Text Steganography Based on Feature Coding Method
暂无分享,去创建一个
[1] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[2] M. Shirali-Shahreza,et al. Text Steganography by Changing Words Spelling , 2008, 2008 10th International Conference on Advanced Communication Technology.
[3] Bret Dunbar,et al. A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .
[4] Khan Farhan Rafat. Enhanced text steganography in SMS , 2009, 2009 2nd International Conference on Computer, Control and Communication.
[5] Steven H. Low,et al. Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.
[6] R. Siva Rama Prasad,et al. An Evolution of Hindi Text Steganography , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[7] T. Shanmugapriya,et al. A Study on Digital Watermarking Techniques , 2009 .
[8] Young Shik Moon,et al. An Effective Method for Eye Detection Based on Texture Information , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[9] A. J. Raphael,et al. Cryptography and Steganography – A Survey , 2022 .
[10] Suyoto,et al. Information Hiding in CSS : A Secure Scheme Text-Steganography using Public Key Cryptosystem , 2012, ArXiv.
[11] Adnan Abdul-Aziz Gutub,et al. A Novel Arabic Text Steganography Method Using Letter Points and Extensions , 2007 .
[12] M. Shirali-Shahreza,et al. Text Steganography in SMS , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[13] Krista Bennett,et al. LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .
[14] Gautam Sanyal,et al. Novel Text Steganography through Special Code Generation , 2011 .
[15] Khairullah. A Novel Text Steganography System in Cricket Match Scorecard , 2011 .
[16] Christoph Hänle,et al. The “ Politehnica ” University of Timisoara Faculty of Automatics and Computers , 2022 .
[17] Devesh C. Jinwala,et al. Experimenting with the Novel Approaches in Text Steganography , 2012, ArXiv.
[18] Mohammad Hassan Shirali-Shahreza,et al. A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).
[19] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[20] Lawrence O'Gorman,et al. Electronic Marking and Identification Techniques to Discourage Document Copying , 1995, IEEE J. Sel. Areas Commun..