-
1
-
-
21844458120
-
Towards linguistic steganography: A systematic investigation of approaches, systems, and issues
-
University of Derby, August
-
Bergmair, R. 2004. Towards linguistic steganography: A systematic investigation of approaches, systems, and issues. Tech. rep., University of Derby, August 2004.
-
(2004)
Tech. Rep
, pp. 2004
-
-
Bergmair, R.1
-
4
-
-
84944053897
-
Plausible deniability using automated linguistic stegonagraphy
-
October 1-3 2002, Bristol, UK
-
Chapman, M. and G. Davida. 2002. Plausible deniability using automated linguistic stegonagraphy. Proceedings of the International Conference on Infrastructure Security, October 1-3 2002, Bristol, UK, 276-287.
-
(2002)
Proceedings of the International Conference On Infrastructure Security
, pp. 276-287
-
-
Chapman, M.1
Davida, G.2
-
5
-
-
84947255170
-
A practical and effective approach to large-scale automated linguistic steganography
-
Malaga, Spain
-
Chapman, M. et al., 2001. A practical and effective approach to large-scale automated linguistic steganography. Proceedings of the information security conference (ISC 01), Malaga, Spain, 156-165.
-
(2001)
Proceedings of the Information Security Conference (ISC 01)
, pp. 156-165
-
-
Chapman, M.1
-
6
-
-
49049104223
-
A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words
-
no. 60773032
-
Chen Zhi-li, Huang Liu-sheng, Yu Zhen-shan, Li Ling-jun, and Yang Wei. 2008a. A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words. Third International Conference on Availability Reliability and Security, no. 60773032.
-
(2008)
Third International Conference On Availability Reliability and Security
-
-
Zhi-Li, C.1
Liu-Sheng, H.2
Zhen-Shan, Y.3
Li, L.-J.4
Wei, Y.5
-
7
-
-
52049112347
-
Effective Linguistic Steganography Detection
-
no. 60773032
-
Chen Zhi-li, Huang Liu-sheng, Yu Zhen-shan, Zhao Xin-xin, and Zheng Xue-ling. 2008b. Effective Linguistic Steganography Detection. CIT Workshops Australia, no. 60773032.
-
(2008)
CIT Workshops Australia
-
-
Zhi-Li, C.1
Liu-Sheng, H.2
Zhen-Shan, Y.3
Xin-Xin, Z.4
Xue-Ling, Z.5
-
8
-
-
56749098016
-
Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words
-
Revised Selected Papers: 224
-
Chen, Z., L. Huang, Z. Yu, W. Yang, L. Li, X. Zheng, and X. Zhao. 2008c. Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words. Information Hiding 10th International Workshop 2008, Santa Barbara CA USA May 19-21 2008; Revised Selected Papers: 224.
-
(2008)
Information Hiding 10th International Workshop 2008, Santa Barbara CA USA May 19-21 2008
-
-
Chen, Z.1
Huang, L.2
Yu, Z.3
Yang, W.4
Li, L.5
Zheng, X.6
Zhao, X.7
-
11
-
-
77956001264
-
Notestega: Notes-Based Steganography Methodology
-
A. Desoky, Notestega: Notes-Based Steganography Methodology, Information Security Journal: A Global Perspective, Vol. 18, No 4, pp. 178-193, January 2009.
-
(2009)
Information Security Journal: A Global Perspective
, vol.18
, Issue.4
, pp. 178-193
-
-
Desoky, A.1
-
13
-
-
33746582127
-
-
Technical Report CSD, TR no. 05-009, Purdue University. (CERIAS Tech Report 2005-39)
-
C. Grothoff, et al. 2005. Translation-based steganography, Technical Report CSD, TR no. 05-009, Purdue University. (CERIAS Tech Report 2005-39)
-
(2005)
Translation-based Steganography
-
-
Grothoff, C.1
-
14
-
-
84898233456
-
-
M. Gupta and R. Sharman (Eds.), Handbook of Research on Social and Organizational Liabilities in Information Security, 380-397. New York: IGI Global. doi: 10.4018/978-1-60566-132-2
-
Orgun, C. O. and V. Chand. 2009. The Human Attack in Linguistic Steganography. M. Gupta and R. Sharman (Eds.), Handbook of Research on Social and Organizational Liabilities in Information Security, 380-397. New York: IGI Global. doi: 10.4018/978-1-60566-132-2.
-
(2009)
The Human Attack In Linguistic Steganography
-
-
Orgun, C.O.1
Chand, V.2
-
16
-
-
33645695011
-
Attacks on lexical natural language steganography systems
-
Taskiran, C. M., Topkara, U., Topkara, M. and E. Delp. 2006. Attacks on lexical natural language steganography systems. Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents.
-
(2006)
Proceedings of the SPIE International Conference On Security, Steganography, and Watermarking of Multimedia Contents
-
-
Taskiran, C.M.1
Topkara, U.2
Topkara, M.3
Delp, E.4
-
17
-
-
34548292448
-
Information hiding through errors: A confusing approach
-
Steganography,and Watermarking of Multimedia Contents, January
-
Topkara, Mercan, Umut Topkara and Mikhail J. Atallah. 2007. Information hiding through errors: A confusing approach, Proceedings of the SPIE International Conference on Security, Steganography,and Watermarking of Multimedia Contents, January 2007.
-
(2007)
Proceedings of the SPIE International Conference On Security
, pp. 2007
-
-
Topkara, M.1
Topkara, U.2
Atallah, M.J.3
|