[1] BERGMAIR R. A comprehensive bibliography of linguistic steg-anography[EB/OL].[2014-08-02]. http://www.researchgate.net/publication/228340494_A_comprehensive_bibliography_of_linguistic_steganography. [2] POR L Y, ANG T F, DELINA B. WhiteSteg: a new scheme in information hiding using text steganography[J]. WSEAS Transactions on Computers, 2008,7(6):35-745. [3] POR L Y, WONG K, CHEE K O. UniSpaCh: a text-based data hiding method using Unicode space characters[J]. Journal of Systems and Software, 2012,85(5):1075-1082. [4] PARK B, PARK J, LEE S. Data concealment and detection in microsoft Office 2007 files[J]. Digital Investigation, 2009,5(3/4):104-114. [5] CASTIGLIONE A, D'ALESSIO B, de SANTIS A, et al. New steganographic techniques for the OOXML file format[C]//Proceedings of the 2011 IFIP International Federation for Information Processing, LNCS 6908. Berlin: Springer, 2011:344-358. [6] SUI X, LUO H. A steganalysis method based on the distribution of space characters[C]//Proceedings of the 4th International Conference on Communications, Circuits and Systems. Piscataway: IEEE Press, 2006,1:54-56. [7] KEITH W. Tyrannosaurus Lex[EB/OL].[2007-11-13] http://alumni.imsa.edu/%7Ekeithw/tlex/. [8] CALVO H, BOLSHAKOV I A. Using selectional preferences for extending a synonymous paraphrasing method in steganography[EB/OL].[2006-04-28]. http://www.likufanelecom/publicati ons/24.calvo.bolshakov.pdf. [9] ZHENG X, HUANG L, CHEN Z, et al. Hiding information by context-based synonym substitution[C]//Proceedings of the 8th International Workshop on Digital Watermarking, LNCS 5703. Berlin: Springer, 2009:162-169. [10] YU Z, HUANG L, CHEN Z, et al. Detection of synonym-substitution modified articles using context information[C]//Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking. Washington, DC: IEEE Computer Society, 2008:134-139. [11] CHEN Z, HUANG L, YANG W. Detection of substitution-based linguistic steganography by relative frequency analysis[J]. Digital Investigation, 2011,8(1):68-77. [12] CHEN Z, HUANG L, MIAO H, et al. Steganalysis against substitution-based linguistic steganography based on context clusters[J]. Computers and Electrical Engineering, 2011,37(6):1071-1081. [13] XIANG L Y, SUN X M, LUO G, et al. Linguistic steganalysis using the features derived from synonym frequency[J]. Multimedia Tools and Applications, 2014,71(3):1893-1911. [14] ECMA International. Final draft standard ECMA-376 Office Open XML File Formats-Part 1[S]. 4th ed. Geneva: ECMA International Publication, 2012:247-302. [15] CHANG C C, LIN C J. LIBSVM: a library for support vector machines[EB/OL].[2013-10-23]. http://www.csie.ntu.edu.tw/~cjlin/libsvm. |