Syntactic Information Hiding in Plain Text

[1]  Geoffrey Sampson,et al.  English for the Computer: The SUSANNE Corpus and Analytic Scheme , 1995, Computational Linguistics.

[2]  Dan Collusion-Secure Fingerprinting for Digital Data , 2002 .

[3]  Steven Abney,et al.  Chunks and Dependencies: Bringing Processing Evidence to Bear on Syntax , 2002 .

[4]  Mikhail J. Atallah,et al.  Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation , 2001, Information Hiding.

[5]  Sergei Nirenburg,et al.  Natural language processing for information assurance and security: an overview and implementations , 2001, NSPW '00.

[6]  Ivan A. Sag,et al.  Syntactic Theory: A Formal Introduction , 1999, Computational Linguistics.

[7]  F. Perez-Gonzalez,et al.  A tutorial on digital watermarking , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[8]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[9]  Martin Hewings,et al.  Advanced Grammar in Use : A Self-Study Reference and Practice Book for Advanced Learners of English , 1999 .

[10]  Ross Anderson,et al.  Information Hiding: an Annotated Bibliography , 1999 .

[11]  Sandy Shaw Overview of Watermarks , Fingerprints , and Digital Signatures , 1999 .

[12]  Bernd Girod,et al.  Digital watermarking of text, image, and video documents , 1998, Comput. Graph..

[13]  Carson T. Schütze The empirical base of linguistics: Grammaticality judgments and linguistic methodology , 1998 .

[14]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[15]  Michael Oakes,et al.  Statistics for Corpus Linguistics , 1998 .

[16]  Mark Chapman,et al.  Hiding the Hidden: A software system for concealing ciphertext as innocuous text , 1997, ICICS.

[17]  James Pustejovsky,et al.  Lexical Semantics: The Problem of Polysemy , 1997 .

[18]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[19]  Susan Hunston,et al.  Grammar Patterns 1: Verbs , 1996 .

[20]  A. Sorace,et al.  MAGNITUDE ESTIMATION OF LINGUISTIC ACCEPTABILITY , 1996 .

[21]  V. Raskin,et al.  Lexical Semantics of Adjectives A Microtheory of Adjectival Meaning , 1995 .

[22]  Ralph Grishman,et al.  Comlex Syntax: Building a Computational Lexicon , 1994, COLING.

[23]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[24]  M. Ryder Ordered Chaos: The Interpretation of English Noun-Noun Compounds , 1994 .

[25]  Beth Levin,et al.  English Verb Classes and Alternations: A Preliminary Investigation , 1993 .

[26]  R. L. Trask A Dictionary of Grammatical Terms in Linguistics , 1993 .

[27]  Steven P. Abney,et al.  Prosodic Structure, Performance Structure and Phrase Structure , 1992, HLT.

[28]  R. Borsley Syntactic Theory: A Unified Approach , 1991 .

[29]  George A. Miller,et al.  Introduction to WordNet: An On-line Lexical Database , 1990 .

[30]  James D. McCawley,et al.  The syntactic phenomena of English , 1988 .

[31]  Jan Svartvik,et al.  A __ comprehensive grammar of the English language , 1988 .

[32]  Bruce L. Liles A basic grammar of modern English , 1979 .

[33]  Tom McArthur Using Compound Words , 1973 .

[34]  R. Quirk,et al.  A university grammar of English , 1973 .

[35]  D. Langendoen Essentials of English grammar , 1970 .

[36]  Sidney Greenbaum Studies in English adverbial usage , 1969 .

[37]  Alice Morton Ball,et al.  The compounding and hyphenation of English words , 1951 .