WhiteSteg: a new scheme in information hiding using text steganography
暂无分享,去创建一个
Lip Yee Por | Tan Fong Ang | B. Delina | L. Y. Por | T. F. Ang | B. Delina
[1] Richard Bergmair,et al. Towards Linguistic Steganography: A Systematic Investigation of Approaches, Systems, and Issues , 2004 .
[2] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[3] D. L. Parnas,et al. On the criteria to be used in decomposing systems into modules , 1972, Software Pioneers.
[4] Birgit Pfitzmann,et al. Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals , 1996, Information Hiding.
[5] Peter Wayner. Disappearing cryptography - being and nothingness on the net , 1996 .
[6] M. Shirali-Shahreza,et al. Text Steganography in SMS , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[7] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[8] Ross Anderson,et al. Information hiding terminology , 1996 .
[9] Marc Rennhard,et al. A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography , 2001, ISC.
[10] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[11] Peter Wayner. Strong Theoretical Stegnography , 1995, Cryptologia.
[12] L. O'Gorman,et al. Marking text features of document images to deter illicit dissemination , 1994, Proceedings of the 12th IAPR International Conference on Pattern Recognition, Vol. 3 - Conference C: Signal Processing (Cat. No.94CH3440-5).
[13] Klimis S. Ntalianis. A short-message robust steganographic method for effective information recovery under transmission losses of cellular networks , 2005 .
[14] Sabu M. Thampi. Information Hiding Techniques: A Tutorial Review , 2008, ArXiv.
[15] Bret Dunbar,et al. A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .
[16] M.H. Shirali-Shahreza,et al. Text Steganography in chat , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.
[17] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[18] Lawrence O'Gorman,et al. Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.
[19] Wang Shuozhong,et al. Information Hiding in Text Using Typesetting Tools with Stego-Encoding , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).
[20] Steven H. Low,et al. Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.
[21] Mohammad Shirali Shahreza. An improved method for steganography on mobile phone , 2005 .
[22] Krista Bennett,et al. LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .
[23] Jiun-Jian Liaw,et al. An improvement of robust and blind data hiding based on self reference in spatial domain , 2007 .
[24] Mark Chapman,et al. Hiding the Hidden: A software system for concealing ciphertext as innocuous text , 1997, ICICS.
[25] Peter Wayner,et al. Mimic Functions , 1992, Cryptologia.
[26] Sushil Jajodia,et al. Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).
[27] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[28] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.