[1]VENKATESAN R,KOON S M,JAKUBOWSKI M H,et al.Robust image hashing[C]// Proceedings of IEEE International Conference on Image Processing.Piscataway,NJ:IEEE Press,2000:664-666.[2]程玉柱,孙星明,黄华军.一种新的基于混沌映射的文本零水印算法[J].计算机应用,2005,25(12):2753-2754,2758.[3]程玉柱.基于汉字数学表达式的中文文本零水印方法研究[D].长沙:湖南大学,2005.[4]鲁芳.多重文本数字水印技术研究[D].长沙:湖南大学,2005.[5]CHEN Z L,HUANG L S,YANG W.Detection of substitution-based linguistic steganography by relative frequency analysis [J].Digital Investigation,2011,8(1):68-77.[6]罗纲,孙星明,向凌云,等.针对同义词替换信息隐藏的检测方法研究[J].计算机研究与发展,2008,45(10):1696-1703.[7]TASKIRAN C M,TOPKARA U,TOPKARA M,et al.Attacks on lexical natural language steganography systems[C]// SPIE International Conference on Security,Steganography,and Watermarking of Multimedia Contents.San Jose:SPIE,2006:6072-6080.[8]HE L,GUI X L,JIN Y P.Summary attack on spread spectrum vector natural language watermarking [J].Journal of Computational Information Systems,2012,8(4):1663-1670.[9]ATALLAH M,RASKIN V,CROGAN M C,et al.Natural language watermarking:design,analysis,and a proof-of-concept implementation[C]// Proceedings of the 4th International Workshop,IH 2001 Pittsburgh,LNCS 2137.Berlin:Springer-Verlag,2001:185-200.[10]ATALLAH M,RASKIN V,HEMPELMANN C F,et al.Natural language watermarking and tamper proofing[C]// Proceedings of IH'02 Revised Papers from the 5th International Workshop on Information Hiding,LNCS 2578.Berlin:Springer-Verlag,2002:196-212.[11]CHAND V,ORGUN C O.Exploiting linguistic features in lexical steganography:design and proof-of-concept implementation[C]// Proceedings of the 39th Hawaii International Conference on System Sciences.Washington,DC:IEEE Computer Society,2006:126b.[12]甘灿,孙星明,刘玉玲,等.一种改进的基于同义词替换的中文文本信息隐藏方法[J].东南大学学报:自然科学版,2007,37(S1):137-140.[13]国家语委现代汉语语料库[EB/OL].[2012-01-16].http://www.chineseldc.org/resourse.asp. |