1 |
X. Sun, H. Chen, L. Yang and Y. Y. Tang, "Mathematical representation of a Chinese character and its applications," International Journal of Pattern Recognition and Artificial Intelligence, vol. 16, no. 6, pp. 735-747, 2002.
DOI
|
2 |
I. J. Cox and M. L. Miller, "The first 50 years of electronic watermarking," Journal of Applied Signal Processing, vol. 2002, no. 2, pp. 126-132, 2002.
|
3 |
B. Murphy and C. Vogel, "Statistically-constrained Shallow Text Marking: Techniques, Evaluation Paradigm and Results," Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 65050Z, 2007.
|
4 |
Y. L. Liu, H. Peng, and J. Wang, "Verifiable eiversity ranking search over encrypted outsourced data," Computers, Materials & Continua, vol. 55, no. 1, pp. 37-57, 2018.
|
5 |
H. Sun, R. Grishman, and Y. Wang, "Active learning based named recognition and its application in natural language coverless information hiding," Journal of Internet Technology, vol. 18, no. 2, pp. 443-451, 2017.
|
6 |
A. Ekbal and S. Saha, "Simulated annealing based classifier ensemble techniques: application to part of speech tagging," Information Fusion, vol. 14, no. 3, pp. 288-300, 2013.
DOI
|
7 |
B. Feng, Z. H. Wang, D. Wang, C. Y. Chang, and M. C. Li, "A novel, reversible, Chinese text information hiding scheme based on lookalike traditional and simplified Chinese characters," KSII Transactions on Internet and Information Systems, vol. 8, no. 1, pp. 269-281, 2014.
DOI
|
8 |
I. S. Lee and W. H. Tsai, "Secret communication through web pages using special space codes in HTML files," International Journal of Applied Science & Engineering, vol. 6, no. 2, pp. 141-149, 2008.
|
9 |
K. Maher, "Texto". [Online]. Available: ftp://ftp.funet.fi/pub/crypt/steganography/texto.tar.gz
|
10 |
E. Satir and H. Isik, "A huffman compression based text steganography method," Multimedia Tools and Applications, vol. 70, no. 3, pp. 2085-2110, 2014.
DOI
|
11 |
Z. Zhou, H. Sun, R. Harit, X. Chen, and X. Sun, "Coverless image steganography without embedding," in Proc. of International Conference on Cloud Computing and Security (ICCCS), pp. 123-132, 2015.
|
12 |
C. Y. Chang and S. Clark, "Practical linguistic steganography using contextual synonym substitution and vertex color coding," Computational Linguistices, vol. 40, no. 2, pp. 403-448, 2010.
|
13 |
X. Shen, F. Shen, Q. S. Sun, Y. Yang, Y. H. Yuan, and H. T. Shen, "Semi-Paired Discrete Harshing: Learning Latent Hash Codes for Semi-Paired Cross-view Retrieval," IEEE Transactions on Cybernetics, vol. 47, no. 12, pp. 4275-4288, 2017.
DOI
|
14 |
Y. Wu and X. Sun, "Text coverless information hiding method based on hybrid tags," Journal of Internet Technology, vol. 19, no. 3, pp. 649-655, 2018.
|
15 |
C. Y. Chang and S. Clark, "Linguistic steganography using automatically generated paraphrases," in Proc. of Human Language Technologies: the 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL), pp. 591-599, 2010.
|
16 |
M. Wu and B. Liu, "Data hiding in binary image for authentication and annotation," IEEE Transactions on Multimedia, vol. 6, no. 4, pp. 528-538, 2004.
DOI
|
17 |
M. Chapman and G. I. Davida, "Hiding the hidden: a software system for concealing ciphertext as innocuous text," in Proc. of the 1st International Conference on Information and Communication Security, pp. 335-345, 1998.
|
18 |
A. Desoky, "Notestega: Notes-based steganography methodology," Information Security Journal: A Global Perspective, vol. 18, no. 4, pp. 178-193, 2009.
DOI
|
19 |
Y. B. Luo, Y. F. Huang, F. F. Li and C. C. Chang, "Text steganography based on Ci-poetry generation using markov chain model," KSII Transactions on Internet and Information Systems, vol. 10, no. 9, pp. 4568-4584, 2016.
DOI
|
20 |
S. Zhang, Z. Yao, X. Meng, and C. C. Liu, "New digital text watermarking algorithm based on new-defined characters," in Proc. of IEEE International Conference Symposium on Computer, Consumer and Control (IS3C), pp. 713-716, 2014.
|
21 |
X. Chen, S. Chen, and Y. Wu, "Coverless information hiding method based on the Chinese character encoding," Journal of Internet Technology, vol. 18, no. 2, pp. 313-320, 2017.
|
22 |
L. Y. Xiang, Y. Li, W. Hao, P. Yang, and X. B. Shen, "Reversible natural language watermarking using synonym substitution and arithmetic coding," Computers, Materials & Continua, vol. 55, no. 3, pp. 541-559, 2018.
|
23 |
B. Murphy and C. Vogel, "The syntax of concealment: reliable methods for plain text information hiding," Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, pp. 1-12, 2007.
|
24 |
P. Meng, L. Hang, W. Yang, and Z. Chen, "Attacks on Translation Based Steganography," in Proc. of IEEE Youth Conference on Information, Computing and Telecommunication (YC-ICT), pp. 227-230, 2009.
|
25 |
X. Chen, H. Sun, Y. Tobe, Z. Zhou, and X. Sun, "Coverless information hiding method based on the Chinese mathematical expression," in Proc. of International Conference on Cloud Computing and Security ( ICCCS), pp. 133-143, 2015.
|