References
- M. J. Atallah, V. Raskin, M. Crogan, C. Hempelmann, F. Kerschbaum and D. Mohamed, "Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation," in Proc. of the 4th International Workshop on Information Hiding, Pittsburgh, PA, USA, pp. 185-200, 2001.
- M. Chapman, "Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text," Information and Communications Security, pp. 335-345, 1997.
- Y. L. Chiang, L. P. Chang, W. T. Hsieh and W. C. Chen, "Natural Language Watermarking Using Semantic Substitution for Chinese Text," in Proc. of IWDW2003, Seoul, Korea, pp. 129-140, 2003.
- R. G. Kammer, "Data Encryption Standard (DES)", National Institute of Standards and Technology, 1999.
- C. C. Chang, P. Y. Pai, C. M. Yeh, and Y. K. Chan, "A High Payload Frequency-based Reversible Image Hiding Method," Information Sciences, vol. 180, no. 11, pp. 2286-2298, 2010. https://doi.org/10.1016/j.ins.2010.01.034
- C. C. Chang and T. D. Kieu, "A Reversible Data Hiding Scheme Using Complementary Embedding Strategy," Information Sciences, vol. 180, no. 16, pp. 3045-3058, 2010. https://doi.org/10.1016/j.ins.2010.03.027
- C. C. Chang, Y. P. Hsieh, and C. Y. Lin, "Lossless Data Embedding with High Embedding Capacity Based on Declustering for VQ-compressed Codes," IEEE Trans. Inf. Forensics Security, vol, 2, no. 3, pp. 341-349, 2007. https://doi.org/10.1109/TIFS.2007.902683
- C. C. Chang and C.Y. Lin, "Reversible Steganographic Method Using SMVQ Approach Bases on Declustering," Information Sciences, vol. 177, no. 8, pp. 1796-1805, 2007. https://doi.org/10.1016/j.ins.2006.09.014
- K. Maher, TEXTO,
- B. Murphy and C. Vogel, "The Syntax of Concealment: Reliable Methods for Plain Text Information Hiding," International Society for Optics and Photonics, 2007.
- R. Rivest, A. Shamir and L. Adleman, "Cryptographic Communications System and Method", U.S. Patent 4405829, 1977.
- X. M. Sun, H. W. Chen, L. H. Yang, and Y. Y. Tang, "Mathematical Representation of a Chinese Character and its Applications," International Journal of Pattern Recognition and Artificial Intelligence, vol. 16, no. 8, pp. 735-747, 2002. https://doi.org/10.1142/S0218001402001939
- X. M. Sun, G. Luo, and H. J. Huang, "Component-based Digital Watermarking of Chinese Texts," in Proc. of the 3rd International Conference on Information Security, Shanghai, China, pp. 76-81, 2004.
- Z. H. Wang , C. C. Chang, C. C. Lin, and M. C. Li, "A Reversible Information Hiding Scheme Using Left-Right and Up-Down Chinese Character Representation" The Journal of Systems and Software, vol. 82, no. 8, pp. 1362-1369, 2009. https://doi.org/10.1016/j.jss.2009.04.045
- O. Vybornova and B. Macq, "Natural Language Watermarking and Robust Hashing Based on Presuppositional Analysis," in Proc. of the IEEE International Conference on Information Reuse and Integration (IRI 2007), Las Vegas, Nevada, USA, pp. 177-182, 2007.
- K. Winstein, "Lexical Steganography through Adaptive Modulation of the Word Choice Hash,".
- S. F. Wu and L. S. Huang, "Research on Information Hiding," US-China Education Review, pp. 77-81, 2003.
- "Spam Mimic," 2000.
- P. Wayner, "Mimic Functions," Cryptologia XVI, pp. 193-214, 1992.