A novel, reversible, Chinese text information hiding scheme based on lookalike traditional and simplified Chinese characters |
Feng, Bin
(School of software, Dalian University of Technology)
Wang, Zhi-Hui (School of software, Dalian University of Technology) Wang, Duo (School of software, Dalian University of Technology) Chang, Ching-Yun (Computer Laboratory, University of Cambridge) Li, Ming-Chu (School of software, Dalian University of Technology) |
1 | K. Winstein, "Lexical Steganography through Adaptive Modulation of the Word Choice Hash,". |
2 | S. F. Wu and L. S. Huang, "Research on Information Hiding," US-China Education Review, pp. 77-81, 2003. |
3 | "Spam Mimic," 2000. |
4 | P. Wayner, "Mimic Functions," Cryptologia XVI, pp. 193-214, 1992. |
5 | R. G. Kammer, "Data Encryption Standard (DES)", National Institute of Standards and Technology, 1999. |
6 | C. C. Chang, P. Y. Pai, C. M. Yeh, and Y. K. Chan, "A High Payload Frequency-based Reversible Image Hiding Method," Information Sciences, vol. 180, no. 11, pp. 2286-2298, 2010. DOI ScienceOn |
7 | C. C. Chang and T. D. Kieu, "A Reversible Data Hiding Scheme Using Complementary Embedding Strategy," Information Sciences, vol. 180, no. 16, pp. 3045-3058, 2010. DOI ScienceOn |
8 | C. C. Chang, Y. P. Hsieh, and C. Y. Lin, "Lossless Data Embedding with High Embedding Capacity Based on Declustering for VQ-compressed Codes," IEEE Trans. Inf. Forensics Security, vol, 2, no. 3, pp. 341-349, 2007. DOI ScienceOn |
9 | C. C. Chang and C.Y. Lin, "Reversible Steganographic Method Using SMVQ Approach Bases on Declustering," Information Sciences, vol. 177, no. 8, pp. 1796-1805, 2007. DOI ScienceOn |
10 | K. Maher, TEXTO, |
11 | B. Murphy and C. Vogel, "The Syntax of Concealment: Reliable Methods for Plain Text Information Hiding," International Society for Optics and Photonics, 2007. |
12 | R. Rivest, A. Shamir and L. Adleman, "Cryptographic Communications System and Method", U.S. Patent 4405829, 1977. |
13 | X. M. Sun, H. W. Chen, L. H. Yang, and Y. Y. Tang, "Mathematical Representation of a Chinese Character and its Applications," International Journal of Pattern Recognition and Artificial Intelligence, vol. 16, no. 8, pp. 735-747, 2002. DOI ScienceOn |
14 | X. M. Sun, G. Luo, and H. J. Huang, "Component-based Digital Watermarking of Chinese Texts," in Proc. of the 3rd International Conference on Information Security, Shanghai, China, pp. 76-81, 2004. |
15 | Z. H. Wang , C. C. Chang, C. C. Lin, and M. C. Li, "A Reversible Information Hiding Scheme Using Left-Right and Up-Down Chinese Character Representation" The Journal of Systems and Software, vol. 82, no. 8, pp. 1362-1369, 2009. DOI ScienceOn |
16 | O. Vybornova and B. Macq, "Natural Language Watermarking and Robust Hashing Based on Presuppositional Analysis," in Proc. of the IEEE International Conference on Information Reuse and Integration (IRI 2007), Las Vegas, Nevada, USA, pp. 177-182, 2007. |
17 | M. J. Atallah, V. Raskin, M. Crogan, C. Hempelmann, F. Kerschbaum and D. Mohamed, "Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation," in Proc. of the 4th International Workshop on Information Hiding, Pittsburgh, PA, USA, pp. 185-200, 2001. |
18 | M. Chapman, "Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text," Information and Communications Security, pp. 335-345, 1997. |
19 | Y. L. Chiang, L. P. Chang, W. T. Hsieh and W. C. Chen, "Natural Language Watermarking Using Semantic Substitution for Chinese Text," in Proc. of IWDW2003, Seoul, Korea, pp. 129-140, 2003. |