-
1
-
-
77949791448
-
A review of digital watermarking techniques for text documents
-
Jeju Island, South Korea
-
Z. Jalil and A. Mirza, "A review of digital watermarking techniques for text documents," in International Conference on Information and Multimedia Technology. ICIMT '09., Jeju Island, South Korea, 2009, pp. 230-234.
-
(2009)
International Conference on Information and Multimedia Technology. ICIMT '09
, pp. 230-234
-
-
Jalil, Z.1
Mirza, A.2
-
2
-
-
85013855044
-
-
2nd ed. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc.
-
I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, 2nd ed. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2008.
-
(2008)
Digital Watermarking and Steganography
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
Fridrich, J.4
Kalker, T.5
-
3
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. Cox, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, vol. 6, pp. 1673-1687, 1997.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, pp. 1673-1687
-
-
Cox, I.1
-
4
-
-
11844303521
-
Group-oriented fingerprinting for multimedia forensics
-
W. Jane, M. Wu, W. Trappe, and L. Ray, "Group-oriented fingerprinting for multimedia forensics," EURASIP Applied Signal Processing, vol. 2004, pp. 2153-2173, 2004.
-
(2004)
EURASIP Applied Signal Processing
, vol.2004
, pp. 2153-2173
-
-
Jane, W.1
Wu, M.2
Trappe, W.3
Ray, L.4
-
5
-
-
85032751604
-
Collusion-resistant fingerprinting for multimedia
-
M. Wu, W. Trappe, J. Wang, and K. Liu, "Collusion-resistant fingerprinting for multimedia," IEEE Signal Processing Magazine, vol. 21, no. 2, pp. 15-27, 2004.
-
(2004)
IEEE Signal Processing Magazine
, vol.21
, Issue.2
, pp. 15-27
-
-
Wu, M.1
Trappe, W.2
Wang, J.3
Liu, K.4
-
6
-
-
77949429748
-
Performance analysis and evaluation of text watermarking
-
Wuhan, China
-
X. Zhou, Z. Wang, W. Zhao, S. Wang, and J. Yu, "Performance analysis and evaluation of text watermarking," in International Symposium on Computer Network and Multimedia Technology., Wuhan, China, 2009, pp. 1-4.
-
(2009)
International Symposium on Computer Network and Multimedia Technology
, pp. 1-4
-
-
Zhou, X.1
Wang, Z.2
Zhao, W.3
Wang, S.4
Yu, J.5
-
7
-
-
84892622093
-
A collusion-resistant fingerprinting system for restricted distribution of digital documents
-
M. D. Munoz-Hernandez, J. J. Garcia-Hernandez, and M. Morales- Sandoval, "A collusion-resistant fingerprinting system for restricted distribution of digital documents," PLoS ONE, vol. 8, no. 12, p. 14, 2013.
-
(2013)
PLoS ONE
, vol.8
, Issue.12
, pp. 14
-
-
Munoz-Hernandez, M.D.1
Garcia-Hernandez, J.J.2
Morales-Sandoval, M.3
-
8
-
-
85037990464
-
Study on the impact of fingerprints on the perceptual transparency in digital documents
-
M. D. Munoz-Hernandez, J. J. Garcia-Hernandez, M. Morales-Sandoval, and A. Larranaga-Cepeda, "Study on the impact of fingerprints on the perceptual transparency in digital documents," in Proceedings of the 4th European Conference of Computer Science (ECCS), 2013.
-
(2013)
Proceedings of the 4th European Conference of Computer Science (ECCS)
-
-
Munoz-Hernandez, M.D.1
Garcia-Hernandez, J.J.2
Morales-Sandoval, M.3
Larranaga-Cepeda, A.4
-
9
-
-
0028592391
-
Electronic marking and identification techniques to discourage document copying
-
J. Brassil, S. Low, L. O'Gorman, and N. Maxemchuk, "Electronic marking and identification techniques to discourage document copying," in IEEE Journal on Selected Areas in Communications, 1995, pp. 1278-1287.
-
(1995)
IEEE Journal on Selected Areas in Communications
, pp. 1278-1287
-
-
Brassil, J.1
Low, S.2
O'Gorman, L.3
Maxemchuk, N.4
-
10
-
-
0000772864
-
Document identification for copyright protection using centroid detection
-
S. Low and N. Maxemchuk, "Document identification for copyright protection using centroid detection," IEEE Transactions on Communications, vol. 46, no. 3, pp. 372-383, 1998.
-
(1998)
IEEE Transactions on Communications
, vol.46
, Issue.3
, pp. 372-383
-
-
Low, S.1
Maxemchuk, N.2
-
11
-
-
0002474815
-
Hiding information in document images
-
J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman, "Hiding information in document images," in Conference on Information Sciences and Systems (CISS-95), 1994, pp. 482-489.
-
(1994)
Conference on Information Sciences and Systems (CISS-95)
, pp. 482-489
-
-
Brassil, J.1
Low, S.2
Maxemchuk, N.3
O'Gorman, L.4
-
12
-
-
61849153506
-
Document marking and identification using both line and word shifting
-
Boston, MA
-
S. Low, N. Maxemchuk, J. Brassil, and L. O'Gorman, "Document marking and identification using both line and word shifting," in INFOCOM '95, Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies, vol. 2, Boston, MA, 1995, pp. 853-860.
-
(1995)
INFOCOM '95, Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies
, vol.2
, pp. 853-860
-
-
Low, S.1
Maxemchuk, N.2
Brassil, J.3
O'Gorman, L.4
-
14
-
-
85037989147
-
Watermarking electronic text documents containing justified paragraphs and irregular line spacing
-
A. Alattar and O. Alattar, "Watermarking electronic text documents containing justified paragraphs and irregular line spacing," Digimarc Corporation, Tech. Rep., 2004.
-
(2004)
Digimarc Corporation, Tech. Rep.
-
-
Alattar, A.1
Alattar, O.2
-
15
-
-
84945968328
-
A text watermarking algorithm based on word classification and inter-word space statistics
-
Y. won Kim, K. ae Moon, and I. seok Oh, "A text watermarking algorithm based on word classification and inter-word space statistics," in Proceedings Seventh International Conference on Document Analysis and Recognition 2003, 2003, pp. 775-779.
-
(2003)
Proceedings Seventh International Conference on Document Analysis and Recognition
, vol.2003
, pp. 775-779
-
-
Won Kim, Y.1
Ae Moon, K.2
Seok Oh, I.3
-
16
-
-
0035694579
-
Interword distance changes represented by sine waves for watermarking text images
-
D. Huang and H. Yan, "Interword distance changes represented by sine waves for watermarking text images," IEEE Transactions on Circuits and Systems for Video Technology, vol. 11, no. 12, pp. 1237-1245, 2001.
-
(2001)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.11
, Issue.12
, pp. 1237-1245
-
-
Huang, D.1
Yan, H.2
-
18
-
-
33845268524
-
Data-hiding capacity improvement for text watermarking using space coding method
-
T. Kalker, I. Cox, and Y. Ro, Eds. Springer Berlin Heidelberg
-
H.-G. Choo and W.-Y. Kim, "Data-hiding capacity improvement for text watermarking using space coding method," in Digital Watermarking, ser. Lecture Notes in Computer Science, T. Kalker, I. Cox, and Y. Ro, Eds. Springer Berlin Heidelberg, 2004, vol. 2939, pp. 593-599.
-
(2004)
Digital Watermarking, Ser. Lecture Notes in Computer Science
, vol.2939
, pp. 593-599
-
-
Choo, H.-G.1
Kim, W.-Y.2
-
19
-
-
84866973905
-
Increase the hiding-bit capacity and strength for text watermarking with the line intersection on text image
-
Seoul, South Korea
-
W. Yawai and N. Hiransakolwong, "Increase the hiding-bit capacity and strength for text watermarking with the line intersection on text image," in 8th International Conference on Computing Technology and Information Management (ICCM), vol. 1, Seoul, South Korea, 2012, pp. 427-433.
-
(2012)
8th International Conference on Computing Technology and Information Management (ICCM)
, vol.1
, pp. 427-433
-
-
Yawai, W.1
Hiransakolwong, N.2
-
20
-
-
73849118476
-
A new approach to hindi text steganography by shifting matra
-
Oct
-
S. Changder, N. Debnath, and D. Ghosh, "A new approach to hindi text steganography by shifting matra," in ARTCom '09. International Conference onAdvances in Recent Technologies in Communication and Computing, Oct 2009, pp. 199-202.
-
(2009)
ARTCom '09. International Conference OnAdvances in Recent Technologies in Communication and Computing
, pp. 199-202
-
-
Changder, S.1
Debnath, N.2
Ghosh, D.3
-
23
-
-
84894112972
-
An enhanced kashida-based watermarking approach for arabic text-documents
-
Nov
-
Y. Alginahi, M. Kabir, and O. Tayan, "An enhanced kashida-based watermarking approach for arabic text-documents," in International Conference on Electronics, Computer and Computation (ICECCO), Nov 2013, pp. 301-304.
-
(2013)
International Conference on Electronics, Computer and Computation (ICECCO)
, pp. 301-304
-
-
Alginahi, Y.1
Kabir, M.2
Tayan, O.3
-
24
-
-
0034593185
-
Natural language processing for information assurance and security: An overview and implementations
-
ACM
-
M. Atallah, C. McDonough, V. Raskin, and S. Nirenburg, "Natural language processing for information assurance and security: an overview and implementations," in Proceedings of the 2000 workshop on New security paradigms, ser. NSPW '00. ACM, 2000, pp. 51-65.
-
(2000)
Proceedings of the 2000 Workshop on New Security Paradigms, Ser. NSPW '00
, pp. 51-65
-
-
Atallah, M.1
McDonough, C.2
Raskin, V.3
Nirenburg, S.4
-
25
-
-
58349109703
-
An optimized natural language watermarking algorithm based on tmr
-
P. Lu, Z. Lu, Z. Zhou, and J. Gu, "An optimized natural language watermarking algorithm based on tmr," in The 9th International Conference for Young Computer Scientists CYCS., 2008, pp. 1459-1463.
-
(2008)
The 9th International Conference for Young Computer Scientists CYCS
, pp. 1459-1463
-
-
Lu, P.1
Lu, Z.2
Zhou, Z.3
Gu, J.4
-
26
-
-
47349085616
-
Natural language watermarking via morphosyntactic alterations
-
H. M. Meral, B. Sankur, A. S. Özsoy, T. Güngör, and E. Sevinç, "Natural language watermarking via morphosyntactic alterations," Computer Speech & Language, vol. 23, no. 1, pp. 107-125, 2009.
-
(2009)
Computer Speech & Language
, vol.23
, Issue.1
, pp. 107-125
-
-
Meral, H.M.1
Sankur, B.2
Özsoy, A.S.3
Güngör, T.4
Sevinç, E.5
-
27
-
-
84982290177
-
A method of text watermarking using presuppositions
-
P. W. W. Eduard J. Delp III, Ed.
-
O. Voybornova and B. Macq, "A method of text watermarking using presuppositions," in Security, Steganography, and Watermarking of Multimedia Contents IX, P. W. W. Eduard J. Delp III, Ed., vol. 6505, 2007.
-
(2007)
Security, Steganography, and Watermarking of Multimedia Contents IX
, vol.6505
-
-
Voybornova, O.1
Macq, B.2
-
28
-
-
33750907773
-
The hiding virtues of ambiguity: Quantifiably resilient watermarking of natural language text through synonym substitutions
-
New York, NY, USA: ACM
-
U. Topkara, M. Topkara, and M. Atallah, "The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions," in Proceedings of the 8th workshop on Multimedia and security, ser. MM#38;Sec '06. New York, NY, USA: ACM, 2006, pp. 164-174.
-
(2006)
Proceedings of the 8th Workshop on Multimedia and Security, Ser. MM#38;Sec '06
, pp. 164-174
-
-
Topkara, U.1
Topkara, M.2
Atallah, M.3
-
29
-
-
26844470147
-
Noun-verb based technique of text watermarking using recursive decent semantic net parsers
-
Berlin, Heidelberg: Springer-Verlag
-
X. Sun and A. J. Asiimwe, "Noun-verb based technique of text watermarking using recursive decent semantic net parsers," in Proceedings of the First international conference on Advances in Natural Computation - Volume Part III, ser. ICNC'05. Berlin, Heidelberg: Springer-Verlag, 2005, pp. 968-971.
-
(2005)
Proceedings of the First International Conference on Advances in Natural Computation - Volume Part III, Ser. ICNC'05
, pp. 968-971
-
-
Sun, X.1
Asiimwe, A.J.2
-
30
-
-
84890047294
-
Research on polymorphism in digital text watermarking
-
Y. Cheng, J. Zhang, X. Liu, Q. Li, and Z. Chen, "Research on polymorphism in digital text watermarking," in 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), 2013, pp. 166-172.
-
(2013)
5th International Conference on Intelligent Networking and Collaborative Systems (INCoS)
, pp. 166-172
-
-
Cheng, Y.1
Zhang, J.2
Liu, X.3
Li, Q.4
Chen, Z.5
-
31
-
-
79955003733
-
Hierarchical spread spectrum fingerprinting scheme based on cdma technique
-
M. Kuribayashi, "Hierarchical spread spectrum fingerprinting scheme based on CDMA technique," EURASIP Journal on Information Security, vol. 2011, p. 16, 2011.
-
(2011)
EURASIP Journal on Information Security
, vol.2011
, pp. 16
-
-
Kuribayashi, M.1
-
32
-
-
51149098551
-
An overview of the tesseract ocr engine
-
Washington, DC, USA: IEEE Computer Society
-
R. Smith, "An overview of the tesseract ocr engine," in Proceedings of the Ninth International Conference on Document Analysis and Recognition - Volume 02, ser. ICDAR '07. Washington, DC, USA: IEEE Computer Society, 2007, pp. 629-633.
-
(2007)
Proceedings of the Ninth International Conference on Document Analysis and Recognition - Volume 02, Ser. ICDAR '07
, pp. 629-633
-
-
Smith, R.1
-
33
-
-
84924695324
-
-
06
-
(2014, 06). [Online]. Available: http://www.newocr.com/
-
(2014)
-
-
-
34
-
-
84924695323
-
-
06
-
(2014, 06). [Online]. Available: http://www.onenote.com/
-
(2014)
-
-
-
36
-
-
85038004911
-
-
1st ed., GNU
-
F. Pinard and M. von Gagern, GNU wdiff, version 1.2.2, 1st ed., GNU, 10 2013.
-
(2013)
GNU Wdiff, Version 1.2.2
, vol.10
-
-
Pinard, F.1
Von Gagern, M.2
-
37
-
-
84924695321
-
-
06
-
(2014, 06). [Online]. Available: http://www.ateneodemadrid.net/bibliotecadigital/RevistaEuropea.htm
-
(2014)
-
-
|