Fourth International Workshop. Lecture notes in computer science (pp. 185-199). Berlin, Heidelberg: Springer-Verlag.
-
(2001)
Information Hiding: Fourth International Workshop. Lecture Notes in Computer Science
, pp. 185-199
-
-
Mikhail, J.A.1
Raskin, V.2
Crogan, M.3
Hempelmann, C.4
Kerschbaum, F.5
Mohamed, D.6
Naik, S.7
-
40
-
-
35248834521
-
Natural language watermarking and tamperproofing
-
A. P. Fabien & F. A. P. Petitcolas (Eds.), Berlin, Heidelberg: Springer-Verlag
-
Mikhail, J. A., Raskin, V., Hempelmann, C. F., Topkara, M., Sion, R., Topkara, U., & Triezenberg, K. E. (2002, October). Natural language watermarking and tamperproofing. In A. P. Fabien & F. A. P. Petitcolas (Eds.), Information Hiding: Fifth International Workshop: Vol 2578. Lecture notes in computer science (pp. 196-212). Berlin, Heidelberg: Springer-Verlag.
-
(2002)
Information Hiding: Fifth International Workshop: Vol 2578. Lecture Notes in Computer Science
, pp. 196-212
-
-
Mikhail, J.A.1
Raskin, V.2
Hempelmann, C.F.3
Topkara, M.4
Sion, R.5
Topkara, U.6
Triezenberg, K.E.7
-
41
-
-
34548241754
-
The syntax of concealment: Reliable methods for plain text information hiding
-
January
-
Murphy, B., & Vogel, C. (2007, January). The syntax of concealment: Reliable methods for plain text information hiding. Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents. http://spiedl.aip.org/getabs/servlet/GetabsServlet?prognormal&id=PSISDG00650500000165050Y000001 &idtype-cvips&gifs-yes.
-
(2007)
Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents
-
-
Murphy, B.1
Vogel, C.2
-
42
-
-
38049156072
-
Text information hiding with preserved meaning a case for japanese documents
-
[originally published in Japanese]. A similar paper by the first author in English retrieved on June 4, 2008, from
-
Nakagawa, H., Sampei, K., Matsumoto, T., Kawaguchi, S., Makino, K., & Murase, I. (2001). Text information hiding with preserved meaning a case for Japanese documents. IPSJ Transaction, 42(9), 2339-2350 [originally published in Japanese]. A similar paper by the first author in English retrieved on June 4, 2008, from http://www.ndl.itc.utokyo.ac.jp/nakagawa/academic-res/finpri02.pdf
-
(2001)
IPSJ Transaction
, vol.42
, Issue.9
, pp. 2339-2350
-
-
Nakagawa, H.1
Sampei, K.2
Matsumoto, T.3
Kawaguchi, S.4
Makino, K.5
Murase, I.6
-
43
-
-
85023907079
-
-
Retrieved October 15, 2008
-
Notetaking System. (n.d.). Retrieved October 15, 2008, from http://www.cs.umd.edu/-egolub/AVIAN/TE-BIRD
-
-
-
-
44
-
-
0032680807
-
-
July)
-
Petitcolas, F.A.P., Anderson, R.J., & Kuhn, M.G. (1999, July). Proceedings of the IEEE, special issue on protection of multimedia content, 87(7), 1062-1068.
-
(1999)
Proceedings of the IEEE, Special Issue on Protection of Multimedia Content
, vol.87
, Issue.7
, pp. 1062-1068
-
-
Petitcolas, F.1
Erson, R.J.2
Kuhn, M.G.3
-
46
-
-
33947672376
-
A new approach to persian/arabic text steganography
-
(ICIS-COMSAR 2006, Honolulu, Hawaii, July 10-12.
-
Shirali-Shahreza, M. H., & Shirali-Shahreza, M. (2006). A new approach to Persian/Arabic text steganography. Proceedings of 5th IEEE/ACIS International Conference on Computer and Information Science (ICIS-COMSAR 2006, Honolulu, Hawaii, July 10-12.
-
(2006)
Proceedings of 5Th IEEE/ACIS International Conference on Computer and Information Science
-
-
Shirali-Shahreza, M.H.1
Shirali-Shahreza, M.2
-
47
-
-
85023903699
-
Text steganography in sms. Convergence information technology
-
Shirali-Shahreza, M. et al. (2007, November). Text steganography in SMS. Convergence Information Technology, November 21-23, 1714-1719.
-
(2007)
November
, vol.21-23
, pp. 1714-1719
-
-
Shirali-Shahreza, M.1
-
48
-
-
85023957047
-
What we do with english when we take notes: Evidence from a civil lawsuit
-
Poznan, Poland: Adam Mickiewicz University Press.
-
Shuy, R. W. (1998). What we do with English when we take notes: Evidence from a civil lawsuit. Studia Anglica posnaniensia: International review of English studies. Poznan, Poland: Adam Mickiewicz University Press.
-
(1998)
Studia Anglica Posnaniensia: International Review of English Studies
-
-
Shuy, R.W.1
-
49
-
-
85023923066
-
-
Retrieved July 31, 2007
-
Spam Mimic. (n.d.). Retrieved July 31, 2007, from http://www.sp ammimic.com
-
-
-
Mimic, S.1
-
51
-
-
33750907773
-
The hiding virtues of ambiguity: Quantifiably resilient watermarking of natural language text through synonym substitutions
-
New York: ACM Press
-
Topkara, U., Topkara, M., & Atallah, M. J. (2006). The hiding virtues of ambiguity: Quantifiably resilient watermarking of natural language text through synonym substitutions. In MM&Sec '06: Proceeding of the 8th Workshop on Multimedia and Security (pp. 164-174), New York: ACM Press.
-
(2006)
Mm&Sec '06: Proceeding of the 8Th Workshop on Multimedia and Security
, pp. 164-174
-
-
Topkara, U.1
Topkara, M.2
Atallah, M.J.3
-
52
-
-
34548292448
-
Information hiding through errors: A confusing approach
-
San Jose, CA, January 29-February 1, 2007
-
Topkara, M., Topkara, U., S Atallah, M. J. (2007, January). Information hiding through errors: A confusing approach. Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, January 29-February 1, 2007.
-
(2007)
Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents
-
-
Topkara, M.1
Topkara, U.2
Atallah, S.3
-
53
-
-
84950895792
-
Mimic functions
-
Wayner, P. (1992). Mimic functions. Cryptologia, XVI(3), 193-214.
-
(1992)
Cryptologia
, vol.16
, Issue.3
, pp. 193-214
-
-
Wayner, P.1
-
54
-
-
85023909913
-
(
-
(2nd ed., pp. 81-128).: Morgan Kaufmann.
-
Wayner, P. (2002). Disappearing cryptography (2nd ed., pp. 81-128).: Morgan Kaufmann.
-
(2002)
Disappearing Cryptography
-
-
Wayner, P.1
-
55
-
-
33750902164
-
Lexical steganography through adaptive modulation of the word choice hash
-
Retrieved April 15, 2008, from
-
Winstein, K. (1999, January). Lexical steganography through adaptive modulation of the word choice hash. Secondary education at the Illinois Mathematics and Science Academy. Retrieved April 15, 2008, from http://alumni.imsa.edu/-keithw/tlex/lsteg.ps
-
(1999)
Secondary Education at the Illinois Mathematics and Science Academy
-
-
Winstein, K.1
-
56
-
-
85023934644
-
-
Lexical steganography. Retrieved August 3, 2008, from
-
Winstein, K. (Lexical steganography. Retrieved August 3, 2008, from http://alumni.imsa.edu/-keithw/tlex
-
-
-
Winstein, K.1
|