Miller, G.A.: WordNet: a lexical database for English. ACM, New York (2016)įridrich, J., Filler, T.: Practical methods for minimizing embedding impact in steganography (2007) In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. Zhao, Z., Guan, Q., Zhao, X.: Constructing near-optimal double-layered syndrome-trellis codes for spatial steganography. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security. Huang, F., Luo, W., Huang, J., Shi, Y.Q.: Distortion function designing for JPEG steganography with uncompressed side-image. 1–6, December 2010įiller, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. In: 2010 IEEE International Workshop on Information Forensics and Security, pp. arXiv preprint arXiv:1301.3781 (2013)įiller, T., Fridrich, J.: Minimizing additive distortion functions with non-binary embedding operation in steganography. Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2009, pp. Mikolov, T., Kopecky, J., Burget, L., Glembek, O., et al.: Neural network based language models for highly inflective languages. thesis, Masters thesis, Brno University of Technology (2007) Mikolov, T.: Language Modeling for Speech Recognition in Czech. 14(2), 179–211 (1990)īengio, Y., Ducharme, R., Vincent, P., Jauvin, C.: A neural probabilistic language model. In: Parallel Distributed Processing: Explorations in the Microstructure of Cognition 1 (1985)Įlman, J.L.: Finding structure in time. Hinton, G., Rumelhart, D., Williams, R.: Learning internal representations by back-propagating errors. Hinton, G.E.: Distributed representations (1984) Xiang, L., Sun, X., Luo, G., Xia, B.: Linguistic steganalysis using the features derived from synonym frequency. In: Innovative Technologies in Intelligent Systems and Industrial Applications, CITISIA 2009, pp. Muhammad, H.Z., Rahman, S.M.S.A.A., Shakil, A.: Synonym based malay linguistic text steganography. In: IEEE International Conference on Multimedia and Expo, pp. Yuling, L., Xingming, S., Can, G., Hong, W.: An efficient linguistic steganography for chinese text. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2008, pp. Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A new synonym text steganography. Sadek, M.M., Khalifa, A.S., Mostafa, M.G.: Robust video steganography algorithm using adaptive skin-tone detection. In: 2016 18th International Conference on Advanced Communication Technology (ICACT), pp. Tayel, M., Gamal, A., Shawky, H.: A proposed implementation method of an audio steganography technique. IEEE (2017)ĭenemark, T., Bas, P., Fridrich, J.: Natural steganography in JPEG compressed images. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp. Huanhuan, H., Xin, Z., Weiming, Z., Nenghai, Y.: Adaptive text steganography by exploring statistical and linguistical distortion. Shivani, Kumar, V., Batham, S.: A novel approach of bulk data hiding using text steganography.
0 Comments
Leave a Reply. |