1 |
I.S. Lee and W.H. Tsai, "Secret Communication through Web Pages Using Special Space Codes in HTML Files," International Journal of Applied Science and Engineering, vol. 6, no. 2, 2008, pp. 141-149.
|
2 |
H.J. Huang, S.H. Zhong, and X.M. Sun, "An Algorithm of Webpage Information Hiding Based on Attributes Permutation," in Proc. of the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, Aug. 2008, pp. 257-260.
|
3 |
Y.W. Kim, K.A. Moon, and I.S. Oh, "A Text Watermarking Algorithm Based on Word Classification and Inter-word Space Statistics," in Proc. of the Seventh International Conference on Document Analysis and Recognition, Edinburgh, Scotland, Aug. 2003, pp. 775-779.
|
4 |
I.S. Lee and W.H. Tsai, "Data Hiding in Emails and Applications Using Unused ASCII Control Codes," Journal of Information Technology and Applications, vol. 3, no. 1, 2008, pp. 13-24.
|
5 |
I.S. Lee and W.H. Tsai, "A New Approach to Covert Communication via PDF Files," Signal Processing, vol. 90, no. 2, 2010, pp. 557-565.
DOI
ScienceOn
|
6 |
I.S. Lee and W.H. Tsai, "Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes," International Journal of Network Security, vol. 10, no. 1, 2010, pp. 1-10.
|
7 |
B. Li, J. He, J. Huang, and Y.Q. Shi, "A Survey on Image Steganography and Steganalysis," Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 2, 2011, pp. 142-172.
|
8 |
I.C. Lin and P.K. Hsu, "A Data Hiding Scheme on Word Documents Using Multiple-base Notation System," in Proc. of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, Oct. 2010, pp. 31-33.
|
9 |
T.Y. Liu and W.H. Tsai, "A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique," IEEE Transactions on Information Forensics and Security, vol. 2, no. 1, 2007, pp. 24-30.
DOI
|
10 |
M.A. Qadir and I. Ahmad, "Digital Text Watermarking: Secure Content Delivery and Data Hiding in Digital Documents," IEEE Aerospace and Electronic Systems Magazine, vol. 21, no. 11, 2006, pp. 18-21.
|
11 |
S. Weng, Y. Zhao, J.S. Pan, and R. Ni, "Reversible Watermarking based on Invariability and Adjustment on Pixel Pairs," IEEE Signal Processing Letters, vol. 15, 2008, pp. 721-724.
DOI
ScienceOn
|
12 |
X.G. Sui and H. Luo, "A New Steganography Method Based on Hypertext," in Proc. of Asia-Pacific Radio Science Conference, Qingdao, China, Aug. 2004, pp. 181-184.
|
13 |
X.M Sun, G. Lou, and H.J. Huang, "Component-based Digital Watermarking of Chinese Texts," in Proc. of the Third International Conference on Information Security, Shanghai, China, Nov. 2004,vol. 85, pp. 76-81.
|
14 |
Z.H. Wang, C.C. Chang, C.C Lin, and M.C Li, "A Reversible Information Hiding Scheme Using Left-Right and Up-Down Chinese Character Representation," Systems and Software, vol. 82, no. 8, 2009, pp. 1362-1369.
DOI
ScienceOn
|
15 |
Y.J. Yang and Y.M. Yang, "An Efficient Webpage Information Hiding Method Based on Tag Attributes," in Proc. of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, Yantai, China, Aug. 2010, pp. 1181-1184.
|
16 |
X.P. Zhang and S.Z. Wang, "Steganography Using Multiple-Base Notational System and Human Vision Sensitivity," IEEE Signal Processing Letters, vol. 12, no. 1, 2005, pp. 67-70.
DOI
ScienceOn
|
17 |
Y. Zhao, R. Ni, and Z. Zhu, "RST Transforms Resistant Image Watermarking based on Centroid and Sector-shaped Partition," Science in China: Series F Information Science, vol. 55, no. 3, 2012.
|
18 |
S.P. Zhong, X.Q. Cheng, and T.R. Chen, "Data Hiding in a Kind of PDF Texts for Secret Communication," International Journal of Network Security, vol. 4, no. 1, 2007, pp. 17-26.
|
19 |
C. Chen, S.Z. Wang, and X.P. Zhang, "Information Hiding in Text Using Typesetting Tools with Stego-Encoding," in Proc. of the First International Conference on Innovative Computing, Information and Control, Beijing, China, vol. 1, Aug. 2006, pp. 459-462.
|
20 |
M. Barni and F. Bartolini, "Data Hiding for Fighting Piracy," IEEE Signal Processing Magazine, vol. 21, no. 2, 2004, pp. 28-39.
|
21 |
C.C. Chang, C.C. Wu, and I.C. Lin, "A Data Hiding Method for Text Documents Using Multiple-Base Encoding," High Performance Networking, Computing, Communication Systems, and Mathematical Foundations, (Yanwen Wu, Qi Luo Eds.), Springer-Verlag Berlin Heidelberg, Sanya, Hainan Island, China , vol. 66, 2010, pp. 101-109.
DOI
|
22 |
I.J. Cox, J. Kilian, F. Thomson Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on Image Processing, vol. 6, no. 12, 1997, pp. 1673-1687.
DOI
ScienceOn
|
23 |
S. Dey, H. Al-Qaheri, and S. Sanyal, "Embedding Secret Data in HTML Web Page," Image Processing & Communications Challenges, (Ryszard S. Choraoe, Antoni Zabludowski Eds.), Academy Publishing House EXIT Warsaw, 2009, pp. 474-481.
|
24 |
M. Grosvald and C. Orhan Orgun, "Free from the Cover Text: A Human-generated Natural Language Approach to Text-based Steganography," Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 2, 2011, pp. 133-141.
|
25 |
H.J. Huang, X.M. Sun, Z.S. Li, and G., Sun, "Detection of Hidden Information in Webpage," in Proc. of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, Haikou, China, vol. 4, Aug. 2007, pp. 317-321.
|