A new approach of text steganography based on mathematical model of number system
暂无分享,去创建一个
[1] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[2] Krista Bennett,et al. LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .
[3] Merrill Warkentin,et al. Steganography and Steganalysis , 2006 .
[4] Jean-Luc Dugelay,et al. A guide tour of video watermarking , 2003, Signal Process. Image Commun..
[5] Ajay Jadhav,et al. Steganography An Art of Hiding Data , 2009, ArXiv.
[6] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[7] Kaliappan Gopalan. Audio steganography using bit modification , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[8] Tung-Shou Chen,et al. A new data hiding method in binary image , 2003, Fifth International Symposium on Multimedia Software Engineering, 2003. Proceedings..
[9] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[10] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[11] Kyung-Ae Moon,et al. A text watermarking algorithm based on word classification and inter-word space statistics , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..
[12] Mohammad Shirali Shahreza. An improved method for steganography on mobile phone , 2005 .
[13] T. Scharping. Hide-and-seek: China's elusive population data , 2001 .
[14] Jean-Luc Dugelay,et al. Security pitfalls of frame-by-frame approaches to video watermarking , 2004, IEEE Transactions on Signal Processing.
[15] Sushil Jajodia,et al. Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).
[16] Adnan M. Alattar,et al. Watermarking electronic text documents containing justified paragraphs and irregular line spacing , 2004, IS&T/SPIE Electronic Imaging.
[17] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[18] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[19] J C Judge,et al. Steganography: Past, Present, Future , 2001 .
[20] Lawrence O'Gorman,et al. Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.
[21] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[22] J. Krenn,et al. Steganography and Steganalysis , 2006 .