Natural Language Watermarking and Tamperproofing
暂无分享,去创建一个
Radu Sion | Mikhail J. Atallah | Christian Hempelmann | Umut Topkara | Victor Raskin | Mercan Topkara | Christian F. Hempelmann | Katrina E. Triezenberg | M. Atallah | V. Raskin | R. Sion | Umut Topkara | Mercan Topkara
[1] Kalman Cinkler,et al. Very low bit-rate wavelet video coding , 1998, IEEE J. Sel. Areas Commun..
[2] Sergei Nirenburg,et al. Book Review: Ontological Semantics, by Sergei Nirenburg and Victor Raskin , 2004, CL.
[3] Ross J. Anderson. Stretching the Limits of Steganography , 1996, Information Hiding.
[4] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[5] Martha James Hardman. Appendix I. SAMPLE TEXT , 1966 .
[6] Steven H. Low,et al. Document identification for copyright protection using centroid detection , 1998, IEEE Trans. Commun..
[7] Peter Wayner,et al. Mimic Functions , 1992, Cryptologia.
[8] Sergei Nirenburg,et al. Natural language processing for information assurance and security: an overview and implementations , 2001, NSPW '00.
[9] Mark Chapman,et al. Hiding the Hidden: A software system for concealing ciphertext as innocuous text , 1997, ICICS.
[10] Nicholas F. Maxemchuk,et al. Electronic document distribution , 1994, AT&T Technical Journal.
[11] Peter Wayner. Strong Theoretical Stegnography , 1995, Cryptologia.
[12] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[13] Mikhail J. Atallah,et al. Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation , 2001, Information Hiding.