The Security of Arithmetic Compression Based Text Steganography Method
暂无分享,去创建一个
[1] Esra Satir,et al. A compression-based text steganography method , 2012, Journal of Systems and Software.
[2] Carl Vogel,et al. The syntax of concealment: reliable methods for plain text information hiding , 2007, Electronic Imaging.
[3] Hakan Isik,et al. A Huffman compression based text steganography method , 2012, Multimedia Tools and Applications.
[4] Wen-Hsiang Tsai,et al. A new approach to covert communication via PDF files , 2010, Signal Process..
[5] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[6] Ingemar J. Cox,et al. Information Transmission and Steganography , 2005, IWDW.
[7] Neil A. Ernst,et al. The Journal of Systems and Software , 2022 .
[8] Hedieh Sajedi,et al. Secure steganography based on embedding capacity , 2009, International Journal of Information Security.
[9] Mark Chapman,et al. Hiding the Hidden: A software system for concealing ciphertext as innocuous text , 1997, ICICS.
[10] Andrei Fionov,et al. Fast and Space-Efficient Adaptive Arithmetic Coding , 1999, IMACC.
[11] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[12] Xingming Sun,et al. Component-based digital watermarking of Chinese texts , 2004, InfoSecu '04.
[13] Chin-Chen Chang,et al. Emoticon-based text steganography in chat , 2009, 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA).
[14] KokSheik Wong,et al. UniSpaCh: A text-based data hiding method using Unicode space characters , 2012, J. Syst. Softw..
[15] G. Blelloch. Introduction to Data Compression * , 2022 .
[16] Yongping Liu,et al. MIMIC-PPT: Mimicking-based steganography for microsoft power Point document , 2008 .
[17] Jorma Rissanen,et al. Generalized Kraft Inequality and Arithmetic Coding , 1976, IBM J. Res. Dev..
[18] David Salomon,et al. Coding for Data and Computer Communications , 2005 .
[19] Abdelrahman Desoky,et al. Listega: list-based steganography methodology , 2009, International Journal of Information Security.