Bengali steganography using CALP with a novel bengali word processor
暂无分享,去创建一个
[1] M. Shirali-Shahreza,et al. Text Steganography by Changing Words Spelling , 2008, 2008 10th International Conference on Advanced Communication Technology.
[2] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[3] M.H. Shirali-Shahreza,et al. Text Steganography in chat , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.
[4] Kaliappan Gopalan. Audio steganography using bit modification , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[5] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[6] Adnan M. Alattar,et al. Watermarking electronic text documents containing justified paragraphs and irregular line spacing , 2004, IS&T/SPIE Electronic Imaging.
[7] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998 .
[8] William A. Brenneman. Statistics for Research , 2005, Technometrics.
[9] Ayan Biswas,et al. Text Steganography using CALP with High Embedding Capacity , 2011 .
[10] Souvik Bhattacharyya,et al. A Novel Approach to Develop a Secure Image based Steganographic Model using Integer Wavelet Transform , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.
[11] I. Daubechies,et al. Wavelet Transforms That Map Integers to Integers , 1998 .
[12] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[13] Ayan Biswas,et al. Hiding Data in Text Through Changing in Alphabet Letter Patterns (CALP) , 2011 .
[14] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[15] William E. Winkler,et al. The State of Record Linkage and Current Research Problems , 1999 .
[16] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[17] Kyung-Ae Moon,et al. A text watermarking algorithm based on word classification and inter-word space statistics , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..
[18] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[19] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.
[20] Matthew A. Jaro,et al. Advances in Record-Linkage Methodology as Applied to Matching the 1985 Census of Tampa, Florida , 1989 .
[21] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[22] Jean-Luc Dugelay,et al. A guide tour of video watermarking , 2003, Signal Process. Image Commun..
[23] Yang Xia. Construction of Second Generation Wavelets , 2000 .
[24] Marc Rennhard,et al. A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography , 2001, ISC.
[25] Dale K. Pace,et al. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1998 .
[26] Sushil Jajodia,et al. Information hiding: steganography, attacks, and countermeasures , 2000 .
[27] Jean-Luc Dugelay,et al. Security pitfalls of frame-by-frame approaches to video watermarking , 2004, IEEE Transactions on Signal Processing.
[28] Matthew A. Jaro,et al. Probabilistic linkage of large public health data files. , 1995, Statistics in medicine.
[29] Kevin Curran,et al. An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.
[30] D. Kahn. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1967 .
[31] Adnan Abdul-Aziz Gutub,et al. A Novel Arabic Text Steganography Method Using Letter Points and Extensions , 2007 .