Skip to Main Content

Advertisement

Skip Nav Destination

Practical Linguistic Steganography using Contextual Synonym Substitution and a Novel Vertex Coding Method

Computational Linguistics (2014) 40 (2): 403–448.
This article has been cited by the following articles in journals that are participating in Crossref Cited-by Linking.
  • Yazhou Zhang
  • Chaoyue Huang
  • Shaoteng Liu
  • Leichao Huang
  • Tianshu Yang
  • Xinpeng Zhang
  • Hanzhou Wu
International Journal of Network Management (2024)
  • Lingyun Xiang
  • Yangfan Liu
  • Zhongliang Yang
Information Processing & Management (2024) 61 (3): 103661.
  • Lingyun Xiang
  • Chengfu Ou
  • Daojian Zeng
IEEE Signal Processing Letters (2024) 31: 261.
  • Emır Öztürk
  • Andaç Şahın Mesut
  • Özlem Aydin Fıdan
IEEE Access (2024) 12: 14248.
  • Changhao Ding
  • Zhangjie Fu
  • Qi Yu
  • Fan Wang
  • Xianyi Chen
IEEE Transactions on Cognitive and Developmental Systems (2024) 16 (2): 772.
  • Ching-Chun Chang
IEEE Transactions on Computational Social Systems (2023) 10 (2): 714.
  • Huili Wang
  • Zhongliang Yang
  • Jinshuai Yang
  • Cheng Chen
  • Yongfeng Huang
IEEE Transactions on Information Forensics and Security (2023) 18: 4870.
  • Ruth Dimes
  • Charl De Villiers
  • Li Chen
Journal of Management Accounting Research (2023) 35 (3): 75.
  • Lingyun Xiang
  • Rong Wang
  • Yuhang Liu
  • Yangfan Liu
  • Lina Tan
Computer Systems Science and Engineering (2023) 46 (2): 2383.
  • Xiaoyan Zheng
  • Hanzhou Wu
  • Thi-Thu-Huong Le
Security and Communication Networks (2022) 2022: 1.
  • Mohsen Rezvani
  • Mansoor Fateh
Signal and Data Processing (2022) 19 (1): 59.
  • Milad Taleby Ahvanooey
  • Mark Xuefang Zhu
  • Wojciech Mazurczyk
  • Qianmu Li
  • Max Kilger
  • Kim-Kwang Raymond Choo
  • Mauro Conti
Journal of Information Security and Applications (2022) 71: 103368.
  • Elmira Daiyrbayeva
  • Aigerim Yerimbetova
  • Ivan Nechta
  • Ekaterina Merzlyakova
  • Ainur Toigozhinova
  • Almas Turganbayev
Journal of Imaging (2022) 8 (10): 288.
  • Luciano Ignaczak
  • Guilherme Goldschmidt
  • Cristiano André Da Costa
  • Rodrigo Da Rosa Righi
ACM Computing Surveys (2022) 54 (7): 1.
  • Zhong-Liang Yang
  • Si-Yu Zhang
  • Yu-Ting Hu
  • Zhi-Wen Hu
  • Yong-Feng Huang
IEEE Transactions on Information Forensics and Security (2021) 16: 880.
  • R. Gurunath
  • Mohammad Fadel Jamil Klaib
  • Debabrata Samanta
  • Mohammad Zubair Khan
IEEE Access (2021) 9: 153656.
  • Ching-Chun Chang
  • Chi-Hua Chen
Security and Communication Networks (2021) 2021: 1.
  • R. Gurunath
  • Ahmed H. Alahmadi
  • Debabrata Samanta
  • Mohammad Zubair Khan
  • Abdulrahman Alahmadi
IEEE Access (2021) 9: 120869.
  • Zhongliang Yang
  • Lingyun Xiang
  • Siyu Zhang
  • Xingming Sun
  • Yongfeng Huang
IEEE Signal Processing Letters (2021) 28: 409.
  • Fufang Li
  • Han Tang
  • Yukang Zou
  • Yongfeng Huang
  • Yuanyong Feng
  • Lingxi Peng
Enterprise Information Systems (2021) 15 (7): 984.
  • Susmita Mahato
  • Danish Ali Khan
  • Dilip Kumar Yadav
Journal of King Saud University - Computer and Information Sciences (2020) 32 (2): 216.
  • Lingyun Xiang
  • Jingmin Yu
  • Chunfang Yang
  • Daojian Zeng
  • Xiaobo Shen
IEEE Access (2018) 6: 64131.
  • Lingyun Xiang
  • Wenshuai Wu
  • Xu Li
  • Chunfang Yang
Multimedia Tools and Applications (2018) 77 (21): 28969.
  • Lingyun XIANG
  • Xinhui WANG
  • Chunfang YANG
  • Peng LIU
IEICE Transactions on Information and Systems (2017) E100.D (2): 313.
  • Hui Tian
  • Jun Sun
  • Yongfeng Huang
  • Tian Wang
  • Yonghong Chen
  • Yiqiao Cai
Mobile Information Systems (2017) 2017: 1.
  • Hui Tian
  • Yanpeng Wu
  • Chin-Chen Chang
  • Yongfeng Huang
  • Yonghong Chen
  • Tian Wang
  • Yiqiao Cai
  • Jin Liu
Signal Processing (2017) 134: 9.
Close Modal

or Create an Account

Close Modal
Close Modal