Watermarking techniques for intellectual property protection
DAC '98 Proceedings of the 35th annual Design Automation Conference
In business today and tomorrow
Communications of the ACM
Challenges for copyright in a digital age
BT Technology Journal
Watermarking of Electronic Text Documents
Electronic Commerce Research
Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Copyright Protection of Object-Oriented Software
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
A New Digital Watermarking for Text Document Images Using Diagonal Profile
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Services and Architectures for Electronic Publishing
COMPCON '96 Proceedings of the 41st IEEE International Computer Conference
Hiding Functions and Computational Security of Image Watermarking Systems
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Authentication of LZ-77 compressed data
Proceedings of the 2003 ACM symposium on Applied computing
Component-based digital watermarking of Chinese texts
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Proceedings of the 36th SIGCSE technical symposium on Computer science education
A Dual-Method Model for Copy Detection
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
PCA-based web page watermarking
Pattern Recognition
HDWT-based grayscale watermark for copyright protection
Expert Systems with Applications: An International Journal
WhiteSteg: a new scheme in information hiding using text steganography
WSEAS Transactions on Computers
Chinese text watermarking based on occlusive components
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
A General Data Hiding Framework and Multi-level Signature for Binary Images
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Hardware assisted watermarking for multimedia
Computers and Electrical Engineering
High-capacity reversible data hiding in binary images using pattern substitution
Computer Standards & Interfaces
A new approach for steganography in Bengali text
Journal of Computational Methods in Sciences and Engineering
A Novel Application for Text Watermarking in Digital Reading
AICI '09 Proceedings of the International Conference on Artificial Intelligence and Computational Intelligence
A fragile watermarking scheme based on SVD for web pages
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Orientation modulation for data hiding in clustered-dot halftone prints
IEEE Transactions on Image Processing
A video watermarking algorithm for MPEG videos
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India
Hindi text steganography - An approach to information hiding
Journal of Computational Methods in Sciences and Engineering - Special Supplement Issue in Section A and B: Selected Papers from the ISCA International Conference on Software Engineering and Data Engineering, 2009
A provably secure anonymous buyer-seller watermarking protocol
IEEE Transactions on Information Forensics and Security
International Journal of Electronic Security and Digital Forensics
Content-Based information security technique for chinese text
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
PCM'06 Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
Three novel algorithms for hiding data in PDF files based on incremental updates
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Text split-based steganography in OOXML format documents for covert communication
Security and Communication Networks
Hi-index | 0.09 |
Modern computer networks make it possible to distribute documents quickly and economically by electronic means rather than by conventional paper means. However, the widespread adoption of electronic distribution of copyrighted material is currently impeded by the ease of unauthorized copying and dissemination. In this paper we propose techniques that discourage unauthorized distribution by embedding each document with a unique codeword. Our encoding techniques are indiscernible by readers, yet enable us to identify the sanctioned recipient of a document by examination of a recovered document. We propose three coding methods, describe one in detail, and present experimental results showing that our identification techniques are highly reliable, even after documents have been photocopied