An active attack on chaotic based text zero-watermarking
暂无分享,去创建一个
[1] Mikhail J. Atallah,et al. Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation , 2001, Information Hiding.
[2] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[3] Radu Sion,et al. Natural Language Watermarking and Tamperproofing , 2002, Information Hiding.
[4] Cheng Yu-zhu. Text zero-watermarking algorithm based on chaotic mapping , 2005 .
[5] C. Orhan Orgun,et al. Exploiting Linguistic Features in Lexical Steganography: Design and Proof-of-Concept Implementation , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[6] Edward J. Delp,et al. Attacks on lexical natural language steganography systems , 2006, Electronic Imaging.