Text Steganography Based on Ci-poetry Generation Using Markov Chain Model |
Luo, Yubo
(Department of Electronic Engineering, Tsinghua University)
Huang, Yongfeng (Department of Electronic Engineering, Tsinghua University) Li, Fufang (School of Computer Science and Educational Software, GuangZhou University) Chang, Chinchen (Department of Information Engineering and Computer Science, Feng Chia University) |
1 |
A. Desoky, “Chestega: Chess Steganography Methodology,” |
2 |
A. Desoky, M. Younis and H. EI-Sayed, “Auto-Summarization-Based Steganography,” in |
3 |
A. Desoky, “Listega: List-Based Steganography Methodology,” |
4 |
Y. F. Huang, C. H. Liu, S. Y. Tang and S. Bai, “Steganography Integration into a Low-Bit Rate Speech Codec,” |
5 |
S. F. Wu, “Research on Information Hiding,” |
6 |
P. Wayner, “Mimic Functions,” |
7 | Spammimic. www.spammimic.com. |
8 | G. Chen, L. Cui and M. Zhou, “Chinese Couplet Generator”, couplet.msra.cn/app/couplet.aspx. |
9 |
J. He and M. Zhou, “Generating Chinese Metrical Poetry by a Statistical MT Approach,” |
10 |
C. L. Zhou and W. You, “Genetic Algorithm and Its Implementation of Automatic Generation of Chinese SongCi,” |
11 |
L. Bahl, P. Brown, P. de Souza and R. Mercer, “Maximum mutual information estimation of hidden Markov model parameters for speech recognition,” in |
12 |
P. Brown, “The Acoustic-modeling Problem in Automatic Speech Recognition,” |
13 |
M. Shirali-Shahreza and M. H. Shirali-Shahreza, “Text steganography in SMS,” |
14 |
J.W. Li, M. Gallry, C. Brockett, J. Gao and B. Dolan, “A diversity-promoting objective function for neural conversation models,” |
15 |
Y. F. Huang, S. Tang and J. Yuan, “Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec,” |
16 |
C. Nopporn, “Electronic Document Data Hiding Technique using Inter-character Space,” in |
17 |
MH. Shirali-Shahreza and M. Shirali-Shahreza, “A New Approach to Persian/Arabic Text Steganography,” in |
18 |
S. H. Low, N. F. Maxemchuk and A. M. Lapone, “Document Identification for Copyright Protection Using Centroid Detection,” |
19 | K. Maher, “Texto”, available at URL: ftp://ftp.funet.fi/pub/crypt/steganography/texto.tar.gz. |
20 |
M. Chapman, “Hiding the hidden: A software system for concealing ciphertext as innocuous text,” |
21 |
Z. S. Yu and L. S. Huang, “High Embedding Ratio Text Steganography by Ci-poetry of the Song Dynasty,” |
22 |
C. Grothoff, K. Grothoff, L Alkhutova, R Stutsman and M Atallah, “Translation-based Steganography,” in |
23 |
A. Desoky, “Notestega: Notes-Based Steganography Methodology,” |
24 |
A. Desoky, “Jokestega: Automatic Joke Generation–based Steganography Methodology,” |