Watermarking techniques for intellectual property protection
DAC '98 Proceedings of the 35th annual Design Automation Conference
Challenges for copyright in a digital age
BT Technology Journal
Watermarking of Electronic Text Documents
Electronic Commerce Research
Digital Watermarking: From Concepts to Real-Time Video Applications
IEEE Computer Graphics and Applications
Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
A New Digital Watermarking for Text Document Images Using Diagonal Profile
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Authentication of LZ-77 compressed data
Proceedings of the 2003 ACM symposium on Applied computing
An attack-localizing watermarking scheme for natural language documents
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
PCA-based web page watermarking
Pattern Recognition
WhiteSteg: a new scheme in information hiding using text steganography
WSEAS Transactions on Computers
Authorship Proof for Textual Document
Information Hiding
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
High-capacity reversible data hiding in binary images using pattern substitution
Computer Standards & Interfaces
A new approach for steganography in Bengali text
Journal of Computational Methods in Sciences and Engineering
Hiding Information by Context-Based Synonym Substitution
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
A fragile watermarking scheme based on SVD for web pages
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Hindi text steganography - An approach to information hiding
Journal of Computational Methods in Sciences and Engineering - Special Supplement Issue in Section A and B: Selected Papers from the ISCA International Conference on Software Engineering and Data Engineering, 2009
PCM'06 Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
Watermark based recovery of tampered documents
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics
Three novel algorithms for hiding data in PDF files based on incremental updates
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Hi-index | 0.00 |
Continues a study of document marking to deter illicit dissemination. An experiment performed reveals that the distortion on the photocopy of a document is very different in the vertical and horizontal directions. This leads to the strategy that marks a text line both vertically using line shifting and horizontally using word shifting. A line that is marked is always accompanied by two unmarked control lines one above and one below. They are used to measure distortions in the vertical and horizontal directions in order to decide whether line or word shift should be detected. Line shifts are detected using a centroid method that bases its decision on the relative distance of line centroids. Word shifts are detected using a correlation method that treats a profile as a waveform and decides whether it originated from a waveform whose middle block has been shifted left or right. The maximum likelihood detectors for both methods are given.