Natural Language Watermarking and Tamperproofing 1
暂无分享,去创建一个
Radu Sion | Mikhail J. Atallah | Umut Topkara | Victor Raskin | Christian F. Hempelmann | Mercan Karahan | Katrina E. Triezenberg
[1] Ross J. Anderson. Stretching the Limits of Steganography , 1996, Information Hiding.
[2] Nicholas F. Maxemchuk,et al. Electronic document distribution , 1994, AT&T Technical Journal.
[3] Mark Chapman,et al. Hiding the Hidden: A software system for concealing ciphertext as innocuous text , 1997, ICICS.
[4] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[5] Mikhail J. Atallah,et al. Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation , 2001, Information Hiding.
[6] Steven H. Low,et al. Document identification for copyright protection using centroid detection , 1998, IEEE Trans. Commun..
[7] Sergei Nirenburg,et al. Natural language processing for information assurance and security: an overview and implementations , 2001, NSPW '00.
[8] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[9] Peter Wayner,et al. Mimic Functions , 1992, Cryptologia.