2016
DOI: 10.1002/sec.1738
|View full text |Cite
|
Sign up to set email alerts
|

Concise analysis of current text automation and watermarking approaches

Abstract: With ceaseless utilization of web and other online advances, it has turned out to be amazingly simple to imitate, discuss, and convey digital material. Subsequently, confirmation and copyright assurance issues have been emerged. Text is the most widely used media of communication on the web as compared with images and videos. The significant part of books, daily papers, websites, commercial, research papers, reports, and numerous different archives are just the plain text. Therefore, copyrights protection of p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 20 publications
(44 citation statements)
references
References 86 publications
(90 reference statements)
0
44
0
Order By: Relevance
“…In the second stage, the watermark string is converted to a binary string, which is modified by a hash function according to an optional key, and then an invisible watermark string is generated for embedding it into special locations in the cover text. Finally, it is inserted into special locations where the watermark string will not be affected by attacks [2,4,6,7].…”
Section: Text Watermarking Architecture As Shown Inmentioning
confidence: 99%
See 3 more Smart Citations
“…In the second stage, the watermark string is converted to a binary string, which is modified by a hash function according to an optional key, and then an invisible watermark string is generated for embedding it into special locations in the cover text. Finally, it is inserted into special locations where the watermark string will not be affected by attacks [2,4,6,7].…”
Section: Text Watermarking Architecture As Shown Inmentioning
confidence: 99%
“…In this case, some protective solutions consisting of copyright protection, integrality, authenticity, and confidentiality are essential to prevent forgery and plagiarism problems. Downloading and manipulating a copyrighted text and thus reusing it without any control are easy these days; hence, copyright management is very necessary to protect such information against modifying and reproducing processes [4][5][6].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…As shown in Figure 1, DWM belongs to the family of information hiding [1]. Digital watermarking is related to steganography, which is the science and art of secret communication.…”
Section: Characteristicsmentioning
confidence: 99%