-
1
-
-
0036488363
-
The first 50 years of electronic watermarking
-
Cox, I.J., Miller, M.L.: The first 50 years of electronic watermarking. J. Appl. Signal Process. 2, 126-132 (2002)
-
(2002)
J. Appl. Signal Process
, vol.2
, pp. 126-132
-
-
Cox, I.J.1
Miller, M.L.2
-
2
-
-
0000772864
-
Document identification for copyright protection using centroid detection
-
Low, S.H., Maxemchuk, N.F., Lapone, A.M.: Document identification for copyright protection using centroid detection. IEEE Trans. Commun. 46(3), 372-383 (1998)
-
(1998)
IEEE Trans. Commun
, vol.46
, Issue.3
, pp. 372-383
-
-
Low, S.H.1
Maxemchuk, N.F.2
Lapone, A.M.3
-
3
-
-
0032637701
-
Copyright protection for the electronic distribution of text documents.
-
Brassil, J.T., Low, S.H., Maxemchuk, N.F.: Copyright protection for the electronic distribution of text documents. Proc. IEEE 87(7), 1181-1196 (1999)
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1181-1196
-
-
Brassil, J.T.1
Low, S.H.2
Maxemchuk, N.F.3
-
4
-
-
84955312809
-
-
Ffencode for DOS (2015). http://www.burks.de/stegano/ffencode.html
-
(2015)
Ffencode for DOS
-
-
-
5
-
-
84955280788
-
-
WbStego4.2 (2015). http://home.tele2.at/wbailer/wbstego/
-
(2015)
-
-
-
6
-
-
84955307243
-
-
Kwan M. Snow (2015). http://www.darkside.com.au/snow/index.html
-
(2015)
-
-
Snow, K.M.1
-
7
-
-
84908337004
-
Text steganography methods and its tools
-
Koluguri, A., Gouse, S., Reddy, P.B.: Text steganography methods and its tools. Int. J. Adv. Sci. Tech. Res. 2(4), 888-902 (2014)
-
(2014)
Int. J. Adv. Sci. Tech. Res
, vol.2
, Issue.4
, pp. 888-902
-
-
Koluguri, A.1
Gouse, S.2
Reddy, P.B.3
-
8
-
-
70249126552
-
A desynchronization resilient watermarking scheme
-
In: Shi, Y.Q. (ed.), Springer, Heidelberg
-
Qi, X., Qi, J.: A desynchronization resilient watermarking scheme. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security IV. LNCS, vol. 5510, pp. 29-48. Springer, Heidelberg (2009)
-
(2009)
Transactions on Data Hiding and Multimedia Security IV. LNCS
, vol.5510
, pp. 29-48
-
-
Qi, X.1
Qi, J.2
-
9
-
-
84910594237
-
Toward robust hidden volumes using write-only oblivious RAM
-
Blass, E.O., Mayberry, T., Noubir, G., Onarlioglu, K.: Toward robust hidden volumes using write-only oblivious RAM. In: Proceedings of the 2014 ACM Conference on Computer and Communications Security (CCS 2014), pp. 203-214 (2014)
-
(2014)
Proceedings of the 2014 ACM Conference on Computer and Communications Security (CCS 2014)
, pp. 203-214
-
-
Blass, E.O.1
Mayberry, T.2
Noubir, G.3
Onarlioglu, K.4
-
10
-
-
85091187696
-
Efficient Private file retrieval by combining ORAM and PIR
-
Mayberry, T., Blass, E.O., Chan, A.H.: Efficient Private file retrieval by combining ORAM and PIR. In: Proceedings of 20th Annual Network & Distributed System Security Symposium (NDSS 2014), pp. 1-11 (2014)
-
(2014)
Proceedings of 20Th Annual Network & Distributed System Security Symposium (NDSS 2014)
, pp. 1-11
-
-
Mayberry, T.1
Blass, E.O.2
Chan, A.H.3
-
11
-
-
84955288160
-
A robust method for integrity protection of digital data in text document watermarking
-
Goyal, L., Raman, M., Diwan, P.: A robust method for integrity protection of digital data in text document watermarking. Int. J. Sci. Res. Dev. 1(6), 14-18 (2014)
-
(2014)
Int. J. Sci. Res. Dev
, vol.1
, Issue.6
, pp. 14-18
-
-
Goyal, L.1
Raman, M.2
Diwan, P.3
-
12
-
-
48349100694
-
A tool for the detection of hidden data in microsoft compound document file format
-
Kwon, H., Kim, Y., Lee, S.: A tool for the detection of hidden data in microsoft compound document file format. In: 2008 International Conference on Information Science and Security, pp. 141-146 (2008)
-
(2008)
2008 International Conference on Information Science and Security
, pp. 141-146
-
-
Kwon, H.1
Kim, Y.2
Lee, S.3
-
13
-
-
3242759877
-
Data hiding in binary images for authentication and annotation
-
Wu, M., Liu, B.: Data hiding in binary images for authentication and annotation. IEEE Trans. Multimedia 6(4), 528-538 (2004)
-
(2004)
IEEE Trans. Multimedia
, vol.6
, Issue.4
, pp. 528-538
-
-
Wu, M.1
Liu, B.2
-
14
-
-
0001320242
-
Embedding robust labels into images for copyright protection
-
Zhao, J., Koch, E.: Embedding robust labels into images for copyright protection. In: Proceedings of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Australia, pp. 242-251 (1995)
-
(1995)
Proceedings of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Australia
, pp. 242-251
-
-
Zhao, J.1
Koch, E.2
-
15
-
-
84955269403
-
Print-scan resilient watermarking for the Chinese text image
-
Xia, Z.H., Wang, S.H., Sun, X.M., Wang, J.: Print-scan resilient watermarking for the Chinese text image. Int. J. Grid Distrib. Comput. 6(6), 51-62 (2013)
-
(2013)
Int. J. Grid Distrib. Comput
, vol.6
, Issue.6
, pp. 51-62
-
-
Xia, Z.H.1
Wang, S.H.2
Sun, X.M.3
Wang, J.4
-
16
-
-
84864831033
-
Print-scan resilient text image watermarking based on stroke direction modulation for Chinese document authentication
-
Tan, L.N., Sun, X.M., Sun, G.: Print-scan resilient text image watermarking based on stroke direction modulation for Chinese document authentication. Radioengineering 21(1), 170-181 (2012)
-
(2012)
Radioengineering
, vol.21
, Issue.1
, pp. 170-181
-
-
Tan, L.N.1
Sun, X.M.2
Sun, G.3
-
17
-
-
84887457020
-
Watermarking in binary document images using fractal codes.
-
Daraee, F., Mozaffari, S.: Watermarking in binary document images using fractal codes. Pattern Recogn. Lett. 35, 120-129 (2014)
-
(2014)
Pattern Recogn. Lett
, vol.35
, pp. 120-129
-
-
Daraee, F.1
Mozaffari, S.2
-
18
-
-
84863627196
-
A compression-based text steganography method
-
Satir, E., Isik, H.: A compression-based text steganography method. J. Syst. Softw. 85(10), 2385-2394 (2012)
-
(2012)
J. Syst. Softw
, vol.85
, Issue.10
, pp. 2385-2394
-
-
Satir, E.1
Isik, H.2
-
20
-
-
33645695011
-
Attacks on lexical natural language steganography systems
-
Taskiran, C.M., Topkara, U., Topkara, M.: Attacks on lexical natural language steganography systems. In: Proceedings of the SPIE, Security, Steganography and Watermarking of Multimedia Contents VIII, San Jose, USA, pp. 97-105 (2006)
-
(2006)
Proceedings of the SPIE, Security, Steganography and Watermarking of Multimedia Contents VIII, San Jose, USA
, pp. 97-105
-
-
Taskiran, C.M.1
Topkara, U.2
Topkara, M.3
-
21
-
-
77950888285
-
Attacks on translation based steganography
-
Meng, P., Huang, L.S, Yang, W.: Attacks on translation based steganography. In: 2009 IEEE Youth Conference on Information, Computing and Telecommunication, Beijing, China, pp. 227-230 (2009)
-
(2009)
2009 IEEE Youth Conference on Information, Computing and Telecommunication, Beijing, China
, pp. 227-230
-
-
Meng, P.1
Huang, L.S.2
Yang, W.3
-
23
-
-
84880909876
-
Implementation of text watermarking technique using natural language
-
Mali, M.L., Patil, N.N., Patil, J.B.: Implementation of text watermarking technique using natural language. In: IEEE International Conference on Communication Systems and Network Technologies, pp. 482-486 (2013)
-
(2013)
IEEE International Conference on Communication Systems and Network Technologies
, pp. 482-486
-
-
Mali, M.L.1
Patil, N.N.2
Patil, J.B.3
-
24
-
-
29144483633
-
Design and implementation of content-based English text watermarking algorithm.
-
Xiangrong, X., Xingming, S.: Design and implementation of content-based English text watermarking algorithm. Comput. Eng. 31(22), 29-31 (2005)
-
(2005)
Comput. Eng
, vol.31
, Issue.22
, pp. 29-31
-
-
Xiangrong, X.1
Xingming, S.2
-
25
-
-
34548292448
-
Information hiding through errors: A confusing approach
-
Topkara, M., Topkara, U., Atallah, M.J.: Information hiding through errors: a confusing approach. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, San Jose, 6505 V (2007)
-
(2007)
Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, San Jose
, pp. 6505
-
-
Topkara, M.1
Topkara, U.2
Atallah, M.J.3
-
27
-
-
47349085616
-
Natural language watermarking via morphosyntactic alterations.
-
Meral, H.M., Sankur, B., Ozsoy, A.S.: Natural language watermarking via morphosyntactic alterations. Comput. Speech Lang. 23(1), 107-125 (2009)
-
(2009)
Comput. Speech Lang
, vol.23
, Issue.1
, pp. 107-125
-
-
Meral, H.M.1
Sankur, B.2
Ozsoy, A.S.3
-
28
-
-
26844515317
-
A natural language watermarking based on chinese syntax
-
In: Wang, L., Chen, K., Ong, Y.S. (eds.), Springer, Heidelberg
-
Liu, Y., Sun, X., Wu, Y.: A natural language watermarking based on chinese syntax. In: Wang, L., Chen, K., Ong, Y.S. (eds.) ICNC 2005. LNCS, vol. 3612, pp. 958-961. Springer, Heidelberg (2005)
-
(2005)
ICNC 2005. LNCS
, vol.3612
, pp. 958-961
-
-
Liu, Y.1
Sun, X.2
Wu, Y.3
-
29
-
-
78649842872
-
Natural language watermarking based on syntactic displacement and morphological division
-
Kim, M.Y., Zaiane, O.R., Goebel, R.: Natural language watermarking based on syntactic displacement and morphological division. In: 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, Seoul, Korea, pp. 164-169 (2010)
-
(2010)
2010 IEEE 34Th Annual Computer Software and Applications Conference Workshops, Seoul, Korea
, pp. 164-169
-
-
Kim, M.Y.1
Zaiane, O.R.2
Goebel, R.3
-
30
-
-
34547786152
-
Watermarking text documents based on entropy of part of speech string
-
Dai, Z.X., Hong, F.: Watermarking text documents based on entropy of part of speech string. J. Inf. Comput. Sci. 4(1), 21-25 (2007)
-
(2007)
J. Inf. Comput. Sci
, vol.4
, Issue.1
, pp. 21-25
-
-
Dai, Z.X.1
Hong, F.2
-
31
-
-
55949098441
-
Steganalysis on synonym substitution steganography
-
Gang, L., Xingming, S., Lingyun, X., Yuling, L., Can, G.: Steganalysis on synonym substitution steganography. J. Comput. Res. Dev. 45(10), 1696-1703 (2008)
-
(2008)
J. Comput. Res. Dev
, vol.45
, Issue.10
, pp. 1696-1703
-
-
Gang, L.1
Xingming, S.2
Lingyun, X.3
Yuling, L.4
Can, G.5
-
32
-
-
77956390388
-
Analysis and detection of translation based steganography
-
Peng, M., Liu-sheng, H., Zhi-li, C., Wei, Y., Ming, Y.: Analysis and detection of translation based steganography. ACTA Electronica Sinica 38(8), 1748-1752 (2010)
-
(2010)
ACTA Electronica Sinica
, vol.38
, Issue.8
, pp. 1748-1752
-
-
Peng, M.1
Liu-Sheng, H.2
Zhi-Li, C.3
Wei, Y.4
Ming, Y.5
-
33
-
-
0036757909
-
Mathematical representation of a chinese character and its applications
-
Sun, X.M., Chen, H.W., Yang, L.H., Tang, Y.Y.: Mathematical representation of a chinese character and its applications. Int. J. Pattern Recogn. Artif. Intell. 16(8), 735-747 (2002)
-
(2002)
Int. J. Pattern Recogn. Artif. Intell
, vol.16
, Issue.8
, pp. 735-747
-
-
Sun, X.M.1
Chen, H.W.2
Yang, L.H.3
Tang, Y.Y.4
-
34
-
-
84962448916
-
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
-
Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 99 (2015). doi: 10.1109/TPDS.2015.2401003
-
(2015)
IEEE Trans. Parallel Distrib. Syst
, pp. 99
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
35
-
-
84922280033
-
Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing.
-
Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98, 190-200 (2015)
-
(2015)
IEICE Trans. Commun
, vol.98
, pp. 190-200
-
-
Fu, Z.1
Sun, X.2
Liu, Q.3
Zhou, L.4
Shu, J.5
|