Steganography in Arabic text using Kashida variation algorithm (KVA)
暂无分享,去创建一个
[1] Krista Bennett,et al. LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .
[2] K. Elleithy,et al. Steganography by multipoint Arabic letters , 2012, 2012 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
[3] Mohamed Bachir Yagoubi,et al. High capacity diacritics-based method for information hiding in Arabic text , 2011, 2011 International Conference on Innovations in Information Technology.
[4] N. C. Debnath,et al. Linguistic approach for text steganography through Indian text , 2010, 2010 2nd International Conference on Computer Technology and Development.
[5] M.A. Aabed,et al. Arabic Diacritics based Steganography , 2007, 2007 IEEE International Conference on Signal Processing and Communications.
[6] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[7] Shawn D. Dickman. An Overview of Steganography , 2007 .
[8] David Shulman,et al. Classical Telugu poetry : an anthology , 2002 .
[9] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[10] Chin-Chen Chang,et al. Emoticon-based text steganography in chat , 2009, 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA).
[11] Ramineni Siva Ram Prasad,et al. A new approach to Telugu text steganography , 2011, 2011 IEEE Symposium on Wireless Technology and Applications (ISWTA).
[12] Lawrence O'Gorman,et al. Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.
[13] Mohammed Abbas Fadhil Al-Husainy. Image Steganography by Mapping Pixels to Letters , 2009 .
[14] Mohammad Hassan Shirali-Shahreza,et al. A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).
[15] Liu Yuling,et al. An Efficient Linguistic Steganography for Chinese Text , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[16] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.
[17] Chet Hosmer,et al. An Overview of Steganography , 2011, Adv. Comput..
[18] Elizabeth Chang,et al. Visibly Invisible: Ciphertext as a Steganographic Carrier , 2004 .