-
1
-
-
0034593185
-
Natural language processing for information assurance and security: An overview and implementations
-
Ballycotton, County Cork, Ireland
-
Mikhail J. Atallah, Craig J. McDonough, Victor Raskin, and Sergei Nirenburg. 2001a. Natural language processing for information assurance and security: an overview and implementations. In Proceedings of the 2000 workshop on New security paradigms, pages 51-65, Ballycotton, County Cork, Ireland.
-
(2001)
Proceedings of the 2000 Workshop on New Security Paradigms
, pp. 51-65
-
-
Atallah, M.J.1
McDonough, C.J.2
Raskin, V.3
Nirenburg, S.4
-
2
-
-
77953750858
-
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
-
Information Hiding
-
Mikhail J. Atallah, Victor Raskin, Michael C. Crogan, Christian Hempelmann, Florian Kerschbaum, Dina Mohamed, and Sanket Naik. 2001b. Natural language watermarking: design, analysis, and a proof-of-concept implementation. In Proceedings of the 4th International Information Hiding Workshop, volume 2137, pages 185-199, Pittsburgh, Pennsylvania. (Pubitemid 33367667)
-
(2001)
Lecture Notes in Computer Science
, Issue.2137
, pp. 185-199
-
-
Atallah, M.J.1
Raskin, V.2
Crogan, M.3
Hempelmann, C.4
Kerschbaum, F.5
Mohamed, D.6
Naik, S.7
-
3
-
-
35248834521
-
Natural language watermarking and tamperproofing
-
Noordwijkerhout, The Netherlands
-
Mikhail J. Atallah, Victor Raskin, Christian F. Hempel-mann, Mercan Karahan, Umut Topkara, Katrina E. Triezenberg, and Radu Sion. 2002. Natural language watermarking and tamperproofing. In Proceedings of the 5th International Information Hiding Workshop, pages 196-212, Noordwijkerhout, The Netherlands.
-
(2002)
Proceedings of the 5th International Information Hiding Workshop
, pp. 196-212
-
-
Atallah, M.J.1
Raskin, V.2
Hempelmann, C.F.3
Karahan, M.4
Topkara, U.5
Triezenberg, K.E.6
Sion, R.7
-
7
-
-
77957608236
-
Data analysis project: Leveraging massive textual corpora using n-gram statistics
-
Carnegie Mellon University
-
Andrew Carlson, Tom M. Mitchell, and Ian Fette. 2008. Data analysis project: Leveraging massive textual corpora using n-gram statistics. Technical report, School of Computer Science, Carnegie Mellon University.
-
(2008)
Technical Report, School of Computer Science
-
-
Carlson, A.1
Mitchell, T.M.2
Fette, I.3
-
9
-
-
0005013984
-
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
-
Mark Chapman and George I. Davida. 1997. Hiding the hidden: A software system for concealing ciphertext as innocuous text. In Proceedings of the First International Conference on Information and Communication Security, volume 1334, pages 335-345, Beijing. (Pubitemid 127148061)
-
(1997)
Lecture Notes in Computer Science
, Issue.1334
, pp. 335-345
-
-
Chapman, M.1
Davida, D.2
-
13
-
-
26844515317
-
A natural language watermarking based on Chinese syntax
-
Advances in Natural Computation: First International Conference, ICNC 2005. Proceedings
-
Yuling Liu, Xingming Sun, and Yong Wu. 2005. A natural language watermarking based on Chinese syntax. In Advances in Natural Computation, volume 3612, pages 958-961, Changsha, China. (Pubitemid 41449669)
-
(2005)
Lecture Notes in Computer Science
, vol.3612
, Issue.PART III
, pp. 958-961
-
-
Liu, Y.1
Sun, X.2
Wu, Y.3
-
15
-
-
34548260814
-
Syntactic tools for text watermarking
-
San Jose, CA
-
Hasan M. Meral, Emre Sevinc, Ersin Unkar, Bulent Sankur, A. Sumru Ozsoy, and Tunga Gungor. 2007. Syntactic tools for text watermarking. In Proceedings of the SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, volume 6505, San Jose, CA.
-
(2007)
Proceedings of the SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
, vol.6505
-
-
Meral, H.M.1
Sevinc, E.2
Unkar, E.3
Sankur, B.4
Sumru Ozsoy, A.5
Gungor, T.6
-
16
-
-
34548241754
-
The syntax of concealment: Reliable methods for plain text information hiding
-
San Jose, CA
-
Brian Murphy and Carl Vogel. 2007. The syntax of concealment: reliable methods for plain text information hiding. In Proceedings of the SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, volume 6505, San Jose, CA.
-
(2007)
Proceedings of the SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
, vol.6505
-
-
Murphy, B.1
Vogel, C.2
-
18
-
-
80053288654
-
Attacks on linguistic steganography systems using text analysis
-
San Jose, CA
-
Cuneyt M. Taskiran, Mercan Topkara, and Edward J. Delp. 2006. Attacks on linguistic steganography systems using text analysis. In Proceedings of the SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, volume 6072, pages 97-105, San Jose, CA.
-
(2006)
Proceedings of the SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
, vol.6072
, pp. 97-105
-
-
Taskiran, C.M.1
Topkara, M.2
Delp, E.J.3
-
19
-
-
34547315631
-
Words are not enough: Sentence level natural language watermarking
-
DOI 10.1145/1178766.1178777, Proceedings of the ACM International Workshop on Multimedia Contents Protection and Security, MCPS 2006
-
Mercan Topkara, Umut Topkara, and Mikhail J. Atallah. 2006a. Words are not enough: sentence level natural language watermarking. In Proceedings of the ACM Workshop on Content Protection and Security, pages 37-46, Santa Barbara, CA. (Pubitemid 47154931)
-
(2006)
Proceedings of the ACM International Multimedia Conference and Exhibition
, pp. 37-46
-
-
Topkara, M.1
Topkara, U.2
Atallah, M.J.3
-
20
-
-
33750907773
-
The hiding virtues of ambiguity: Quantifiably resilient watermarking of natural language text through synonym substitutions
-
Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06
-
Umut Topkara, Mercan Topkara, and Mikhail J. Atal-lah. 2006b. The hiding virtues of ambiguity: quan-tifiably resilient watermarking of natural language text through synonym substitutions. In Proceedings of the 8th Workshop on Multimedia and Security, pages 164-174, Geneva, Switzerland. (Pubitemid 44729592)
-
(2006)
Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06
, vol.2006
, pp. 164-174
-
-
Topkara, U.1
Topkara, M.2
Atallah, M.J.3
-
21
-
-
34548289360
-
A method of text watermarking using presuppositions
-
San Jose, CA
-
M. Olga Vybornova and Benoit Macq. 2007. A method of text watermarking using presuppositions. In Proceedings of the SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, volume 6505, San Jose, CA.
-
(2007)
Proceedings of the SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents
, vol.6505
-
-
Olga Vybornova, M.1
Macq, B.2
|