Suvamoy Changder, Narayan C. Debnath, and Debidas Ghosh
[1] C. Cachin, An information-theoretic model for steganography,Proc. 2nd Information Hiding Workshop, Portland, USA, 1998,306–318. [2] R. Chandramouli, M. Kharrazi, and N. Memon, Imagesteganography and steganalysis: Concepts and practice, Proc.IWDW and LNCS, Seoul, Korea, 2004, 35–49. [3] N.F. Johnson and S. Jajodia, Staganalysis: The investigation ofhiding information, Proc. Information Technology Conference,IEEE, Syracuse, NY, USA, 1998, 113–116. [4] D. Artz, Digital steganography: Hiding data within data,IEEE Internet Computing, 5(3), 2001, 75–80. [5] Herodotus, The Histories (London: Penguin Books, 1996).Translated by Aubrey de S´elincourt. [6] G. Simmons, The prisoners problem and the subliminal channel,Proc. CRYPTO’83, Santa Barbara, CA, 1983, 51–67. [7] J. Chen, T.S. Chen, and M.W. Cheng, A new data hidingscheme in binary image, Proc. Fifth International Symposiumon Multimedia Software Engineering, Taichung, Taiwan, 2003,88–93. [8] G. Do¨err and J.L. Dugelay, A guide tour of video watermarking,Signal Processing: Image Communication, 18(4), 2003, 263–282. [9] G. Do¨err and J.L. Dugelay, Security pitfalls of frame by-frameapproaches to video watermarking, IEEE Transactions onSignal Processing, Supplement on Secure Media, 52(10), 2004,2955–2964. [10] K. Gopalan, Audio steganography using bit modification, Proc.IEEE International Conf. on Acoustics, Speech, and SignalProcessing, ICASSP ’03, Hong Kong, China, 2003, 421–424. [11] J.T. Brassil, S. Low, N.F. Maxemchuk, and L. O’Gorman,Electronic marking and identification techniques todiscourage document copying, IEEE Journal on Selected Areasin Communications, 13(8), 1995, 1495–1504. [12] P. Wayner, Mimic functions, International Journal of Cryp-tologia, 16(3), 1992, 193–214. [13] M.T. Chapman, Hiding the hidden: A software system forconcealing ciphertext as innocuous text, Master’s Thesis, Uni-versity of Wisconsin-Milwaukee, 1997. [14] P. Meng, L. Huang, Z. Chen, W. Yang, and D. Li, Linguisticsteganography detection based on perplexity, Proc. Interna-tional Conf. on MultiMedia and Information Technology, ThreeGorges, China, 2008, 217–220. [15] K. Winstein, Lexical steganography through adaptive modula-tion of the word choice hash, http://alumni.imsa.edu/∼keithw/tlex/lsteg.pdf, last visited May 2010. [16] W. Shu-feng and Huang Liu-sheng, Research on informationhiding, Degree of Master, University of Science and Technologyof China, 2003.8 [17] T. Moerland, Steganography and steganalysis, www.liacs.nl/home/tmoerlan/privtech.pdf, 2003, last visited December,2007. [18] S.H. Low, N.F. Maxemchuk, J.T. Brassil, and L. O’Gorman,Document marking and identification using both line and wordshifting, Proc. of the Fourteenth Annual Joint Conf. of the IEEEComputer and Communications Societies (INFOCOM ’95),Boston, MA, 1995, 2, 853–860. [19] A.M. Alattar and O.M. Alattar, Watermarking electronic textdocuments containing justified paragraphs and irregular linespacing, Proc. SPIE – Volume 5306, Security, Steganography,and Watermarking of Multimedia Contents VI, San Jose, CA,2004, 685–695. [20] K. Bennett, Linguistic steganography: Survey, analysis, androbustness concerns for hiding information in text, PurdueUniversity, CERIAS Tech. Report 2004-13, 2004. [21] Y. Kim, K. Moon, and I. Oh, A text watermarking algorithmbased on word classification and inter-word space statistics,Proc. Seventh International Conf. on Document Analysis andRecognition (ICDAR’03), Edinburgh, Scotland, 2003, 775–779. [22] K. Rabah, Steganography – the art of hiding data, InternationalJournal of Information Technology, 3(3), 2004, 245–269. [23] M.H. Shirali-Shahreza and M. Shirali-Shahreza, A new ap-proach to Persian/Arabic text steganography, Proc. 5thIEEE/ACIS International Conf. on Computer and InformationScience, Honolulu, HI, 2006, 310–315. [24] D. Huang and H. Yan, Interword distance changes representedby sine waves for watermarking text images, IEEE Transactionson Circuits and Systems for Video Technology, 11(12), 2001,1237–1245. [25] S. Changder and N.C. Debnath, A new approach for steganog-raphy in Bengali text, International Journal of ComputationalMethods in Science and Engineering (JCMSE), 9(1,2 S1),2009, 111–122. [26] S. Changder, N.C. Debnath, and D. Ghosh, Hindi textsteganography – An approach to information hiding, Inter-national Journal of Computational Methods in Science andEngineering (JCMSE), 10(1,2 S1), 2010, 85–96. [27] S. Changder, N.C. Debnath, and D.Ghosh, Linguistic approachfor text steganography through Indian text, Proc. of IEEEInt. Conf. on Computer Technology and Development (ICCTD2010), Cairo, Egypt, 2010, 318–322. [28] S. Changder, N.C. Debnath, and D. Ghosh, LCS based textsteganography through Indian languages, Proc. 3rd IEEEInt. Conf. on Computer Science and Information Technology(ICCSIT 2010), Chengdu, China, 8, 2010, 53–58. [29] C. Zhi-li, H. Liu-sheng, Y. Zhen-shan, Z. Xin-xin, and Z. Xue-ling, Effective linguistic steganography detection, Proc. 2008IEEE 8th Int. Conf. on Computer and Information TechnologyWorkshops, Sydney, QLD, 2008, 224–229. [30] www.languageinindia.com/feb2006/bengaliinterrogative1.html,last visited Feb’10.
Important Links:
Go Back