共 16 条
[1]
Aabed MA, 2007, ICSPC: 2007 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, P756
[2]
Adnan G., 2010, Bahria University Journal of Information Communication Technology, V3, P68
[3]
Alginahi Yasser M., 2014, International Journal of Computer and Electrical Engineering, V6, P381, DOI 10.7763/ijcee.2014.v6.857
[4]
Alginahi YM, 2013, 2013 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), P301, DOI 10.1109/ICECCO.2013.6718288
[5]
Alotaibi R.A., 2015, INT J ARTITICIAL INT, V6, P01, DOI 10.5121/ijaia.2015.6401
[6]
Utilizing Word Space with Pointed and Un-pointed Letters for Arabic Text Watermarking
[J].
2016 UKSIM-AMSS 18TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM),
2016,
:111-116
[8]
Bennett Krista, 2004, Linguistic steganography: survey, analysis, and robustness concerns for hiding information in text
[9]
Bensaad M. L., 2011, 2011 International Conference on Innovations in Information Technology (IIT), P433, DOI 10.1109/INNOVATIONS.2011.5893864
[10]
Cox I, 2007, Digital watermarking and steganography