Syntactic Information Hiding in Plain Text
暂无分享,去创建一个
[1] Geoffrey Sampson,et al. English for the Computer: The SUSANNE Corpus and Analytic Scheme , 1995, Computational Linguistics.
[2] Dan. Collusion-Secure Fingerprinting for Digital Data , 2002 .
[3] Steven Abney,et al. Chunks and Dependencies: Bringing Processing Evidence to Bear on Syntax , 2002 .
[4] Mikhail J. Atallah,et al. Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation , 2001, Information Hiding.
[5] Sergei Nirenburg,et al. Natural language processing for information assurance and security: an overview and implementations , 2001, NSPW '00.
[6] Ivan A. Sag,et al. Syntactic Theory: A Formal Introduction , 1999, Computational Linguistics.
[7] F. Perez-Gonzalez,et al. A tutorial on digital watermarking , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[8] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[9] Martin Hewings,et al. Advanced Grammar in Use : A Self-Study Reference and Practice Book for Advanced Learners of English , 1999 .
[10] Ross Anderson,et al. Information Hiding: an Annotated Bibliography , 1999 .
[11] Sandy Shaw. Overview of Watermarks , Fingerprints , and Digital Signatures , 1999 .
[12] Bernd Girod,et al. Digital watermarking of text, image, and video documents , 1998, Comput. Graph..
[13] Carson T. Schütze. The empirical base of linguistics: Grammaticality judgments and linguistic methodology , 1998 .
[14] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[15] Michael Oakes,et al. Statistics for Corpus Linguistics , 1998 .
[16] Mark Chapman,et al. Hiding the Hidden: A software system for concealing ciphertext as innocuous text , 1997, ICICS.
[17] James Pustejovsky,et al. Lexical Semantics: The Problem of Polysemy , 1997 .
[18] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[19] Susan Hunston,et al. Grammar Patterns 1: Verbs , 1996 .
[20] A. Sorace,et al. MAGNITUDE ESTIMATION OF LINGUISTIC ACCEPTABILITY , 1996 .
[21] V. Raskin,et al. Lexical Semantics of Adjectives A Microtheory of Adjectival Meaning , 1995 .
[22] Ralph Grishman,et al. Comlex Syntax: Building a Computational Lexicon , 1994, COLING.
[23] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[24] M. Ryder. Ordered Chaos: The Interpretation of English Noun-Noun Compounds , 1994 .
[25] Beth Levin,et al. English Verb Classes and Alternations: A Preliminary Investigation , 1993 .
[26] R. L. Trask. A Dictionary of Grammatical Terms in Linguistics , 1993 .
[27] Steven P. Abney,et al. Prosodic Structure, Performance Structure and Phrase Structure , 1992, HLT.
[28] R. Borsley. Syntactic Theory: A Unified Approach , 1991 .
[29] George A. Miller,et al. Introduction to WordNet: An On-line Lexical Database , 1990 .
[30] James D. McCawley,et al. The syntactic phenomena of English , 1988 .
[31] Jan Svartvik,et al. A __ comprehensive grammar of the English language , 1988 .
[32] Bruce L. Liles. A basic grammar of modern English , 1979 .
[33] Tom McArthur. Using Compound Words , 1973 .
[34] R. Quirk,et al. A university grammar of English , 1973 .
[35] D. Langendoen. Essentials of English grammar , 1970 .
[36] Sidney Greenbaum. Studies in English adverbial usage , 1969 .
[37] Alice Morton Ball,et al. The compounding and hyphenation of English words , 1951 .