Secure notarization of paper text documents
SODA '01 Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms
Proceedings of the Second International Workshop on Information Hiding
Proceedings of the Second International Workshop on Information Hiding
Watermarking Document Images with Bounding Box Expansion
Proceedings of the First International Workshop on Information Hiding
Stretching the Limits of Steganography
Proceedings of the First International Workshop on Information Hiding
A Secure, Robust Watermark for Multimedia
Proceedings of the First International Workshop on Information Hiding
Attacks on Copyright Marking Systems
Proceedings of the Second International Workshop on Information Hiding
Digital Watermarking of Chemical Structure Sets
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Document marking and identification using both line and word shifting
INFOCOM '95 Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies (Vol. 2)-Volume - Volume 2
Document Image Matching and Annotation Lifting
ICDAR '01 Proceedings of the Sixth International Conference on Document Analysis and Recognition
A Means for Achieving a High Degree of Compaction on Scan-Digitized Printed Text
IEEE Transactions on Computers
Channels with side information at the transmitter
IBM Journal of Research and Development
Electronic marking and identification techniques to discourage document copying
IEEE Journal on Selected Areas in Communications
IEEE Transactions on Circuits and Systems for Video Technology
High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Hi-index | 0.00 |
In the first part of this paper, we propose a watermarking method for text documents that is less vulnerable to attacks than previous methods. In the second part, we propose a method for protecting the actual content of the document. In a section of independent interest, we discuss the interplay between error-correcting codes and steganography.