A New Solution for Password Key Transferring in Steganography Methods by CAPTCHA through MMS Technology
暂无分享,去创建一个
[1] J C Judge,et al. Steganography: Past, Present, Future , 2001 .
[2] Mohammad Hassan Shirali-Shahreza,et al. Persian/Arabic Baffletext CAPTCHA , 2006, J. Univers. Comput. Sci..
[3] Giannis F. Marias,et al. Alternatives for Multimedia Messaging System Steganography , 2005, CIS.
[4] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[5] A. M. Turing,et al. Computing Machinery and Intelligence , 1950, The Philosophy of Artificial Intelligence.
[6] Mohammad Shirali Shahreza. An improved method for steganography on mobile phone , 2005 .
[7] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[8] A. M. Turing,et al. Computing Machinery and Intelligence , 1950, The Philosophy of Artificial Intelligence.
[9] K. Tanaka,et al. Embedding secret information into a dithered multi-level image , 1990, IEEE Conference on Military Communications.
[10] M. Masotti,et al. Lightweight steganography on smartphones , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[11] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[12] Sajad Shirali-Shahreza,et al. Collage CAPTCHA , 2007, 2007 9th International Symposium on Signal Processing and Its Applications.
[13] Sajad Shirali-Shahreza,et al. A New Anti-Spam Protocol Using CAPTCHA , 2007, 2007 IEEE International Conference on Networking, Sensing and Control.
[14] Manuel Blum,et al. Toward a theory of steganography , 2004 .
[15] Tsz-Yan Chan,et al. Using a test-to-speech synthesizer to generate a reverse Turing test , 2003, Proceedings. 15th IEEE International Conference on Tools with Artificial Intelligence.
[16] Patrice Y. Simard,et al. Using Machine Learning to Break Visual Human Interaction Proofs (HIPs) , 2004, NIPS.
[17] Kevin Curran,et al. An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.
[18] J. Doug Tygar,et al. Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks , 2005, HIP.
[19] Bernd Girod,et al. Copyright Protection in Video Delivery Networks by Watermarking of Precompressed Video , 1997, ECMAST.
[20] John Langford,et al. Telling humans and computers apart automatically , 2004, CACM.