Translation-based steganography
暂无分享,去创建一个
Mikhail J. Atallah | Christian Grothoff | Ryan Stutsman | Krista Grothoff | Ludmila Alkhutova | M. Atallah | Ryan Stutsman | C. Grothoff | K. Grothoff | Ludmila Alkhutova | Christian Grothoff
[1] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[2] K. Marx,et al. Manifest der Kommunistischen partei , 1945 .
[3] David A. Huffman,et al. A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.
[4] Peter Wayner,et al. Mimic Functions , 1992, Cryptologia.
[5] Robert L. Mercer,et al. The Mathematics of Statistical Machine Translation: Parameter Estimation , 1993, CL.
[6] Shalom Lappin,et al. An Algorithm for Pronominal Anaphora Resolution , 1994, CL.
[7] Scott Bennett,et al. Evaluating Automated and Manual Acquisition of Anaphora Resolution Strategies , 1995, ACL.
[8] Mark Chapman,et al. Hiding the Hidden: A software system for concealing ciphertext as innocuous text , 1997, ICICS.
[9] Ruslan Mitkov. Factors in anaphora resolution: they are not the only things that matter. A case study based on two different approaches , 1997 .
[10] Ronald Rosenfeld,et al. Statistical language modeling using the CMU-cambridge toolkit , 1997, EUROSPEECH.
[11] Christian S. Collberg,et al. On the Limits of Software Watermarking , 1998 .
[12] John Hale,et al. A Statistical Approach to Anaphora Resolution , 1998, VLC@COLING/ACL.
[13] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.
[14] Christian S. Collberg,et al. Software watermarking: models and dynamic embeddings , 1999, POPL '99.
[15] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[17] Hermann Ney,et al. Improved Statistical Alignment Models , 2000, ACL.
[18] Hermann Ney,et al. A Comparison of Alignment Models for Statistical Machine Translation , 2000, COLING.
[19] Mikhail J. Atallah,et al. Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation , 2001, Information Hiding.
[20] Marc Rennhard,et al. A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography , 2001, ISC.
[21] Daniel Marcu,et al. Fast Decoding and Optimal Decoding for Machine Translation , 2001, ACL.
[22] Radu Sion,et al. Natural Language Watermarking and Tamperproofing , 2002, Information Hiding.
[23] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[24] Peter Wayner,et al. Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition) , 2002 .
[25] Jessica J. Fridrich,et al. Higher-order statistical steganalysis of palette images , 2003, IS&T/SPIE Electronic Imaging.
[26] Peter J. Haas,et al. Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.
[27] Ayman Farahat,et al. Defending email communication against profiling attacks , 2004, WPES '04.
[28] Radu Sion,et al. Rights protection for relational data , 2003, IEEE Transactions on Knowledge and Data Engineering.
[29] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.
[30] Mikhail J. Atallah,et al. Lost in just the translation , 2006, SAC.
[31] R. Mitkov. ANAPHORA RESOLUTION: THE STATE OF THE ART , 2007 .