Highly Imperceptible and Reversible Text Steganography Using Invisible Character based Codeword
暂无分享,去创建一个
Hai Dong | Ibrahim Khalil | Xun Yi | Mohammad Saidur Rahman | X. Yi | I. Khalil | Hai Dong
[1] Chin-Feng Lee,et al. Lossless Text Steganography in Compression Coding , 2013, Recent Advances in Information Hiding and Applications.
[2] Liu Jin'An,et al. A Text Digital Watermarking for Chinese Word Document , 2008, 2008 International Symposium on Computer Science and Computational Technology.
[3] David A. Huffman,et al. A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.
[4] Wen-Hsiang Tsai,et al. A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique , 2007, IEEE Transactions on Information Forensics and Security.
[5] Hakan Isik,et al. A Huffman compression based text steganography method , 2012, Multimedia Tools and Applications.
[6] Chao-Tung Yang,et al. An Improvement to Data Service in Cloud Computing with Content Sensitive Transaction Analysis and Adaptation , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops.
[7] N. B. Anuar,et al. The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..
[8] KokSheik Wong,et al. UniSpaCh: A text-based data hiding method using Unicode space characters , 2012, J. Syst. Softw..
[9] Abdelrahman Desoky,et al. Listega: list-based steganography methodology , 2009, International Journal of Information Security.
[10] Vijay H. Mankar,et al. Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..
[11] Ali Hamzeh,et al. A novel steganalysis for TPVD steganographic method based on differences of pixel difference histogram , 2010, Multimedia Tools and Applications.
[12] Nāgārjuna,et al. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding , 2014 .
[13] Chin-Chen Chang,et al. High-Capacity Reversible Data-Hiding for LZW Codes , 2010, 2010 Second International Conference on Computer Modeling and Simulation.
[14] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[15] Ayman Ibaida,et al. Resilient to shared spectrum noise scheme for protecting cognitive radio smart grid readings - BCH based steganographic approach , 2016, Ad Hoc Networks.
[16] Chin-Chen Chang,et al. A reversible data hiding scheme using complementary embedding strategy , 2010, Inf. Sci..
[17] Joseph K. Liu,et al. Toward efficient and privacy-preserving computing in big data era , 2014, IEEE Network.