메뉴 건너뛰기




Volumn , Issue , 2009, Pages 230-234

A review of digital watermarking techniques for text documents

Author keywords

Copyright protection; Information security; Text structure; Watermarking

Indexed keywords

COPYRIGHT PROTECTIONS; DIGITAL WATERMARKING TECHNIQUE; IMAGE-BASED; INFORMATION SECURITY; PLAIN TEXT; SEMANTIC APPROACH; SYNTACTIC APPROACH; TEXT DOCUMENT; TEXT STRUCTURE; TEXT WATERMARKING; WATERMARKING TECHNIQUES;

EID: 77949791448     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIMT.2009.11     Document Type: Conference Paper
Times cited : (74)

References (31)
  • 1
    • 12444277317 scopus 로고    scopus 로고
    • Optimizing Perceptual Shaping of a Digital Watermark Using Genetic Programming
    • Asifullah Khan, Anwar M. Mirza and Abdul Majid, "Optimizing Perceptual Shaping of a Digital Watermark Using Genetic Programming", Iranian Journal of Electrical and Computer Engineering, vol. 3, pp. 144-150, 2004.
    • (2004) Iranian Journal of Electrical and Computer Engineering , vol.3 , pp. 144-150
    • Khan, A.1    Mirza, A.M.2    Majid, A.3
  • 2
    • 77949819033 scopus 로고    scopus 로고
    • Hiding Information in Document Images, J. Brassil, S. Low, N. Maxemchuk, L. O'Gorman, Proceedings of the 29th Annual Conference on Information Sciences and Systems, Johns Hopkins University, March 1995, pp 482-489
    • "Hiding Information in Document Images," J. Brassil, S. Low, N. Maxemchuk, L. O'Gorman, Proceedings of the 29th Annual Conference on Information Sciences and Systems, Johns Hopkins University, March 1995, pp 482-489
  • 4
    • 0032637701 scopus 로고    scopus 로고
    • Copyright Protection for the Electronic Distribution of Text Documents
    • July
    • J. T. Brassil, S. Low, and N. F. Maxemchuk, "Copyright Protection for the Electronic Distribution of Text Documents," Proceedings of the IEEE, vol. 87, no. 7, July 1999, pp.1181-1196.
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1181-1196
    • Brassil, J.T.1    Low, S.2    Maxemchuk, N.F.3
  • 6
    • 0028496330 scopus 로고    scopus 로고
    • AT&T Technical Journal, September 1994
    • 6
    • N. F. Maxemchuk, "Electronic Document Distribution," AT&T Technical Journal, September 1994, pp. 73-80. 6.
    • Maxemchuk, N.F.1
  • 8
    • 0000772864 scopus 로고    scopus 로고
    • Document Identification for Copyright Protection Using Centroid Detection
    • Mar
    • S. H. Low, N. F. Maxemchuk, and A. M. Lapone, "Document Identification for Copyright Protection Using Centroid Detection," IEEE Transactions on Communications, Mar. 1998, vol. 46, no.3, pp 372-381.
    • (1998) IEEE Transactions on Communications , vol.46 , Issue.3 , pp. 372-381
    • Low, S.H.1    Maxemchuk, N.F.2    Lapone, A.M.3
  • 9
    • 0034499207 scopus 로고    scopus 로고
    • Capacity of Text Marking Channel
    • Dec
    • S. H. Low and N. F. Maxemchuk, "Capacity of Text Marking Channel," IEEE Signal Processing Letters, vol. 7, no. 12 , Dec. 2000, pp. 345 -347.
    • (2000) IEEE Signal Processing Letters , vol.7 , Issue.12 , pp. 345-347
    • Low, S.H.1    Maxemchuk, N.F.2
  • 10
    • 0035694579 scopus 로고    scopus 로고
    • Interword distance changes represented by sine waves for watermarking text images
    • Dec
    • D. Huang and H. Yan, "Interword distance changes represented by sine waves for watermarking text images," IEEE Trans. Circuits and Systems for Video Technology, Vol.11, No.12, pp.1237-1245, Dec 2001.
    • (2001) IEEE Trans. Circuits and Systems for Video Technology , vol.11 , Issue.12 , pp. 1237-1245
    • Huang, D.1    Yan, H.2
  • 11
    • 84932157534 scopus 로고    scopus 로고
    • A feature calibration method for watermarking of document images
    • T. Amano and D. Misaki, "A feature calibration method for watermarking of document images," Proceedings of ICDAR, pp.91-94, 1999.
    • (1999) Proceedings of ICDAR , pp. 91-94
    • Amano, T.1    Misaki, D.2
  • 12
    • 0033346133 scopus 로고    scopus 로고
    • Data embedding in text for a copier system
    • A. Bhattacharjya and H. Ancin, "Data embedding in text for a copier system", Proceedings of the ICIP, Vol.2, pp. 245-249, 1999.
    • (1999) Proceedings of the ICIP , vol.2 , pp. 245-249
    • Bhattacharjya, A.1    Ancin, H.2
  • 13
    • 23844453141 scopus 로고    scopus 로고
    • Watermarking text document images using edge direction histograms
    • Elsevier
    • Young-Won Kim and Il-Seok Oh," Watermarking text document images using edge direction histograms", Pattern Recognition Letters 25(2004) 1243-1251, Elsevier.
    • (2004) Pattern Recognition Letters , vol.25 , pp. 1243-1251
    • Kim, Y.-W.1    Oh, I.-S.2
  • 15
    • 8844287566 scopus 로고    scopus 로고
    • A.M. Alattar, O.M. Alattar, Watermarking electronic text documents containing justified paragraphs and irregular line spacing, Proceedings of SPIE - 5306,Security, Steganography, and Watermarking of Multimedia Contents SPIE, 5306 (June, 2004).
    • A.M. Alattar, O.M. Alattar, "Watermarking electronic text documents containing justified paragraphs and irregular line spacing", Proceedings of SPIE - Volume 5306,Security, Steganography, and Watermarking of Multimedia Contents SPIE, 5306 (June, 2004).
  • 19
    • 47349085616 scopus 로고    scopus 로고
    • Natural language watermarking via morphosyntactic alterations
    • Hassan M. Meral et al., "Natural language watermarking via morphosyntactic alterations", Computer Speech and Language, 23, 107-125, 2009.
    • (2009) Computer Speech and Language , vol.23 , pp. 107-125
    • Meral, H.M.1
  • 22
    • 0034593185 scopus 로고    scopus 로고
    • Natural Language Processing for Information Assurance and Security: An Overview and Implementations
    • September, Cork, Ireland, pp
    • M. Atallah, C. McDonough, S. Nirenburg, and V. Raskin, "Natural Language Processing for Information Assurance and Security: An Overview and Implementations," Proceedings 9th ACM/SIGSAC New Security Paradigms Workshop, September, 2000, Cork, Ireland, pp. 51-65.
    • (2000) Proceedings 9th ACM/SIGSAC New Security Paradigms Workshop , pp. 51-65
    • Atallah, M.1    McDonough, C.2    Nirenburg, S.3    Raskin, V.4
  • 23
    • 35248834521 scopus 로고    scopus 로고
    • Natural Language Watermarking and Tamperproofing
    • Fifth Information Hiding Workshop, October, Noordwijkerhout, The Netherlands, Springer-Verlag
    • M. Atallah, V. Raskin, C. F. Hempelmann, M. Karahan, R. Sion, U. Topkara, and K. E. Triezenberg, "Natural Language Watermarking and Tamperproofing", Fifth Information Hiding Workshop, vol. LNCS, 2578, October, 2002, Noordwijkerhout, The Netherlands, Springer-Verlag.
    • (2002) LNCS , vol.2578
    • Atallah, M.1    Raskin, V.2    Hempelmann, C.F.3    Karahan, M.4    Sion, R.5    Topkara, U.6    Triezenberg, K.E.7
  • 25
    • 33750907773 scopus 로고    scopus 로고
    • The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions
    • Geneva
    • U. Topkara, M. Topkara, M. J. Atallah, "The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions". In Proceedings of ACM Multimedia and Security Conference, Geneva, 2006.
    • (2006) Proceedings of ACM Multimedia and Security Conference
    • Topkara, U.1    Topkara, M.2    Atallah, M.J.3
  • 26
    • 26844470147 scopus 로고    scopus 로고
    • Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers
    • Springer Press, August
    • Xingming Sun, Alex Jessey Asiimwe. Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers. Lecture Notes in Computer Science (LNCS) 3612: 958-961, Springer Press, August 2005.
    • (2005) Lecture Notes in Computer Science (LNCS , vol.3612 , pp. 958-961
    • Sun, X.1    Jessey Asiimwe, A.2
  • 28
    • 34548292448 scopus 로고    scopus 로고
    • Topkara, M., Topraka, U., Atallah, M.J., 2007. Information hiding through errors: a confusing approach. In: Delp III, E.J., Wong, P.W. (Eds.), Security, Steganography, and watermarking of Multimedia Contents IX. Proceedings of SPIE-IS&T Electronic Imaging SPIE 6505. pp. 65050V-1-65050V-12.
    • Topkara, M., Topraka, U., Atallah, M.J., 2007. Information hiding through errors: a confusing approach. In: Delp III, E.J., Wong, P.W. (Eds.), Security, Steganography, and watermarking of Multimedia Contents IX. Proceedings of SPIE-IS&T Electronic Imaging SPIE 6505. pp. 65050V-1-65050V-12.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.