State-of-the-Art in Techniques of Text Digital Watermarking: Challenges and Limitations
暂无分享,去创建一个
Nasr addin Ahmed Salem Al-maweri | Roslizah Ali | Wan Azizun Wan Adnan | Abdul Rahman Ramli | Sharifah Mumtazah Syed Ahmad
[1] K. U. Jaseena,et al. Text Watermarking using Combined Image and Text for Authentication and Protection , 2011 .
[2] Mohammad Ali Doostari,et al. A New Method to Persian Text Watermarking Using Curvaceous Letters , 2013 .
[3] Borko Furht,et al. Survey of Watermarking Techniques and Applications , 2004 .
[4] Mikhail J. Atallah,et al. Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation , 2001, Information Hiding.
[5] KokSheik Wong,et al. UniSpaCh: A text-based data hiding method using Unicode space characters , 2012, J. Syst. Softw..
[6] Kenneth L. Levy,et al. Digital Watermarking Framework Applications, Parameters, and Requirements , 2004 .
[7] Chee Hon Lew,et al. Using Combined Pseudo-Random Number Generator with Digital Text-based Watermarking for Cryptography Application , 2012 .
[8] Roberto Caldelli,et al. Reversible Watermarking Techniques: An Overview and a Classification , 2010, EURASIP J. Inf. Secur..
[9] N.B. Puhan,et al. Erasable Authentication Watermarking in Binary Document Images , 2007, Second International Conference on Innovative Computing, Informatio and Control (ICICIC 2007).
[10] Xiaowei Liu,et al. Research on Polymorphism in Digital Text Watermarking , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.
[11] Darko Kirovski,et al. New Trends and Challenges in Digital Watermarking Technology: Applications for Printed Materials , 2006 .
[12] Martin Steinebach,et al. Natural language watermarking for german texts , 2013, IH&MMSec '13.
[13] Anwar M. Mirza,et al. A NOVEL TEXT WATERMARKING ALGORITHM USING IMAGE WATERMARK , 2010 .
[14] Weidong Zhao,et al. Security Theory and Attack Analysis for Text Watermarking , 2009, 2009 International Conference on E-Business and Information System Security.
[15] Adnan Abdul-Aziz Gutub,et al. e-Text Watermarking: Utilizing 'Kashida' Extensions in Arabic Language Electronic Writing , 2010 .
[16] Anwar M. Mirza,et al. Content based Zero-Watermarking Algorithm for Authentication of Text Documents , 2010, ArXiv.
[17] Zhihua Xia,et al. Print-Scan Resilient Watermarking for the Chinese Text Image , 2013 .
[18] Fazal Wahab,et al. Key Based Text Watermarking of E-Text Documents in an Object Based Environment Using Z-Axis for Watermark Embedding , 2008 .
[19] Xinmin Zhou,et al. Attack Model and Performance Evaluation of Text Digital Watermarking , 2010, J. Comput..
[20] Hong Yan,et al. Interword distance changes represented by sine waves for watermarking text images , 2001, IEEE Trans. Circuits Syst. Video Technol..
[21] Teddy Furon,et al. A New Measure of Watermarking Security Applied on QIM , 2012, Information Hiding.
[22] Rajeev Kumar Singh,et al. A Survey: Digital Image Watermarking Techniques , 2014 .
[23] Anwar M. Mirza,et al. An Invisible Text Watermarking Algorithm using Image Watermark , 2009, SCSS.
[24] Prabhishek Singh,et al. A Survey of Digital Watermarking Techniques, Applications and Attacks , 2013 .
[25] Bülent Sankur,et al. Natural language watermarking via morphosyntactic alterations , 2009, Comput. Speech Lang..
[26] Anwar M. Mirza,et al. Word length based zero-watermarking algorithm for tamper detection in text documents , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[27] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[28] Wen-Tai Hsieh,et al. Natural Language Watermarking Using Semantic Substitution for Chinese Text , 2003, IWDW.
[29] J. B. Patil,et al. Implementation of Text Watermarking Technique Using Natural Language Watermarks , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[30] Mikhail J. Atallah,et al. The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions , 2006, MM&Sec '06.
[31] N. N. Patil,et al. Implementation of a new technique for web document protection using unicode , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).
[32] Yasser M. Alginahi,et al. An enhanced Kashida-based watermarking approach for Arabic text-documents , 2013, 2013 International Conference on Electronics, Computer and Computation (ICECCO).
[33] Ton Kalker,et al. A Cryptographic Method for Secure Watermark Detection , 2006, Information Hiding.
[34] Subariah Ibrahim,et al. Printed Document Authentication Using Watermarking Technique , 2010, 2010 Second International Conference on Computational Intelligence, Modelling and Simulation.
[35] Min Du,et al. Text Watermarking Algorithm based on Human Visual Redundancy , 2011 .
[36] Kyung-Ae Moon,et al. A text watermarking algorithm based on word classification and inter-word space statistics , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..
[37] M.A. Qadir,et al. Digital text watermarking: secure content delivery and data hiding in digital documents , 2005, Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology.
[38] Xu Rui,et al. A Multiple Watermarking Algorithm for Texts Mixed Chinese and English , 2013 .
[39] A. Sathesh,et al. Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding Techniques towards Geometric Attacks , 2010 .
[40] Lu He,et al. An active attack on chaotic based text zero-watermarking , 2013, IEEE Conference Anthology.
[41] Nighat Mir,et al. Copyright for web content using invisible text watermarking , 2014, Comput. Hum. Behav..
[42] Benoit M. Macq,et al. Natural Language Watermarking and Robust Hashing Based on Presuppositional Analysis , 2007, 2007 IEEE International Conference on Information Reuse and Integration.
[43] Xianghong Tang,et al. Reversible Text Watermarking Algorithm Using Prediction-error Expansion Method , 2013 .
[44] Adnan M. Alattar,et al. Watermarking electronic text documents containing justified paragraphs and irregular line spacing , 2004, IS&T/SPIE Electronic Imaging.
[45] Sukhpreet Kaur. A Zero-Watermarking algorithm on multiple occurrences of letters for text tampering detection , 2013 .
[46] Alex ChiChung Kot,et al. Semi-fragile watermarking for text document images authentication , 2005, 2005 IEEE International Symposium on Circuits and Systems.
[47] Hae Yong Kim,et al. Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images , 2006, Anais do VI Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2006).
[48] Yuling Liu,et al. Cloud Model Based Zero-Watermarking Algorithm for Authentication of Text Document , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[49] Junzhong Gu,et al. An Optimized Natural Language Watermarking Algorithm based on TMR , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[50] Fahd N. Al-Wesabi,et al. Content Authentication of English Text via Internet using Zero Watermarking Technique and Markov Model , 2014 .
[51] Mi-Young Kim,et al. Text watermarking by syntactic analysis , 2008 .
[52] Zunera Jalil,et al. Text Watermarking Using Combined Image-plus-Text Watermark , 2010, 2010 Second International Workshop on Education Technology and Computer Science.
[53] Bonnie Lynn Webber,et al. Natural Language I , 1989, HLT.
[54] Tao Guo,et al. Chinese Text Zero-Watermark Based on Sentence's Entropy , 2010, 2010 International Conference on Multimedia Technology.
[55] Jinqiao Shi,et al. A Multiple Watermarking Algorithm for Texts Mixed Chinese and English , 2013, ITQM.
[56] S. A. Shah,et al. Utilization of Maximum Data Hiding Capacity in Object-Based Text Document Authentication , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[57] Xiaoming Xu,et al. A New Zero-Watermarking Scheme Based on Features Extraction for Authentication of Text , 2011 .
[58] Chee Hon Lew,et al. Design and Implementation of Text based Watermarking combined with Pseudo-Random Number Generator ( PRNG ) for Cryptography Application , 2013 .
[59] Xingming Sun,et al. A Natural Language Watermarking Based on Chinese Syntax , 2005, ICNC.