Text steganography through Indian languages using feature coding method
暂无分享,去创建一个
[1] Krista Bennett,et al. LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .
[2] Hong Yan,et al. Interword distance changes represented by sine waves for watermarking text images , 2001, IEEE Trans. Circuits Syst. Video Technol..
[3] Mohammad Hassan Shirali-Shahreza,et al. A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).
[4] Kyung-Ae Moon,et al. A text watermarking algorithm based on word classification and inter-word space statistics , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..
[5] Jean-Luc Dugelay,et al. A guide tour of video watermarking , 2003, Signal Process. Image Commun..
[6] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[7] Merrill Warkentin,et al. Steganography and Steganalysis , 2006 .
[8] Narayan C. Debnath,et al. A New Approach to Hindi Text Steganography by Shifting Matra , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.
[9] Zhili Chen,et al. Linguistic Steganography Detection Based on Perplexity , 2008, 2008 International Conference on MultiMedia and Information Technology.
[10] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[11] Peter Wayner,et al. Mimic Functions , 1992, Cryptologia.
[12] Ajay Jadhav,et al. Steganography An Art of Hiding Data , 2009, ArXiv.
[13] Jean-Luc Dugelay,et al. Security pitfalls of frame-by-frame approaches to video watermarking , 2004, IEEE Transactions on Signal Processing.
[14] Adnan M. Alattar,et al. Watermarking electronic text documents containing justified paragraphs and irregular line spacing , 2004, IS&T/SPIE Electronic Imaging.
[15] J. Krenn,et al. Steganography and Steganalysis , 2006 .
[16] Kaliappan Gopalan. Audio steganography using bit modification , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[17] Narayan C. Debnath,et al. New Techniques and Algorithms for Text Steganography through Hindi Text , 2009, SEDE.
[18] Narayan C. Debnath,et al. A new approach for steganography in Bengali text , 2009, J. Comput. Methods Sci. Eng..
[19] Lawrence O'Gorman,et al. Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.
[20] Tung-Shou Chen,et al. A new data hiding method in binary image , 2003, Fifth International Symposium on Multimedia Software Engineering, 2003. Proceedings..
[21] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[22] Mark Chapman,et al. Hiding the Hidden: A software system for concealing ciphertext as innocuous text , 1997, ICICS.
[23] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[24] Narayan C. Debnath,et al. An Approach to Bengali Text Steganography , 2008, SEDE.
[25] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).