-
1
-
-
12444277317
-
Optimizing Perceptual Shaping of a Digital Watermark Using Genetic Programming
-
Asifullah Khan, Anwar M. Mirza and Abdul Majid, "Optimizing Perceptual Shaping of a Digital Watermark Using Genetic Programming", Iranian Journal of Electrical and Computer Engineering, vol. 3, pp. 144-150, 2004.
-
(2004)
Iranian Journal of Electrical and Computer Engineering
, vol.3
, pp. 144-150
-
-
Khan, A.1
Mirza, A.M.2
Majid, A.3
-
2
-
-
77949819033
-
-
Hiding Information in Document Images, J. Brassil, S. Low, N. Maxemchuk, L. O'Gorman, Proceedings of the 29th Annual Conference on Information Sciences and Systems, Johns Hopkins University, March 1995, pp 482-489
-
"Hiding Information in Document Images," J. Brassil, S. Low, N. Maxemchuk, L. O'Gorman, Proceedings of the 29th Annual Conference on Information Sciences and Systems, Johns Hopkins University, March 1995, pp 482-489
-
-
-
-
3
-
-
0029394108
-
Electronic Marking and Identification Techniques to Discourage Document Copying
-
October
-
J. T. Brassil, S. Low, N. F. Maxemchuk, and L. O'Gorman, "Electronic Marking and Identification Techniques to Discourage Document Copying," IEEE Journal on Selected Areas in Communications, vol. 13, no. 8, October 1995, pp. 1495-1504.
-
(1995)
IEEE Journal on Selected Areas in Communications
, vol.13
, Issue.8
, pp. 1495-1504
-
-
Brassil, J.T.1
Low, S.2
Maxemchuk, N.F.3
O'Gorman, L.4
-
4
-
-
0032637701
-
Copyright Protection for the Electronic Distribution of Text Documents
-
July
-
J. T. Brassil, S. Low, and N. F. Maxemchuk, "Copyright Protection for the Electronic Distribution of Text Documents," Proceedings of the IEEE, vol. 87, no. 7, July 1999, pp.1181-1196.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1181-1196
-
-
Brassil, J.T.1
Low, S.2
Maxemchuk, N.F.3
-
6
-
-
0028496330
-
AT&T Technical Journal, September 1994
-
6
-
N. F. Maxemchuk, "Electronic Document Distribution," AT&T Technical Journal, September 1994, pp. 73-80. 6.
-
-
-
Maxemchuk, N.F.1
-
7
-
-
0031384941
-
Marking Text Documents
-
Washington, DC, Oct. 26-29
-
N. F. Maxemchuk and S. Low, "Marking Text Documents," Proceedings of the IEEE International Conference on Image Processing, Washington, DC, Oct. 26-29, 1997, pp. 13-16.
-
(1997)
Proceedings of the IEEE International Conference on Image Processing
, pp. 13-16
-
-
Maxemchuk, N.F.1
Low, S.2
-
8
-
-
0000772864
-
Document Identification for Copyright Protection Using Centroid Detection
-
Mar
-
S. H. Low, N. F. Maxemchuk, and A. M. Lapone, "Document Identification for Copyright Protection Using Centroid Detection," IEEE Transactions on Communications, Mar. 1998, vol. 46, no.3, pp 372-381.
-
(1998)
IEEE Transactions on Communications
, vol.46
, Issue.3
, pp. 372-381
-
-
Low, S.H.1
Maxemchuk, N.F.2
Lapone, A.M.3
-
9
-
-
0034499207
-
Capacity of Text Marking Channel
-
Dec
-
S. H. Low and N. F. Maxemchuk, "Capacity of Text Marking Channel," IEEE Signal Processing Letters, vol. 7, no. 12 , Dec. 2000, pp. 345 -347.
-
(2000)
IEEE Signal Processing Letters
, vol.7
, Issue.12
, pp. 345-347
-
-
Low, S.H.1
Maxemchuk, N.F.2
-
10
-
-
0035694579
-
Interword distance changes represented by sine waves for watermarking text images
-
Dec
-
D. Huang and H. Yan, "Interword distance changes represented by sine waves for watermarking text images," IEEE Trans. Circuits and Systems for Video Technology, Vol.11, No.12, pp.1237-1245, Dec 2001.
-
(2001)
IEEE Trans. Circuits and Systems for Video Technology
, vol.11
, Issue.12
, pp. 1237-1245
-
-
Huang, D.1
Yan, H.2
-
11
-
-
84932157534
-
A feature calibration method for watermarking of document images
-
T. Amano and D. Misaki, "A feature calibration method for watermarking of document images," Proceedings of ICDAR, pp.91-94, 1999.
-
(1999)
Proceedings of ICDAR
, pp. 91-94
-
-
Amano, T.1
Misaki, D.2
-
12
-
-
0033346133
-
Data embedding in text for a copier system
-
A. Bhattacharjya and H. Ancin, "Data embedding in text for a copier system", Proceedings of the ICIP, Vol.2, pp. 245-249, 1999.
-
(1999)
Proceedings of the ICIP
, vol.2
, pp. 245-249
-
-
Bhattacharjya, A.1
Ancin, H.2
-
13
-
-
23844453141
-
Watermarking text document images using edge direction histograms
-
Elsevier
-
Young-Won Kim and Il-Seok Oh," Watermarking text document images using edge direction histograms", Pattern Recognition Letters 25(2004) 1243-1251, Elsevier.
-
(2004)
Pattern Recognition Letters
, vol.25
, pp. 1243-1251
-
-
Kim, Y.-W.1
Oh, I.-S.2
-
15
-
-
8844287566
-
-
A.M. Alattar, O.M. Alattar, Watermarking electronic text documents containing justified paragraphs and irregular line spacing, Proceedings of SPIE - 5306,Security, Steganography, and Watermarking of Multimedia Contents SPIE, 5306 (June, 2004).
-
A.M. Alattar, O.M. Alattar, "Watermarking electronic text documents containing justified paragraphs and irregular line spacing", Proceedings of SPIE - Volume 5306,Security, Steganography, and Watermarking of Multimedia Contents SPIE, 5306 (June, 2004).
-
-
-
-
16
-
-
8844243984
-
Signature-Embedding In Printed Documents For Security and Forensic Applications
-
San Jose, CA, January
-
A. K. Mikkilineni et al., "Signature-Embedding In Printed Documents For Security and Forensic Applications", Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents VI, Volume 5306, San Jose, CA, January 2004, pp. 455-466.
-
(2004)
Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents VI
, vol.5306
, pp. 455-466
-
-
Mikkilineni, A.K.1
-
17
-
-
0034593185
-
Natural Language Processing for Information Assurance and Security: An Overview and Implementations
-
September, Cork, Ireland, pp
-
M. J. Atallah, C. McDonough, S. Nirenburg, and V. Raskin, "Natural Language Processing for Information Assurance and Security: An Overview and Implementations", Proceedings 9th ACM/SIGSAC New Security Paradigms Workshop, September, 2000, Cork, Ireland, pp. 51-65.
-
(2000)
Proceedings 9th ACM/SIGSAC New Security Paradigms Workshop
, pp. 51-65
-
-
Atallah, M.J.1
McDonough, C.2
Nirenburg, S.3
Raskin, V.4
-
18
-
-
77953750858
-
Natural language watermarking: Design, analysis, and a proof-of-concept implementation
-
25-27 April, Pittsburgh, PA
-
M. J. Atallah, V. Raskin, M. C. Crogan, C. F. Hempelmann, F. Kerschbaum, D. Mohamed, and S.Naik, "Natural language watermarking: Design, analysis, and a proof-of-concept implementation", Proceedings of the Fourth Information HidingWorkshop, vol. LNCS 2137, 25-27 April 2001, Pittsburgh, PA.
-
(2001)
Proceedings of the Fourth Information HidingWorkshop
, vol.LNCS 2137
-
-
Atallah, M.J.1
Raskin, V.2
Crogan, M.C.3
Hempelmann, C.F.4
Kerschbaum, F.5
Mohamed, D.6
Naik, S.7
-
19
-
-
47349085616
-
Natural language watermarking via morphosyntactic alterations
-
Hassan M. Meral et al., "Natural language watermarking via morphosyntactic alterations", Computer Speech and Language, 23, 107-125, 2009.
-
(2009)
Computer Speech and Language
, vol.23
, pp. 107-125
-
-
Meral, H.M.1
-
20
-
-
77953186475
-
Syntactic tools for text watermarking
-
Jan, San Jose
-
Hasan M. Meral, et al. , Syntactic tools for text watermarking, 19th SPIE Electronic Imaging Conf. 6505: Security, Steganography, and Watermarking of Multimedia Contents, Jan. 2007, San Jose.
-
(2007)
19th SPIE Electronic Imaging Conf. 6505: Security, Steganography, and Watermarking of Multimedia Contents
-
-
Meral, H.M.1
-
21
-
-
77949778830
-
Text watermarking by syntactic analysis
-
Heraklion, Greece, July 23, 25
-
Kim, M., "Text watermarking by syntactic analysis". In Proceedings of the 12th WSEAS international Conference on Computers (Heraklion, Greece, July 23 - 25, 2008, pp. 904-909.
-
(2008)
Proceedings of the 12th WSEAS international Conference on Computers
, pp. 904-909
-
-
Kim, M.1
-
22
-
-
0034593185
-
Natural Language Processing for Information Assurance and Security: An Overview and Implementations
-
September, Cork, Ireland, pp
-
M. Atallah, C. McDonough, S. Nirenburg, and V. Raskin, "Natural Language Processing for Information Assurance and Security: An Overview and Implementations," Proceedings 9th ACM/SIGSAC New Security Paradigms Workshop, September, 2000, Cork, Ireland, pp. 51-65.
-
(2000)
Proceedings 9th ACM/SIGSAC New Security Paradigms Workshop
, pp. 51-65
-
-
Atallah, M.1
McDonough, C.2
Nirenburg, S.3
Raskin, V.4
-
23
-
-
35248834521
-
Natural Language Watermarking and Tamperproofing
-
Fifth Information Hiding Workshop, October, Noordwijkerhout, The Netherlands, Springer-Verlag
-
M. Atallah, V. Raskin, C. F. Hempelmann, M. Karahan, R. Sion, U. Topkara, and K. E. Triezenberg, "Natural Language Watermarking and Tamperproofing", Fifth Information Hiding Workshop, vol. LNCS, 2578, October, 2002, Noordwijkerhout, The Netherlands, Springer-Verlag.
-
(2002)
LNCS
, vol.2578
-
-
Atallah, M.1
Raskin, V.2
Hempelmann, C.F.3
Karahan, M.4
Sion, R.5
Topkara, U.6
Triezenberg, K.E.7
-
24
-
-
21844446383
-
Natural language watermarking
-
M. Topkara, C. M. Taskiran, and E. Delp, "Natural language watermarking," Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents VII, 2005.
-
(2005)
Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents
, vol.7
-
-
Topkara, M.1
Taskiran, C.M.2
Delp, E.3
-
25
-
-
33750907773
-
The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions
-
Geneva
-
U. Topkara, M. Topkara, M. J. Atallah, "The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions". In Proceedings of ACM Multimedia and Security Conference, Geneva, 2006.
-
(2006)
Proceedings of ACM Multimedia and Security Conference
-
-
Topkara, U.1
Topkara, M.2
Atallah, M.J.3
-
26
-
-
26844470147
-
Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers
-
Springer Press, August
-
Xingming Sun, Alex Jessey Asiimwe. Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers. Lecture Notes in Computer Science (LNCS) 3612: 958-961, Springer Press, August 2005.
-
(2005)
Lecture Notes in Computer Science (LNCS
, vol.3612
, pp. 958-961
-
-
Sun, X.1
Jessey Asiimwe, A.2
-
27
-
-
34547315631
-
Words Are Not Enough: Sentence Level Natural Language Watermarking
-
Santa Barbara, CA, October 27, MCPS 2006
-
M. Topkara, U. Topkara, M. J. Atallah, "Words Are Not Enough: Sentence Level Natural Language Watermarking", Proceedings of ACM Workshop on Content Protection and Security (in conjuction with ACM Multimedia), Santa Barbara, CA, October 27, 2006. MCPS 2006
-
(2006)
Proceedings of ACM Workshop on Content Protection and Security (in conjuction with ACM Multimedia)
-
-
Topkara, M.1
Topkara, U.2
Atallah, M.J.3
-
28
-
-
34548292448
-
-
Topkara, M., Topraka, U., Atallah, M.J., 2007. Information hiding through errors: a confusing approach. In: Delp III, E.J., Wong, P.W. (Eds.), Security, Steganography, and watermarking of Multimedia Contents IX. Proceedings of SPIE-IS&T Electronic Imaging SPIE 6505. pp. 65050V-1-65050V-12.
-
Topkara, M., Topraka, U., Atallah, M.J., 2007. Information hiding through errors: a confusing approach. In: Delp III, E.J., Wong, P.W. (Eds.), Security, Steganography, and watermarking of Multimedia Contents IX. Proceedings of SPIE-IS&T Electronic Imaging SPIE 6505. pp. 65050V-1-65050V-12.
-
-
-
|