暂无分享,去创建一个
[1] Suyoto,et al. Information Hiding in CSS : A Secure Scheme Text-Steganography using Public Key Cryptosystem , 2012, ArXiv.
[2] Lawrence O'Gorman,et al. Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.
[3] William Stallings,et al. Cryptography and network security , 1998 .
[4] M. Shirali-Shahreza,et al. Text Steganography in SMS , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[5] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[6] Mohammad Hassan Shirali-Shahreza,et al. A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).
[7] Ajay Jadhav,et al. Steganography An Art of Hiding Data , 2009, ArXiv.
[8] N. C. Debnath,et al. Linguistic approach for text steganography through Indian text , 2010, 2010 2nd International Conference on Computer Technology and Development.
[9] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[10] Wen-Hsiang Tsai,et al. A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique , 2007, IEEE Transactions on Information Forensics and Security.
[11] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[12] Lip Yee Por,et al. WhiteSteg: a new scheme in information hiding using text steganography , 2008 .
[13] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[14] Khairullah. A Novel Text Steganography System in Cricket Match Scorecard , 2011 .
[15] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[16] Mohammad Hassan Shirali-Shahreza,et al. A New Synonym Text Steganography , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[17] Sohil D. Pandya,et al. Testing Various Similarity Metrics and their Permutations with Clustering Approach in Context Free Data Cleaning , 2009 .
[18] Gautam Sanyal,et al. Novel Text Steganography through Special Code Generation , 2011 .
[19] Lip Yee Por,et al. Information Hiding: A New Approach in Text Steganography , 2008 .
[20] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[21] Krista Bennett,et al. LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .
[22] Adnan Abdul-Aziz Gutub,et al. Improving security and capacity for Arabic text steganography using ‘Kashida’ extensions , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.
[23] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .