Steganography in text by using MS word symbols
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[2] Merrill Warkentin,et al. Steganography and Steganalysis , 2006 .
[3] Elizabeth Chang,et al. Visibly Invisible: Ciphertext as a Steganographic Carrier , 2004 .
[4] Krista Bennett,et al. LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .
[5] Ronak Karimi,et al. An introduction to steganography methods - TI Journals , 2012 .
[6] J. Krenn,et al. Steganography and Steganalysis , 2006 .
[7] William A. Arbaugh,et al. Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..
[8] Bret Dunbar,et al. A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .
[9] M. Shirali-Shahreza,et al. Steganography in TeX documents , 2008, 2008 3rd International Conference on Intelligent System and Knowledge Engineering.
[10] Dr.K. Ashok Babu,et al. A New Approach to Telugu Text Steganography by Shifting Inherent Vowel Signs , 2010 .
[11] David Shulman,et al. Classical Telugu poetry : an anthology , 2002 .
[12] Gu Xuemai,et al. Chinese Language Steganography using the Arabic Diacritics as a Covered Media , 2010 .
[13] Joshua Silman,et al. Steganography and Steganalysis: An Overview , 2001 .
[14] Ramineni Siva Ram Prasad,et al. A new approach to Telugu text steganography , 2011, 2011 IEEE Symposium on Wireless Technology and Applications (ISWTA).
[15] M. Shirali-Shahreza. Pseudo-space Persian/Arabic text steganography , 2008, 2008 IEEE Symposium on Computers and Communications.
[16] M.H. Shirali-Shahreza,et al. Text Steganography in chat , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.
[17] Mohammad Hassan Shirali-Shahreza,et al. A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).
[18] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[19] Karim Abed-Meraim,et al. A view on latest audio steganography techniques , 2011, 2011 International Conference on Innovations in Information Technology.