ACKNOWLEDGMENTS
This research is supported by Key Program of National Natural Science Foundation of China (No. 60736016), National Basic Research Program of China (No. 2006CB303000), and National Natural Science Foundation of China (No. 60573045).
REFERENCES
Bergmair, R., 2007. A comprehensive bibliography of linguistic steganography. Proceedings of the 9th Conference on Security, Steganigraphy and Watermarking of Multimedia Contents, February 2007, USA
Chapman M.T. and G.I. Davida, 1997. Hiding the hidden: A software system for concealing ciphertext as innocuous text. Proceedings of the 1st International Conference on Information and Communications Security, November 11-14, 1997, Springer, PP: 335-345.
Chapman, M.T. and G.I. Davida, 1997. Nicetext. August 1997.http://www.nicetext.com/.
Chapman, M.T. and G.I. Davida, 2002. Plausible deniability using automated linguistic steganography. Lecture Notes Comput. Sci., 2437: 276-287.
Chapman, M.T., G.I. Davida and M. Rennhard, 2001. A practical and effective approach to large-scale automated linguistic steganography. Lecture Notes Comput. Sci., 2200: 156-165.
Chiang, Y.L., L.P. Chang, W.T. Hsieh and W.C. Chen, 2004. Natural language watermarking using semantic substitution for Chinese text. Lecture Notes Comput. Sci., 2939: 129-140.
EI-Kwae, E.A. and L. Cheng, 2002. HIT: A new approach for hiding multimedia information in text. Proc. SPIE., 4675: 132-140.
Gmbh, S., 2000. Sams big play maker. http://www.scramdisk.clara.net/play/playmaker.html.
Maher, K., 1995. Texto. http://www.ecn.org/crypto/soft/texto.zip.
Murphy, B. and C. Vogel, 2007. The syntax of concealment: Reliable methods for plain text information hiding. Proceedings of 9th Conference on Security, Steganography and Watermarking of Multimedia Contents, San Jose, CA.
Petitcolas, F.A.P., R.J. Anderson and M.G. Kuhn, 1999. Information hiding-a survey. Proc. IEEE, 87: 1062-1078.
Topkara, M., C. Taskiran and E.J. Delp, 2004. Natural language watermarking. Proc. SPIE, 5681: 441-452.
Topkara, M., G. Riccardi, D. Hakkani-Tur and M.J. Atallah, 2006. Natural language watermarking: Challenges in building a practical system. Proceedings of the SPIE International Conference on Security, Steganography and Watermarking of Multimedia Contents, January 15-19, 2006 San Jose, CA., pp: 720
Toutanova, K., D. Klein, C.D. Manning and Y. Singer, 2003. Feature-rich part-of-speech tagging with a cyclic dependency network. Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology, Volume 1, May 27-June 1, 2003, Edmonton, Canadada, pp: 173-180.
Walker, J., 1994. Steganosaurus. http://www.fourmilab.ch/stego/ stego.shar.gz.
Wayner, P., 1992. Mimic functions. Cryptologia, 16: 193-214.
Wayner, P., 1995. Strong theoretical steganography. Cryptologia, 19: 285-299.
Wayner, P., 1997. Mimicry applet. http://www.wayner.org/texts/mimic.
Wayner, P., 1999. Mimic functions and tractability. Technical Report, Cornell University, Department of Computer Science.
Wayner, P., 2002. Disappearing Cryptography: Information Hiding: Steganography and Watermarking. 2nd Edn., Morgan-Kaufmann, San Mateo, CA., pp: 81-128.
Zhang, H.P., T. Liu, J.S. Ma and X.T. Liao, 2005. Chinese word segmentation with multiple postprocessors in HIT-IRLab. Proceedings of SIGHAN, pp: 172-175.
Do'stlaringiz bilan baham: |