Text Watermarking Algorithm based on Human Visual Redundancy
暂无分享,去创建一个
[1] Ingemar J. Cox,et al. The First 50 Years of Electronic Watermarking , 2002, EURASIP J. Adv. Signal Process..
[2] Sangjin Lee,et al. A Tool for the Detection of Hidden Data in Microsoft Compound Document File Format , 2008, 2008 International Conference on Information Science and Security (ICISS 2008).
[3] Xingming Sun,et al. Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers , 2005, ICNC.
[4] Wen-Hsiang Tsai,et al. A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique , 2007, IEEE Transactions on Information Forensics and Security.
[5] Mikhail J. Atallah,et al. The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions , 2006, MM&Sec '06.
[6] Jungyeop Kim. Robust Vector Digital Watermarking Using Angles and a Random Table , 2010, Adv. Inf. Sci. Serv. Sci..
[7] Neha Agrawal,et al. DCT Domain Message Embedding in Spread-Spectrum Steganography System , 2009, 2009 Data Compression Conference.
[8] Hong Yan,et al. Interword distance changes represented by sine waves for watermarking text images , 2001, IEEE Trans. Circuits Syst. Video Technol..
[9] Sajad Shirali-Shahreza,et al. Real-time and MPEG-1 layer III compression resistant steganography in speech , 2010, IET Inf. Secur..
[10] Mikhail J. Atallah,et al. Information hiding through errors: a confusing approach , 2007, Electronic Imaging.
[11] Xingming Sun,et al. A Novel Watermark Embedding and Detection Scheme Based on Zero- Knowledge Proof , 2011 .
[12] Zhihua Xia,et al. Invertible Transform-Based Reversible Text Watermarking , 2010 .
[13] Steven H. Low,et al. Performance comparison of two text marking methods , 1998, IEEE J. Sel. Areas Commun..
[14] Mohamed F. Younis,et al. Chestega: chess steganography methodology , 2009, Secur. Commun. Networks.
[15] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[16] Bülent Sankur,et al. Natural language watermarking via morphosyntactic alterations , 2009, Comput. Speech Lang..
[17] Sergei Nirenburg,et al. Natural language processing for information assurance and security: an overview and implementations , 2001, NSPW '00.
[18] Steven H. Low,et al. Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.
[19] Claudio Soriente,et al. Taking advantages of a disadvantage: Digital forensics and steganography using document metadata , 2007, J. Syst. Softw..