-
1
-
-
48349100694
-
A Tool for the detection of hidden data in microsoft compound document file format
-
H. Kwon, Y.g Kim, S. Lee, J. Lim, A Tool for the Detection of Hidden Data in Microsoft Compound Document File Format, In: Proc of International Conference on Information Science and Security ICISS, pp.141-146, 2008.
-
(2008)
Proc of International Conference On Information Science and Security ICISS
, pp. 141-146
-
-
Kwon, H.1
Kim, Y.G.2
Lee, S.3
Lim, J.4
-
3
-
-
0036488363
-
The first 50 years of electronic watermarking
-
Cox J, Miller M L, The First 50 Years of Electronic Watermarking, Applied Signal Processing, vol.12, no.2, pp.126-132, 2002.
-
(2002)
Applied Signal Processing
, vol.12
, Issue.2
, pp. 126-132
-
-
Cox, J.1
Miller, M.L.2
-
4
-
-
0032637701
-
Copyright protection for the electronic distribution of text documents
-
Brassil J T, Low S, Maxemchuk N F, Copyright protection for the electronic distribution of text documents, Proceedings of the IEEE, vol.87, no.7, pp.1181-1196, 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1181-1196
-
-
Brassil, J.T.1
Low, S.2
Maxemchuk, N.F.3
-
5
-
-
0032069581
-
Performance Comparison Of Two Text Marking Methods
-
Low S H, Maxemchunk N F, Performance comparison of two text marking methods, IEEE Journal on Selected Areas in Communications, vol.16, no.4, pp.561-572, 1998.
-
(1998)
IEEE Journal On Selected Areas In Communications
, vol.16
, Issue.4
, pp. 561-572
-
-
Low, S.H.1
Maxemchunk, N.F.2
-
6
-
-
33847656645
-
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
-
A. Castiglione, A. D. Santis, C. Soriente, Taking Advantages of a Disadvantage: Digital Forensics and Steganography using Document Metadata, The Journal of Systems and Software, vol. 80, no.6, pp. 750-764, 2007.
-
(2007)
The Journal of Systems and Software
, vol.80
, Issue.6
, pp. 750-764
-
-
Castiglione, A.1
Santis, A.D.2
Soriente, C.3
-
7
-
-
79960133153
-
The hiding virtues of ambiguity: Quantifiably resilient watermarking of natural language text through synonym substitutions
-
U. Topkara, M. Topkara, M. J. Atallah, The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions, In Proceedings of ACM Multimedia and Security Conference, Geneva, pp. 135-142, 2006.
-
(2006)
Proceedings of ACM Multimedia and Security Conference, Geneva
, pp. 135-142
-
-
Topkara, U.1
Topkara, M.2
Atallah, M.J.3
-
8
-
-
26844470147
-
Noun-Verb based technique of text watermarking using recursive decent semantic net parsers
-
Springer Press
-
Xingming Sun, Alex Jessey Asiimwe, Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers,Lecture Notes in Computer Science (LNCS) 3612: 958-961, Springer Press, 2005.
-
(2005)
Lecture Notes In Computer Science (LNCS)
, vol.3612
, pp. 958-961
-
-
Sun, X.1
Asiimwe, A.J.2
-
9
-
-
34548292448
-
Information hiding through errors: A confusing approach
-
Topkara M., Topraka U., Atallah M.J, Information hiding through errors: a confusing approach, In Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, pp. 65050V1-65050V12, 2007.
-
(2007)
Proceedings of the SPIE International Conference On Security, Steganography, and Watermarking of Multimedia Contents
-
-
Topkara, M.1
Topraka, U.2
Atallah, M.J.3
-
10
-
-
0035694579
-
Interword distance changes represented by sine waves for watermarking text images
-
D. Huang and H. Yan, Interword distance changes represented by sine waves for watermarking text images, IEEE Trans. Circuits and Systems for Video Technology, vol.11, no.12, pp.1237-1245, 2001.
-
(2001)
IEEE Trans. Circuits and Systems For Video Technology
, vol.11
, Issue.12
, pp. 1237-1245
-
-
Huang, D.1
Yan, H.2
-
11
-
-
33847748545
-
A new steganographic method for data hiding in microsoft word documents by a change tracking technique
-
T. Y. Liu, W. H. Tsai, A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique, IEEE Transactions on Information Forensics and Security, vol. 2, no.1, pp.24-30, 2007.
-
(2007)
IEEE Transactions On Information Forensics and Security
, vol.2
, Issue.1
, pp. 24-30
-
-
Liu, T.Y.1
Tsai, W.H.2
-
12
-
-
74849132505
-
Chestega: Chess steganography methodology
-
Abdelrahman Desoky, Mohamed Younis, Chestega: chess steganography methodology, Security and Communication Networks, vol. 2, no.6, pp. 555-566, 2009.
-
(2009)
Security and Communication Networks
, vol.2
, Issue.6
, pp. 555-566
-
-
Desoky, A.1
Younis, M.2
-
13
-
-
75949086264
-
Real-time and mpeg-1 layer iii compression resistant steganography in speech
-
M.H. Shirali-Shahreza and S. Shirali-Shahreza, Real-time and MPEG-1 layer III compression resistant steganography in speech, IET Information Security, vol. 4, no.1, pp.1-7, 2010.
-
(2010)
IET Information Security
, vol.4
, Issue.1
, pp. 1-7
-
-
Shirali-Shahreza, M.H.1
Shirali-Shahreza, S.2
-
14
-
-
77952620028
-
Edge adaptive image steganography based on lsbmatching revisited
-
Weiqi Luo, Fangjun Huang, Jiwu Huang, Edge adaptive image steganography based on LSBmatching revisited, IEEE Transactions on Information Forensics and Security, vol.5, no.2, pp.201-214, 2010.
-
(2010)
IEEE Transactions On Information Forensics and Security
, vol.5
, Issue.2
, pp. 201-214
-
-
Luo, W.1
Huang, F.2
Huang, J.3
-
16
-
-
77954479690
-
Invertible transform-based reversible text watermarking
-
Zhijie Liu, Xingming Sun, Yuling Liu, Lincong Yang, Zhangjie Fu, Zhihua Xia and Wei Liang,Invertible Transform-Based Reversible Text Watermarking, Information Technology Journal,vol. 9, no.6, pp. 1190-1195, 2010.
-
(2010)
Information Technology Journal
, vol.9
, Issue.6
, pp. 1190-1195
-
-
Liu, Z.1
Sun, X.2
Liu, Y.3
Yang, L.4
Zhangjie, F.5
Xia, Z.6
Liang, W.7
-
17
-
-
0034593185
-
Natural language processing for information assurance and security: An overview and implementations
-
M. J. Atallah, C. McDonough, S. Nirenburg, and V. Raskin, Natural Language Processing for Information Assurance and Security: An Overview and Implementations, Proceedings 9th ACM/SIGSAC New Security Paradigms Workshop, pp. 51-65, 2000.
-
(2000)
Proceedings 9th ACM/SIGSAC New Security Paradigms Workshop
, pp. 51-65
-
-
Atallah, M.J.1
McDonough, C.2
Nirenburg, S.3
Raskin, V.4
-
18
-
-
47349085616
-
Natural language watermarking via morphosyntactic alterations
-
M. Hassan et al, Natural language watermarking via morphosyntactic alterations, ComputerSpeech and Language, vol. 23, no.10, pp.107-125, 2009.
-
(2009)
ComputerSpeech and Language
, vol.23
, Issue.10
, pp. 107-125
-
-
Hassan, M.1
-
19
-
-
79957610071
-
A novel watermark embedding and detection scheme based on zero-knowledge proof
-
Zhangjie Fu, Xingming Sun, Jianjun Zhang, Bo Li, A Novel Watermark Embedding and Detection Scheme Based on Zero-Knowledge Proof, International Journal of Digital Content Technology and its Applications, vol. 5, no.3, pp.273-286, 2011.
-
(2011)
International Journal of Digital Contzent Technology and Its Applications
, vol.5
, Issue.3
, pp. 273-286
-
-
Zhangjie, F.1
Sun, X.2
Zhang, J.3
Li, B.4
-
20
-
-
79957588468
-
Robust vector digital watermarking using angles and a random table
-
Jungyeop Kim, Robust Vector Digital Watermarking Using Angles and a Random Table, Advances in Information Sciences and Service Sciences, vol. 2, no. 4, pp. 79-90, 2010.
-
(2010)
Advances In Information Sciences and Service Sciences
, vol.2
, Issue.4
, pp. 79-90
-
-
Kim, J.1
|