Text Steganography Based on Online Chat
暂无分享,去创建一个
[1] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[2] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[3] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[4] Daniel B. Horn,et al. Patterns of entry and correction in large vocabulary continuous speech recognition systems , 1999, CHI '99.
[5] M. Shirali-Shahreza,et al. Steganography in TeX documents , 2008, 2008 3rd International Conference on Intelligent System and Knowledge Engineering.
[6] Wenyin Zhang,et al. Chinese Text Watermarking Based on Occlusive Components , 2006, 2006 2nd International Conference on Information & Communication Technologies.
[7] Krista Bennett,et al. LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .
[8] Mohammad Hassan Shirali-Shahreza,et al. A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).
[9] Graham Rawlinson,et al. The Significance of Letter Position in Word Recognition , 2007, IEEE Aerospace and Electronic Systems Magazine.
[10] S. Shahreza. Stealth steganography in SMS , 2006, 2006 IFIP International Conference on Wireless and Optical Communications Networks.
[11] R. Crandall,et al. Some Notes on Steganography , 1999 .
[12] Martin Steinebach,et al. A digital watermark for vector-based fonts , 2006, MM&Sec '06.
[13] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[14] Xingming Sun,et al. Component-based digital watermarking of Chinese texts , 2004, InfoSecu '04.
[15] Wen-Hsiang Tsai,et al. A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique , 2007, IEEE Transactions on Information Forensics and Security.
[16] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[17] Markus G. Kuhn,et al. Information hiding-A survey : Identification and protection of multimedia information , 1999 .
[18] Geguang Pu,et al. Chinese Text Watermarking Based on Occlusive Components , 2006 .