-
1
-
-
84957873374
-
The steganographic file system
-
Springer
-
Anderson, R.J., Needham, R. and Shamir, A. (1998) 'The steganographic file system', Proceedings of the 2nd International Workshop on Information Hiding, Vol. 1525 of Lecture Notes in Computer Science, Springer, pp.73-82.
-
(1998)
Proceedings of the 2nd International Workshop on Information Hiding, Vol. 1525 of Lecture Notes in Computer Science
, pp. 73-82
-
-
Anderson, R.J.1
Needham, R.2
Shamir, A.3
-
2
-
-
4544331263
-
Data-hiding in audio using frequency-selective phase alteration
-
17-21 May
-
Ansari, R., Malik, H. and Khokhar, A. (2004) 'Data-hiding in audio using frequency-selective phase alteration', Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '04), Vol. 5, 17-21 May, pp.389-392.
-
(2004)
Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '04)
, vol.5
, pp. 389-392
-
-
Ansari, R.1
Malik, H.2
Khokhar, A.3
-
3
-
-
77953750858
-
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
-
Information Hiding
-
Atallah, M.J. et al. (2001) 'Natural language watermarking: design, analysis, and a proof-of-concept implementation', Proceedings of the 4th International Workshop on Information Hiding, Lecture Notes in Computer Science, Vol. 2137, April, pp.185-199. (Pubitemid 33367667)
-
(2001)
Lecture Notes in Computer Science
, Issue.2137
, pp. 185-199
-
-
Atallah, M.J.1
Raskin, V.2
Crogan, M.3
Hempelmann, C.4
Kerschbaum, F.5
Mohamed, D.6
Naik, S.7
-
4
-
-
35248834521
-
Natural language watermarking and tamperproofing
-
Lecture Notes in Computer Science October
-
Atallah, M.J. et al. (2002) 'Natural language watermarking and tamperproofing', Proceedings of the 5th International Workshop on Information Hiding, Lecture Notes in Computer Science, Vol. 2578, October, pp.196-212.
-
(2002)
Proceedings of the 5th International Workshop on Information Hiding
, vol.2578
, pp. 196-212
-
-
Atallah, M.J.1
-
5
-
-
0030384775
-
Techniques for data hiding
-
Bender, W. et al. (1996) 'Techniques for data hiding', IBM Systems J., Vol. 35, Nos. 3-4, pp.313-336.
-
(1996)
IBM Systems J.
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
-
6
-
-
33947624454
-
Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text
-
Bennett, K. (2004) Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text, Technical Report CERIAS Tech. Report 2004-13, Purdue University.
-
(2004)
Technical Report CERIAS Tech. Report 2004-13, Purdue University
-
-
Bennett, K.1
-
7
-
-
84857171129
-
Towards linguistic steganography: A systematic investigation of approaches, systems, and issues
-
Austria, April 2004 Accessed on 18 September, 2008
-
Bergmair, R. (2008) Towards Linguistic Steganography: A Systematic Investigation of Approaches, Systems, and Issues, Technical Report, The University of Derby, Austria, April 2004. Available: http://richard.bergmair.eu/ pub/towlingsteg-rep-inoff-b5.pdf, Accessed on 18 September, 2008.
-
(2008)
Technical Report, the University of Derby
-
-
Bergmair, R.1
-
8
-
-
35048894030
-
Towards human interactive proofs in the text-domain
-
September
-
Bergmair, R. and Katzenbeisser, S. (2004) 'Towards human interactive proofs in the text-domain', Proceedings of the 7th Information Security Conference (ISC'04), Lecture Notes in Computer Science, Vol. 3225, September, pp.257-267.
-
(2004)
Proceedings of the 7th Information Security Conference (ISC'04), Lecture Notes in Computer Science
, vol.3225
, pp. 257-267
-
-
Bergmair, R.1
Katzenbeisser, S.2
-
9
-
-
38049146625
-
Content-aware steganography: About lazy prisoners and narrow-minded wardens
-
Lecture Notes in Computer Science September
-
Bergmair, R. and Katzenbeisser, S. (2007) 'Content-aware steganography: about lazy prisoners and narrow-minded wardens', Proceedings of the 8th Information Hiding Workshop, Lecture Notes in Computer Science, Vol. 4437, September, pp.109-123.
-
(2007)
Proceedings of the 8th Information Hiding Workshop
, vol.4437
, pp. 109-123
-
-
Bergmair, R.1
Katzenbeisser, S.2
-
11
-
-
34548233203
-
Synonymous paraphrasing using wordnet and internet
-
Lecture Notes in Computer Science June
-
Bolshakov, I.A. and Gelbukh, A. (2004) 'Synonymous paraphrasing using wordnet and internet', Proceedings of the Natural 9th International Conference on Applications of Natural Language to Information Systems, Lecture Notes in Computer Science, Vol. 3136, June, pp.312-323.
-
(2004)
Proceedings of the Natural 9th International Conference on Applications of Natural Language to Information Systems
, vol.3136
, pp. 312-323
-
-
Bolshakov, I.A.1
Gelbukh, A.2
-
12
-
-
34548242205
-
Using selectional preferences for extending a synonymous paraphrasing method in steganography
-
Sossa Azuela, J.H. (Ed.) October
-
Calvo, H. and Bolshakov, I.A. (2004) 'Using selectional preferences for extending a synonymous paraphrasing method in steganography', in Sossa Azuela, J.H. (Ed.): Avances en Ciencias de la Computacion e Ingenieria de Computo - CIC'2004: XIII Congreso Internacional de Computacion, October, pp.231-242.
-
(2004)
Avances en Ciencias de la Computacion e Ingenieria de Computo - Cic'2004: Xiii Congreso Internacional de Computacion
, pp. 231-242
-
-
Calvo, H.1
Bolshakov, I.A.2
-
14
-
-
0005013984
-
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
-
Chapman, M. and Davida, G. (1997) 'Hiding the hidden: a software system for concealing ciphertext as innocuous text', Proceedings of the International Conference on Information and Communications Security, Vol. 1334 of Lecture Notes in Computer Science, Springer, Beijing, PR China, November, pp.335-345. (Pubitemid 127148061)
-
(1997)
Lecture Notes in Computer Science
, Issue.1334
, pp. 335-345
-
-
Chapman, M.1
Davida, D.2
-
15
-
-
84944053897
-
Plausible deniability using automated linguistic steganography
-
Lecture Notes in Computer Science, Springer
-
Chapman, M. and Davida, G.I. (2002) 'Plausible deniability using automated linguistic steganography', Proceedings of the International Conference on Infrastructure Security (InfraSec'02), Lecture Notes in Computer Science, Springer, Vol. 2437, pp.276-287.
-
(2002)
Proceedings of the International Conference on Infrastructure Security (InfraSec'02)
, vol.2437
, pp. 276-287
-
-
Chapman, M.1
Davida, G.I.2
-
16
-
-
84947255170
-
A practical and effective approach to large-scale automated linguistic steganography
-
Chapman, M. et al. (2001) 'A practical and effective approach to large-scale automated linguistic steganography', Proceedings of the Information Security Conference (ISC '01), Vol. 2200 of Lecture Notes in Computer Science, Springer, Malaga, Spain, pp.156-165. (Pubitemid 33354304)
-
(2001)
Lecture Notes in Computer Science
, Issue.2200
, pp. 156-165
-
-
Chapman, M.1
Davida, G.I.2
Rennhard, M.3
-
17
-
-
7644240420
-
Reduced distortion bit-modification for LSB audio steganography '04
-
August, Beijing, China
-
Cvejic, N. and Seppanen, T. (2004) 'Reduced distortion bit-modification for LSB audio steganography '04', Proceedings of the 7th International Conference on Signal Processing (ICSP 04), Vol. 3, August, Beijing, China, pp.2318-2321.
-
(2004)
Proceedings of the 7th International Conference on Signal Processing (ICSP 04)
, vol.3
, pp. 2318-2321
-
-
Cvejic, N.1
Seppanen, T.2
-
19
-
-
57849094995
-
Nostega: A novel noiseless steganography paradigm
-
March
-
Desoky, A. (2008) 'Nostega: a novel noiseless steganography paradigm', Journal of Digital Forensic Practice, Vol. 2, No. 3, March, pp.132-139.
-
(2008)
Journal of Digital Forensic Practice
, vol.2
, Issue.3
, pp. 132-139
-
-
Desoky, A.1
-
20
-
-
77955994156
-
-
PhD Dissertation, University of Maryland, Baltimore County, USA, May
-
Desoky, A. (2009a) Nostega: A Novel Noiseless Steganography Paradigm, PhD Dissertation, University of Maryland, Baltimore County, USA, May.
-
(2009)
Nostega: A Novel Noiseless Steganography Paradigm
-
-
Desoky, A.1
-
21
-
-
68449089444
-
Listega: List-based steganography methodology
-
Springer-Verlag, April
-
Desoky, A. (2009b) 'Listega: list-based steganography methodology', International Journal of Information Security, Springer-Verlag, April.
-
(2009)
International Journal of Information Security
-
-
Desoky, A.1
-
22
-
-
77956001264
-
Notestega: Notes-based steganography methodology
-
January
-
Desoky, A. (2009c) 'Notestega: notes-based steganography methodology', Information Security Journal: A Global Perspective, Vol. 18, No. 4, January, pp.178-193.
-
(2009)
Information Security Journal: A Global Perspective
, vol.18
, Issue.4
, pp. 178-193
-
-
Desoky, A.1
-
23
-
-
77956000525
-
NORMALS: Normal linguistic steganography methodology
-
July
-
Desoky, A. (2010a) 'NORMALS: normal linguistic steganography methodology', Journal of Information Hiding and Multimedia Signal Processing, Vol. 1, No. 3, July, pp.145-171.
-
(2010)
Journal of Information Hiding and Multimedia Signal Processing
, vol.1
, Issue.3
, pp. 145-171
-
-
Desoky, A.1
-
24
-
-
77955996737
-
Comprehensive linguistic steganography survey
-
Desoky, A. (2010b) 'Comprehensive linguistic steganography survey', Int. J. Information and Computer Security, Vol. 4, No. 2.
-
(2010)
Int. J. Information and Computer Security
, vol.4
, Issue.2
-
-
Desoky, A.1
-
25
-
-
79955787308
-
Matlist: Mature linguistic steganography methodology
-
June
-
Desoky, A. (2011) 'Matlist: mature linguistic steganography methodology', Security and Communication Networks, Vol. 4, No. 6, June, pp.697-718.
-
(2011)
Security and Communication Networks
, vol.4
, Issue.6
, pp. 697-718
-
-
Desoky, A.1
-
26
-
-
77955999670
-
-
Information Security Publisher/Taylor & Francis ISBN: 1439846219/ ISBN: 9781439846216 (In Process)
-
Desoky, A. (2012) Noiseless Steganography: The Key to Covert Communications, Information Security Publisher/Taylor & Francis ISBN: 1439846219/ ISBN: 9781439846216 (In Process).
-
(2012)
Noiseless Steganography: The Key to Covert Communications
-
-
Desoky, A.1
-
27
-
-
40749156338
-
Graphstega: Graph steganography methodology
-
January
-
Desoky, A. and Younis, M. (2008) 'Graphstega: graph steganography methodology', Journal of Digital Forensic Practice, Vol. 2, No. 1, January, pp.27-36.
-
(2008)
Journal of Digital Forensic Practice
, vol.2
, Issue.1
, pp. 27-36
-
-
Desoky, A.1
Younis, M.2
-
29
-
-
84857175482
-
Free from the cover text: A human-generated natural language approach to text-based steganography
-
April
-
Grosvald, M. and Orhan Orgun, C. (2011) 'Free from the cover text: a human-generated natural language approach to text-based steganography', Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 2, April, pp.133-141.
-
(2011)
Journal of Information Hiding and Multimedia Signal Processing
, vol.2
, Issue.2
, pp. 133-141
-
-
Grosvald, M.1
Orhan Orgun, C.2
-
30
-
-
33750898917
-
Translation-based steganography
-
Springer-Verlag, Barcelona, Spain, June
-
Grothoff C. et al. (2005b) 'Translation-based steganography', Proceedings of Information Hiding Workshop (IH 2005), Springer-Verlag, Barcelona, Spain, June, pp.213-233.
-
(2005)
Proceedings of Information Hiding Workshop (IH 2005)
, pp. 213-233
-
-
Grothoff, C.1
-
32
-
-
84955119830
-
Echo hiding
-
Information Hiding
-
Gruhl, D., Lu, A. and Bender, W. (1996) 'Echo hiding', Proceedings of First International Workshop on Information Hiding, Lecture Notes in Computer Science, Vol. 1174, May, Springer, Cambridge, UK, pp.295-316. (Pubitemid 126155043)
-
(1996)
Lecture Notes in Computer Science
, Issue.1174
, pp. 295-316
-
-
Gruhl, D.1
Lu, A.2
Bender, W.3
-
33
-
-
33746069919
-
Data hiding in the OSI network model
-
Springer
-
Handel, T.G. and Sandford, M.T. (1996) 'Data hiding in the OSI network model', Proceedings of First International Workshop on Information Hiding, Vol. 1174 of Lecture Notes in Computer Science, Springer, pp.23-38.
-
(1996)
Proceedings of First International Workshop on Information Hiding, Vol. 1174 of Lecture Notes in Computer Science
, pp. 23-38
-
-
Handel, T.G.1
Sandford, M.T.2
-
34
-
-
0043244044
-
A bank of chemistry questions on an on-line server
-
March
-
Hoole, D. et al. (2002) 'A bank of chemistry questions on an on-line server', Journal of Science Education and Technology, Vol. 11, No. 1, March, pp.9-13.
-
(2002)
Journal of Science Education and Technology
, vol.11
, Issue.1
, pp. 9-13
-
-
Hoole, D.1
-
36
-
-
33847675252
-
An overview of steganography for the computer forensics examiner
-
July
-
Kessler, G.C. (2004) 'An overview of steganography for the computer forensics examiner', Forensic Science Communications, Vol. 6, No. 3, July.
-
(2004)
Forensic Science Communications
, vol.6
, Issue.3
-
-
Kessler, G.C.1
-
37
-
-
0035791290
-
Spread-spectrum audio watermarking: Requirements, applications, and limitations
-
October, Cannes, France
-
Kirovski, D. and Malvar, H. (2001) 'Spread-spectrum audio watermarking: requirements, applications, and limitations', Proceedings of the 4th IEEE Workshop on Multimedia Signal Processing, October, Cannes, France, pp.219-224.
-
(2001)
Proceedings of the 4th IEEE Workshop on Multimedia Signal Processing
, pp. 219-224
-
-
Kirovski, D.1
Malvar, H.2
-
39
-
-
0348015658
-
The kullback-leibler distance
-
Kullback, S. (1987) 'The Kullback-Leibler distance', The American Statistician, Vol. 41, pp.340-341.
-
(1987)
The American Statistician
, vol.41
, pp. 340-341
-
-
Kullback, S.1
-
40
-
-
0001927585
-
On information and sufficiency
-
doi:10.1214/aoms/1177729694. MR39968
-
Kullback, S. and Leibler, R.A. (1951) 'On information and sufficiency', The Annals of Mathematical Statistics, Vol. 22, No. 1, pp.79-86, doi:10.1214/aoms/1177729694. MR39968.
-
(1951)
The Annals of Mathematical Statistics
, vol.22
, Issue.1
, pp. 79-86
-
-
Kullback, S.1
Leibler, R.A.2
-
41
-
-
0026953429
-
Random texts exhibit Zipf's-law-like word frequency distribution
-
DOI 10.1109/18.165464
-
Li, W. (1992) 'Random texts exhibit Zipf's-law-like word frequency distribution', IEEE Transactions on Information Theory, Vol. 38, No. 6, pp.1842-1845. (Pubitemid 23585898)
-
(1992)
IEEE Transactions on Information Theory
, vol.38
, Issue.6
, pp. 1842-1845
-
-
Li Wentian1
-
42
-
-
28944432343
-
Is image steganography natural?
-
December
-
Martin, A., Sapiro, G. and Seroussi, G. (2005) 'Is image steganography natural?', IEEE Transactions on Image Processing, Vol. 14, No. 12, December, pp.2040-2050.
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.12
, pp. 2040-2050
-
-
Martin, A.1
Sapiro, G.2
Seroussi, G.3
-
43
-
-
34548241754
-
The syntax of concealment: Reliable methods for plain text information hiding
-
January
-
Murphy, B. and Vogel, C. (2007) 'The syntax of concealment: reliable methods for plain text information hiding', Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, January.
-
(2007)
Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents
-
-
Murphy, B.1
Vogel, C.2
-
44
-
-
38049156072
-
Text information hiding with preserved meaning - Japanese text case
-
Nakagawa, H. et al. (2001) 'Text information hiding with preserved meaning - Japanese text case', Transaction of Information Processing Society of Japan, Vol. 42, No. 9, pp.2339-2350.
-
(2001)
Transaction of Information Processing Society of Japan
, vol.42
, Issue.9
, pp. 2339-2350
-
-
Nakagawa, H.1
-
45
-
-
34548235364
-
A framework of text-based steganography using sd-form semantics model
-
August
-
Niimi, M. et al. (2003) 'A framework of text-based steganography using sd-form semantics model', Transaction of Information Processing Society of Japan, Vol. 44, No. 8, August.
-
(2003)
Transaction of Information Processing Society of Japan
, vol.44
, Issue.8
-
-
Niimi, M.1
-
46
-
-
0032680807
-
Information hiding - A survey
-
July
-
Petitcolas, F.A.P. (1999) 'Information hiding - a survey', Proceedings of the IEEE, Vol. 87, No. 7, July, pp.1062-1078.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
-
48
-
-
33947672376
-
A new approach to Persian/Arabic text steganography
-
DOI 10.1109/ICIS-COMSAR.2006.10, 1652009, Proceedings - 5th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2006. In conjunction with 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, S
-
Shirali-Shahreza, M.H. and Shirali-Shahreza, M. (2006) 'A new approach to persian/arabic text steganography', Proceedings of 5th IEEE/ACIS International Conference on Computer and Information Science (ICIS-COMSAR 2006), 10-12, July, Honolulu, Hawaii, pp.310-315 (Pubitemid 46501449)
-
(2006)
Proceedings - 5th IEEE/ACIS Int. Conf. on Comput. and Info. Sci., ICIS 2006. In conjunction with 1st IEEE/ACIS, Int. Workshop Component-Based Software Eng., Softw. Archi. and Reuse, COMSAR 2006
, vol.2006
, pp. 310-315
-
-
Shirali-Shahreza, M.H.1
Shirali-Shahreza, M.2
-
49
-
-
78649828992
-
Provably secure steganography: Achieving zero K-L divergence using statistical restoration
-
October, Atlanta, Georgia, USA
-
Solanki, K., Sullivan, K., Madhow, U., Manjunath, B.S. and Chandrasekaran, S. (2006) 'Provably secure steganography: Achieving zero K-L divergence using statistical restoration', Proceedings of ICIP, October, Atlanta, Georgia, USA.
-
(2006)
Proceedings of ICIP
-
-
Solanki, K.1
Sullivan, K.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
51
-
-
34548292448
-
Information hiding through errors: A confusing approach
-
January
-
Topkara, M., Topkara, U. and Atallah, M.J. (2007) 'Information hiding through errors: a confusing approach', Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, January.
-
(2007)
Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents
-
-
Topkara, M.1
Topkara, U.2
Atallah, M.J.3
-
52
-
-
33750907773
-
The hiding virtues of ambiguity: Quantifiably resilient watermarking of natural language text through synonym substitutions
-
Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06
-
Topkara, U., Topkara, M. and Atallah, M.J. (2006) 'The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions', Proceeding of the 8th workshop on Multimedia and security (MM&Sec '06), pp.164-174. (Pubitemid 44729592)
-
(2006)
Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06
, vol.2006
, pp. 164-174
-
-
Topkara, U.1
Topkara, M.2
Atallah, M.J.3
-
53
-
-
84950895792
-
Mimic functions
-
Wayner, P. (1992) 'Mimic functions', Cryptologia, Vol. XVI/3, pp.193-214.
-
(1992)
Cryptologia
, vol.16
, Issue.3
, pp. 193-214
-
-
Wayner, P.1
-
55
-
-
33750902164
-
-
Secondary education at the Illinois Mathematics and Science Academy, January Accessed on 15 April, 2008
-
Winstein, K. (1999) Lexical Steganography Through Adaptive Modulation of the Word Choice Hash, Secondary education at the Illinois Mathematics and Science Academy, January, Available: http://alumni.imsa.edu/~keithw/tlex/lsteg. ps, Accessed on 15 April, 2008.
-
(1999)
Lexical Steganography Through Adaptive Modulation of the Word Choice Hash
-
-
Winstein, K.1
-
56
-
-
38049119925
-
-
Accessed on 03 August, 2008
-
Winstein, K. (2008) Lexical Steganography, Available: http://alumni.imsa.edu/~keithw/tlex, Accessed on 03 August, 2008.
-
(2008)
Lexical Steganography
-
-
Winstein, K.1
-
58
-
-
84857174674
-
-
Accessed on 31 July, 2008
-
An Online Exam Generator (GRE Antonyms), Available: http://www.syvum.com/ cgi/online/serve.cgi/gre/verbal/antonyms7.tdf?0, Accessed on 31 July, 2008.
-
An Online Exam Generator (GRE Antonyms)
-
-
-
63
-
-
77952360033
-
-
Cambridge University Press Accessed on 31 July, 2008
-
Cambridge Dictionaries Online - Cambridge University Press, Available: www.dictionary.cambridge.org, Accessed on 31 July, 2008.
-
Cambridge Dictionaries Online
-
-
-
65
-
-
84857171134
-
-
Accessed on 27 July, 2008
-
Exam Pro Software, Available: http://www.exam-software.com, Accessed on 27 July, 2008.
-
Exam pro Software
-
-
-
66
-
-
84857185017
-
-
Accessed on 30 July, 2008
-
GRE Analogies, Available: http://greanalogies.blogspot.com/2008/04/ analogies-91-95.html, Accessed on 30 July, 2008.
-
-
-
-
67
-
-
84857186780
-
-
Accessed on 31 July, 2008
-
GRE Sentence Completions, Available: http://www.greguide.com/verbal.html, Accessed on 31 July, 2008.
-
GRE Sentence Completions
-
-
-
68
-
-
67649519841
-
-
Accessed on 31 July, 2008
-
Microsoft Word 97, Available: http://www.microsoft.com/en/us/default. aspx, Accessed on 31 July, 2008.
-
Microsoft Word 97
-
-
-
69
-
-
84857171133
-
-
Accessed on 31 July, 2008
-
Online Dictionary Net, Available: www.online-dictionary.net, Accessed on 31 July, 2008.
-
Online Dictionary Net
-
-
-
71
-
-
84857174675
-
-
Accessed on 31 July, 2007
-
Spam Mimic, Available: http://www.spammimic.com, Accessed on 31 July, 2007.
-
-
-
-
72
-
-
84857174676
-
-
Accessed on 27 July, 2008
-
Testgenerator, Available: http://www.testshop.com/content.php?id=63, Accessed on 27 July, 2008.
-
-
-
-
73
-
-
84857186783
-
-
Accessed on 27 July 2008
-
TV show Who Wants to Be a Millionaire, Available: http://en.wikipedia. org/wiki/Who-Wants-To-Be-A-Millionaire%3F, Accessed on 27 July 2008.
-
TV Show Who Wants to be a Millionaire
-
-
-
74
-
-
3042637631
-
Increasing robustness of LSB audio steganography using a novel embedding method
-
Las Vegas, April, Nevada
-
Cvejic, N. and Seppanen, T. (2004) 'Increasing robustness of LSB audio steganography using a novel embedding method', Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), Las Vegas, April, Nevada.
-
(2004)
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04)
-
-
Cvejic, N.1
Seppanen, T.2
-
75
-
-
0003919724
-
-
Elsevier Science Publishing Company Inc., North-Holland, Amsterdam, January
-
Dénes, J. and Keedwell, A.D. (1991) Latin Squares (Annals of Discrete Mathematics), Vol. 46, Elsevier Science Publishing Company Inc., North-Holland, Amsterdam, January.
-
(1991)
Latin Squares (Annals of Discrete Mathematics)
, vol.46
-
-
Dénes, J.1
Keedwell, A.D.2
-
76
-
-
0003727566
-
-
1st ed., Wiley-Interscience, 3 September, 1998
-
Laywine, C.F. and Mullen, G.L. (1998) Discrete Mathematics Using Latin Squares, 1st ed., Wiley-Interscience, 3 September, 1998.
-
(1998)
Discrete Mathematics Using Latin Squares
-
-
Laywine, C.F.1
Mullen, G.L.2
-
77
-
-
79960738044
-
A survey on image steganography and steganalysis
-
April
-
Li, B., He, J., Huang, J. and Shi, Y.Q. (2011) 'A survey on image steganography and steganalysis', Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 2, April, pp.142-172.
-
(2011)
Journal of Information Hiding and Multimedia Signal Processing
, vol.2
, Issue.2
, pp. 142-172
-
-
Li, B.1
He, J.2
Huang, J.3
Shi, Y.Q.4
|