1 |
H. M. Meral, E. Sevinc, E. Unkar, B. Sankur, A. S. Ozsoy and T. Gungor, “Syntactic tools for text watermarking,” In Proc. of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, pp.1-12, 2007
|
2 |
I.Cox, M. L. Miller, J. A. Bloom and M. Kaufman, “Digital Watermarking,” Digital Watermarking, pp.1-40, 2002
|
3 |
M. Topkara, C. M. Taskiran and E. J. Delp, “Natural language watermarking,” SPIE Conf. On Security, Steganography and Watermarking of Multimedia Contents, pp.441-452, 2005
DOI
|
4 |
권재일, “한국어 문법의 연구”, 서울:박이정, 1994
|
5 |
K. Papineni, S. Roukos, T. Ward and W. Zhu, “Blue: a method for automatic evaluation of machine translation” In Proc. of 40th Annual Meeting of the ACL, pp.311-318, 2002
|
6 |
National Institute of Standards and Technology. Machine translations benchmark tests provided by national institute of standards and technology. In http://www.nist.gov/speech/tests/mt/resources/
|
7 |
C. M. Taskiran, M. Topkara and E. J. Delp, “Attacks on linguistic steganography systems using text analysis,” SPIE Conf. On Security, Steganography and Watermarking of Multimedia Contents, pp.313-336, 2006
|
8 |
U. Topkara, M. Topkara and M. J. Atallah, “The hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural language Text through Synonym Substitutiions,” In Proc. Of ACM Multimedia and Security Conference, pp.164-174, 2006
|
9 |
M. J. Atallah, V. Raskin, M. Crogan, C. Hempelmann, F. Kerschbaum, D. Mohamed and S. Naik. “Natural language watermarking: design, analysis, and proof-of-concept implementation,” In Proc. of the International Information Hiding Workshop, pp.185-199, 2001
|
10 |
M. Atallah, V. Raskin, C. F. Hempelmann, M. Karahan, R. Sion, K. E. Triezenberg and U. Topkara, “Natural language watermarking and tamperproofing,” Lecture Notes in Computer Sciences, pp.196-212, 2002
DOI
ScienceOn
|
11 |
Osamu Takizawa, Kyoko Makino, Tsutomu Matsumoto, Hiroshi Nakagawa and Ichiro Murase, “Method of Hiding Information in Agglutinative Language Documents Using Adjustment to New Line Positions”. Knowledge-Based Intelligent Information and Engineering Systems(KES) (3) pp.1039-1048, 2005
|
12 |
M. Y. Kim, S. J. Kang and J. H. Lee, “Resolving Ambiguity in Inter-chunk Dependency Parsing,” Proc. of the Sixth Natural Language Processing Pacific Rim Symposium(NLPRS), pp.263-270, 2001
|
13 |
Y. L. Chiang, L. P. Chang, W. T. Hsieh and W. C. Chen, “Natural language watermarking using semantic substitution for Chinese text,” Lecture Notes in Computer Science, pp. 129-140, 2004
|
14 |
M. Topkara, U. Topkara and M. J. Atallah, “Words are not enough: sentence level natural language watermarking”, In Proc. of 4th ACM Workshop on Content Protection and Security (in conjunction with ACM Multimedia), pp.37-46, 2006
DOI
|