Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens
暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[3] H. Cleveland. The Knowledge Executive: Leadership in an Information Society , 1985 .
[4] M. Zeleny. Management support systems: Towards integrated knowledge management , 1987 .
[5] Robert W. Lucky,et al. Silicon Dreams: Information, Man, and Machine , 1989 .
[6] Peter Wayner,et al. Mimic Functions , 1992, Cryptologia.
[7] Peter Wayner. Strong Theoretical Stegnography , 1995, Cryptologia.
[8] P. Watzlawick,et al. Menschliche Kommunikation : Formen, Störungen, Parodoxien , 1996 .
[9] Mark Chapman,et al. Hiding the Hidden: A software system for concealing ciphertext as innocuous text , 1997, ICICS.
[10] Scott Craver,et al. On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.
[11] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[12] Thomas Mittelholzer,et al. An Information-Theoretic Approach to Steganography and Watermarking , 1999, Information Hiding.
[13] Mikhail J. Atallah,et al. Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation , 2001, Information Hiding.
[14] Manuel Blum,et al. Secure Human Identification Protocols , 2001, ASIACRYPT.
[15] Marc Rennhard,et al. A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography , 2001, ISC.
[16] Radu Sion,et al. Natural Language Watermarking and Tamperproofing , 2002, Information Hiding.
[17] Mark Chapman,et al. Plausible Deniability Using Automated Linguistic Stegonagraphy , 2002, InfraSec.
[18] Michael R. Middleton,et al. Information as a Resource , 2002 .
[19] Hideki Noda,et al. A Framework for a Simple Sentence Paraphrase Using Concept Hieararchy in SD-Form Semantics Model , 2003, EJC.
[20] Georg Struth,et al. Relational and Kleene-Algebraic Methods in Computer Science , 2003, Lecture Notes in Computer Science.
[21] Eli Biham,et al. Advances in Cryptology — EUROCRYPT 2003 , 2003, Lecture Notes in Computer Science.
[22] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[23] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[24] Jessica J. Fridrich,et al. Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.
[25] Wen-Tai Hsieh,et al. Natural Language Watermarking Using Semantic Substitution for Chinese Text , 2003, IWDW.
[26] Nicholas Hopper,et al. Public-Key Steganography , 2003, EUROCRYPT.
[27] Hiram Calvo,et al. Using Selectional Preferences for Extending a Synonymous Paraphrasing Method in Steganography , 2004 .
[28] Richard Bergmair,et al. Towards Linguistic Steganography: A Systematic Investigation of Approaches, Systems, and Issues , 2004 .
[29] E. J. Koops,et al. Crypto Law Survey , 2004 .
[30] Christian Cachin,et al. An information-theoretic model for steganography , 2004, Inf. Comput..
[31] Igor A. Bolshakov,et al. A Method of Linguistic Steganography Based on Collocationally-Verified Synonymy , 2004, Information Hiding.
[32] J. Doug Tygar,et al. Image Recognition CAPTCHAs , 2004, ISC.
[33] Krista Bennett,et al. LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .
[34] Stefan Katzenbeisser,et al. Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security) , 2004, ISC.
[35] Nasir D. Memon,et al. Blind source camera identification , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[36] Edward J. Delp,et al. Natural language watermarking , 2005, IS&T/SPIE Electronic Imaging.
[37] Michael Backes,et al. Public-Key Steganography with Active Attacks , 2005, TCC.
[38] Mikhail J. Atallah,et al. Translation-based steganography , 2005, J. Comput. Secur..
[39] Alexander N. Gorban,et al. Dimension of Attractors Estimation , 2005 .