메뉴 건너뛰기




Volumn 3, Issue 5, 2011, Pages 229-235

Text watermarking algorithm based on human visual redundancy

Author keywords

Copyright protection; Digital watermarking; RGB components; Text watermarking; Visual redundancy

Indexed keywords

COLOR COMPONENT; COPYRIGHT PROTECTIONS; HUMAN EYE; HUMAN VISUAL; INFORMATION HIDING; MODIFICATION ATTACK; RESEARCH DIRECTIONS; RGB COMPONENTS; TEXT DIGITAL WATERMARKING; TEXT DOCUMENT; TEXT WATERMARKING; VISUAL REDUNDANCY;

EID: 79960122152     PISSN: 19763700     EISSN: None     Source Type: Journal    
DOI: 10.4156/aiss.vol3.issue5.26     Document Type: Article
Times cited : (16)

References (20)
  • 3
    • 0036488363 scopus 로고    scopus 로고
    • The first 50 years of electronic watermarking
    • Cox J, Miller M L, The First 50 Years of Electronic Watermarking, Applied Signal Processing, vol.12, no.2, pp.126-132, 2002.
    • (2002) Applied Signal Processing , vol.12 , Issue.2 , pp. 126-132
    • Cox, J.1    Miller, M.L.2
  • 4
    • 0032637701 scopus 로고    scopus 로고
    • Copyright protection for the electronic distribution of text documents
    • Brassil J T, Low S, Maxemchuk N F, Copyright protection for the electronic distribution of text documents, Proceedings of the IEEE, vol.87, no.7, pp.1181-1196, 1999.
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1181-1196
    • Brassil, J.T.1    Low, S.2    Maxemchuk, N.F.3
  • 6
    • 33847656645 scopus 로고    scopus 로고
    • Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
    • A. Castiglione, A. D. Santis, C. Soriente, Taking Advantages of a Disadvantage: Digital Forensics and Steganography using Document Metadata, The Journal of Systems and Software, vol. 80, no.6, pp. 750-764, 2007.
    • (2007) The Journal of Systems and Software , vol.80 , Issue.6 , pp. 750-764
    • Castiglione, A.1    Santis, A.D.2    Soriente, C.3
  • 7
    • 79960133153 scopus 로고    scopus 로고
    • The hiding virtues of ambiguity: Quantifiably resilient watermarking of natural language text through synonym substitutions
    • U. Topkara, M. Topkara, M. J. Atallah, The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions, In Proceedings of ACM Multimedia and Security Conference, Geneva, pp. 135-142, 2006.
    • (2006) Proceedings of ACM Multimedia and Security Conference, Geneva , pp. 135-142
    • Topkara, U.1    Topkara, M.2    Atallah, M.J.3
  • 8
    • 26844470147 scopus 로고    scopus 로고
    • Noun-Verb based technique of text watermarking using recursive decent semantic net parsers
    • Springer Press
    • Xingming Sun, Alex Jessey Asiimwe, Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers,Lecture Notes in Computer Science (LNCS) 3612: 958-961, Springer Press, 2005.
    • (2005) Lecture Notes In Computer Science (LNCS) , vol.3612 , pp. 958-961
    • Sun, X.1    Asiimwe, A.J.2
  • 10
    • 0035694579 scopus 로고    scopus 로고
    • Interword distance changes represented by sine waves for watermarking text images
    • D. Huang and H. Yan, Interword distance changes represented by sine waves for watermarking text images, IEEE Trans. Circuits and Systems for Video Technology, vol.11, no.12, pp.1237-1245, 2001.
    • (2001) IEEE Trans. Circuits and Systems For Video Technology , vol.11 , Issue.12 , pp. 1237-1245
    • Huang, D.1    Yan, H.2
  • 11
    • 33847748545 scopus 로고    scopus 로고
    • A new steganographic method for data hiding in microsoft word documents by a change tracking technique
    • T. Y. Liu, W. H. Tsai, A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique, IEEE Transactions on Information Forensics and Security, vol. 2, no.1, pp.24-30, 2007.
    • (2007) IEEE Transactions On Information Forensics and Security , vol.2 , Issue.1 , pp. 24-30
    • Liu, T.Y.1    Tsai, W.H.2
  • 12
    • 74849132505 scopus 로고    scopus 로고
    • Chestega: Chess steganography methodology
    • Abdelrahman Desoky, Mohamed Younis, Chestega: chess steganography methodology, Security and Communication Networks, vol. 2, no.6, pp. 555-566, 2009.
    • (2009) Security and Communication Networks , vol.2 , Issue.6 , pp. 555-566
    • Desoky, A.1    Younis, M.2
  • 13
    • 75949086264 scopus 로고    scopus 로고
    • Real-time and mpeg-1 layer iii compression resistant steganography in speech
    • M.H. Shirali-Shahreza and S. Shirali-Shahreza, Real-time and MPEG-1 layer III compression resistant steganography in speech, IET Information Security, vol. 4, no.1, pp.1-7, 2010.
    • (2010) IET Information Security , vol.4 , Issue.1 , pp. 1-7
    • Shirali-Shahreza, M.H.1    Shirali-Shahreza, S.2
  • 18
    • 47349085616 scopus 로고    scopus 로고
    • Natural language watermarking via morphosyntactic alterations
    • M. Hassan et al, Natural language watermarking via morphosyntactic alterations, ComputerSpeech and Language, vol. 23, no.10, pp.107-125, 2009.
    • (2009) ComputerSpeech and Language , vol.23 , Issue.10 , pp. 107-125
    • Hassan, M.1
  • 20
    • 79957588468 scopus 로고    scopus 로고
    • Robust vector digital watermarking using angles and a random table
    • Jungyeop Kim, Robust Vector Digital Watermarking Using Angles and a Random Table, Advances in Information Sciences and Service Sciences, vol. 2, no. 4, pp. 79-90, 2010.
    • (2010) Advances In Information Sciences and Service Sciences , vol.2 , Issue.4 , pp. 79-90
    • Kim, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.