-
1
-
-
75949086264
-
Real-time and MPEG-1 layer III compression resistant steganography in speech
-
M.H. Shirali-Shahreza, S. Shirali-Shahreza, "Real-time and MPEG-1 layer III compression resistant steganography in speech", IET Information Security, vol. 4, no. 1, pp. 1-7, 2010.
-
(2010)
IET Information Security
, vol.4
, Issue.1
, pp. 1-7
-
-
Shirali-Shahreza, M.H.1
Shirali-Shahreza, S.2
-
2
-
-
78651526793
-
Watermarking 3D Triangular Mesh with High Visual Quality
-
Osama Hosam, Lincong Yang, Wei Liang, Xingming Sun, "Watermarking 3D Triangular Mesh with High Visual Quality", International Journal of Digital Content Technology and its Applications, vol. 4, no. 4, pp. 107-116, 2010.
-
(2010)
International Journal of Digital Content Technology and its Applications
, vol.4
, Issue.4
, pp. 107-116
-
-
Hosam, O.1
Yang, L.2
Liang, W.3
Sun, X.4
-
3
-
-
79957588468
-
Robust Vector Digital Watermarking Using Angles and a Random Table
-
Jungyeop Kim, "Robust Vector Digital Watermarking Using Angles and a Random Table", Advances in Information Sciences and Service Sciences, vol. 2, no. 4, pp. 79-90, 2010.
-
(2010)
Advances in Information Sciences and Service Sciences
, vol.2
, Issue.4
, pp. 79-90
-
-
Kim, J.1
-
4
-
-
33847656645
-
Taking Advantages of a Disadvantage: Digital Forensics and Steganography using Document Metadata
-
A. Castiglione, A. D. Santis, C. Soriente, "Taking Advantages of a Disadvantage: Digital Forensics and Steganography using Document Metadata", The Journal of Systems and Software, vol. 80, pp. 750-764, 2007.
-
(2007)
The Journal of Systems and Software
, vol.80
, pp. 750-764
-
-
Castiglione, A.1
Santis, A.D.2
Soriente, C.3
-
5
-
-
77954479690
-
Invertible Transform-Based Reversible Text Watermarking
-
Zhijie Liu, Xingming Sun, Yuling Liu, Lincong Yang, Zhangjie Fu, Zhihua Xia and Wei Liang, "Invertible Transform-Based Reversible Text Watermarking", Information Technology Journal, vol. 9, no. 6, pp. 1190-1195, 2010.
-
(2010)
Information Technology Journal
, vol.9
, Issue.6
, pp. 1190-1195
-
-
Liu, Z.1
Sun, X.2
Liu, Y.3
Yang, L.4
Fu, Z.5
Xia, Z.6
Liang, W.7
-
6
-
-
52049097846
-
-
ECMA International, Accessed Dec. 2010
-
ECMA International, "Office open XML file formats", http://www.ecmainternational. org/publications/standards/Ecma-376.htm, 2006. Accessed Dec. 2010
-
(2006)
Office open XML file formats
-
-
-
7
-
-
0034593185
-
Natural Language Processing for Information Assurance and Security: An Overview and Implementations
-
Cork, Ireland, September
-
M. J. Atallah, C. McDonough, S. Nirenburg, and V. Raskin, "Natural Language Processing for Information Assurance and Security: An Overview and Implementations", Proceedings 9th ACM/SIGSAC New Security Paradigms Workshop, Cork, Ireland, pp. 51-65, September, 2000.
-
(2000)
Proceedings 9th ACM/SIGSAC New Security Paradigms Workshop
, pp. 51-65
-
-
Atallah, M.J.1
McDonough, C.2
Nirenburg, S.3
Raskin, V.4
-
8
-
-
47349085616
-
Natural language watermarking via morphosyntactic alterations
-
M. Hassan et al, "Natural language watermarking via morphosyntactic alterations", Computer Speech and Language, vol. 23, pp. 107-125, 2009.
-
(2009)
Computer Speech and Language
, vol.23
, pp. 107-125
-
-
Hassan, M.1
-
9
-
-
33750907773
-
The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions
-
Geneva, In
-
U. Topkara, M. Topkara, M. J. Atallah, "The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions", In Proceedings of ACM Multimedia and Security Conference, Geneva, 2006.
-
(2006)
Proceedings of ACM Multimedia and Security Conference
-
-
Topkara, U.1
Topkara, M.2
Atallah, M.J.3
-
10
-
-
26844470147
-
Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers
-
August
-
Xingming Sun, Alex Jessey Asiimwe, "Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers", Lecture Notes in Computer Science (LNCS), vol. 3612, pp. 958-961, August 2005.
-
(2005)
Lecture Notes in Computer Science (LNCS)
, vol.3612
, pp. 958-961
-
-
Sun, X.1
Asiimwe, A.J.2
-
11
-
-
34548292448
-
Information hiding through errors: A confusing approach
-
In, January
-
M. Topkara, U. Topraka, M. J. Atallah, "Information hiding through errors: a confusing approach", In Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, pp. 65050V1-65050V12, January 2007.
-
(2007)
Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents
-
-
Topkara, M.1
Topraka, U.2
Atallah, M.J.3
-
12
-
-
34548289360
-
A method of text watermarking using presuppositions
-
In, January
-
B. Macq and O. Vybornova, "A method of text watermarking using presuppositions", In Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, pp. 65051R1-65051R10, January 2007.
-
(2007)
Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents
-
-
Macq, B.1
Vybornova, O.2
-
13
-
-
35048885080
-
A method of linguistic steganography based on collocationally-verified synonymy
-
In, Toronto, ON, Canada, May
-
I. A. Bolshakov, "A method of linguistic steganography based on collocationally-verified synonymy", In Proc. 6th Information Hiding Workshop, Toronto, ON, Canada, pp.180-191, May 2004.
-
(2004)
Proc. 6th Information Hiding Workshop
, pp. 180-191
-
-
Bolshakov, I.A.1
-
14
-
-
0029394108
-
Electronic Marking and Identification Techniques to Discourage Document Copying
-
J. T. Brassil, S. Low, N. F. Maxemchuk, and L. O'Gorman, "Electronic Marking and Identification Techniques to Discourage Document Copying", IEEE Journal on Selected Areas in Communications, vol. 13, no. 8, pp. 1495-1504, 1995.
-
(1995)
IEEE Journal on Selected Areas in Communications
, vol.13
, Issue.8
, pp. 1495-1504
-
-
Brassil, J.T.1
Low, S.2
Maxemchuk, N.F.3
O'Gorman, L.4
-
15
-
-
0032637701
-
Copyright Protection for the Electronic Distribution of Text Documents
-
J. T. Brassil, S. Low, and N. F. Maxemchuk, "Copyright Protection for the Electronic Distribution of Text Documents", Proceedings of the IEEE, vol. 87, no. 7, pp. 1181-1196, 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1181-1196
-
-
Brassil, J.T.1
Low, S.2
Maxemchuk, N.F.3
-
16
-
-
0035694579
-
Interword distance changes represented by sine waves for watermarking text images
-
D. Huang and H. Yan, "Interword distance changes represented by sine waves for watermarking text images", IEEE Trans. Circuits and Systems for Video Technology, vol. 11, no. 12, pp. 1237-1245, 2001.
-
(2001)
IEEE Trans. Circuits and Systems for Video Technology
, vol.11
, Issue.12
, pp. 1237-1245
-
-
Huang, D.1
Yan, H.2
-
18
-
-
54049129934
-
Experiments in Hiding Data Inside the File Structure of Common Office Documents: A Steganography Application
-
In, logies. LasVegas, NV, USA
-
G. Cantrell, D. D. Dampier, "Experiments in Hiding Data Inside the File Structure of Common Office Documents: A Steganography Application", In: Proceedings of the International Symposium on Information and Communication Technologies. LasVegas, NV, USA, pp.146-151, 2004.
-
(2004)
Proceedings of the International Symposium on Information and Communication Tech
, pp. 146-151
-
-
Cantrell, G.1
Dampier, D.D.2
-
19
-
-
48349100694
-
A Tool for the Detection of Hidden Data in Microsoft Compound Document File Format
-
In, Hyderabad, India
-
H. Kwon, Y. G Kim, S. Lee, J. Lim, "A Tool for the Detection of Hidden Data in Microsoft Compound Document File Format", In: Proc of International Conference on Information Science and Security ICISS, Hyderabad, India, pp.141-146, 2008.
-
(2008)
Proc of International Conference on Information Science and Security ICISS
, pp. 141-146
-
-
Kwon, H.1
Kim, Y.G.2
Lee, S.3
Lim, J.4
-
20
-
-
33847748545
-
A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique
-
T. Y. Liu, W. H. Tsai, "A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique", IEEE Transactions on Information Forensics and Security, vol. 2, no. 1, pp. 24-30, 2007.
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.1
, pp. 24-30
-
-
Liu, T.Y.1
Tsai, W.H.2
-
21
-
-
65249114076
-
New XML-Based Files Implications for Forensics
-
S. L. Garfinkel and James Migletz, "New XML-Based Files Implications for Forensics", IEEE Security and Privacy, vol. 7, no. 2, pp. 38-44, 2009.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.2
, pp. 38-44
-
-
Garfinkel, S.L.1
Migletz, J.2
-
22
-
-
60649094708
-
Data concealment and detection in Microsoft Office 2007 files
-
Bora Park, Jungheum Park, Sangjin Lee, "Data concealment and detection in Microsoft Office 2007 files", Digital Investigation, vol. 5, no. 3, pp. 104-114, 2009.
-
(2009)
Digital Investigation
, vol.5
, Issue.3
, pp. 104-114
-
-
Park, B.1
Park, J.2
Lee, S.3
-
24
-
-
79957606172
-
-
Microsoft Corp, Accessed Dec. 2010
-
Microsoft Corp, "XML file name extensions in Office 2010", http://technet.microsoft.com/enus/ library/cc179191.aspx, 2010. Accessed Dec. 2010
-
(2010)
XML file name extensions in Office 2010
-
-
-
25
-
-
79957586416
-
-
Microsoft Corp, Accessed Dec. 2010
-
Microsoft Corp, "Overview of wordprocessingml", http://msdn2.microsoft.com/enus/ library/aa212812(office.11).aspx, 2009. Accessed Dec. 2010
-
(2009)
Overview of wordprocessingml
-
-
-
26
-
-
79957602480
-
-
Accessed Dec. 2010
-
W. V. Vugt, "2007 Office Document: Open XML Markup Explained", http://www.microsoft.com/downloads/details.aspx?FamilyID=6f264d0b-23e8-43fe-9f82-9ab627e5eaa3&displaylang=en, 2007.Accessed Dec. 2010
-
(2007)
2007 Office Document: Open XML Markup Explained
-
-
Vugt, W.V.1
-
27
-
-
78649622258
-
Information Hiding Techniques for Steganography and Digital Watermarking
-
S. Katzenbeisser, F. Petitcolas, "Information Hiding Techniques for Steganography and Digital Watermarking", The EDP Audit, Control, and Security Newsletter, vol. 28, no. 6, pp. 1-2, 2000.
-
(2000)
The EDP Audit, Control, and Security Newsletter
, vol.28
, Issue.6
, pp. 1-2
-
-
Katzenbeisser, S.1
Petitcolas, F.2
-
28
-
-
33750921850
-
Zero-knowledge watermark detector robust to sensitivity attacks
-
in, September, Geneva, Switzerland
-
J. R. Troncoso-Pastoriza, F. Perez-Gonzalez, "Zero-knowledge watermark detector robust to sensitivity attacks", in 8th ACM Multimedia and Security Workshop, Geneva, Switzerland, pp. 97-107, September 2006.
-
(2006)
8th ACM Multimedia and Security Workshop
, pp. 97-107
-
-
Troncoso-Pastoriza, J.R.1
Perez-Gonzalez, F.2
-
30
-
-
79952805076
-
A Scheme of PE Virus Detection Using Fragile Software Watermarking Technique
-
Zuwei Tian, Xingming Sun, Hengfu Yang, "A Scheme of PE Virus Detection Using Fragile Software Watermarking Technique", International Journal of Digital Content Technology and its Applications, vol. 5, no. 2, pp. 158-164, 2011.
-
(2011)
International Journal of Digital Content Technology and its Applications
, vol.5
, Issue.2
, pp. 158-164
-
-
Tian, Z.1
Sun, X.2
Yang, H.3
|