Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Natural Language Watermarking and Tamperproofing
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
ISC '01 Proceedings of the 4th International Conference on Information Security
Defending email communication against profiling attacks
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Enhancing the privacy of web-based communication
WWW '05 Special interest tracks and posters of the 14th international conference on World Wide Web
Proceedings of the 2006 ACM symposium on Applied computing
Graphstega: Graph Steganography Methodology
Journal of Digital Forensic Practice
WhiteSteg: a new scheme in information hiding using text steganography
WSEAS Transactions on Computers
Nostega: A Novel Noiseless Steganography Paradigm
Journal of Digital Forensic Practice
Translation-based steganography
Journal of Computer Security - Best papers of the Sec Track at the 2006 ACM Symposium
A framework for synthetic stego
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Content-aware steganography: about lazy prisoners and narrow-minded wardens
IH'06 Proceedings of the 8th international conference on Information hiding
Comprehensive linguistic steganography survey
International Journal of Information and Computer Security
Mimimorphism: a new approach to binary code obfuscation
Proceedings of the 17th ACM conference on Computer and communications security
Headstega: e-mail-headers-based steganography methodology
International Journal of Electronic Security and Digital Forensics
Sumstega: summarisation-based steganography methodology
International Journal of Information and Computer Security
Baseline Semantic Spam Filtering
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03
A framework for avoiding steganography usage over HTTP
Journal of Network and Computer Applications
Edustega: an Education-Centric Steganography methodology
International Journal of Security and Networks
Translation-based steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
A compression-based text steganography method
Journal of Systems and Software
Jokestega: automatic joke generation-based steganography methodology
International Journal of Security and Networks
Binary program statistical features hiding through huffman obfuscated coding
ICIC'13 Proceedings of the 9th international conference on Intelligent Computing Theories
A new data hiding method via revision history records on collaborative writing platforms
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Hi-index | 0.00 |