1999
DOI: 10.1109/5.771071
|View full text |Cite
|
Sign up to set email alerts
|

Copyright protection for the electronic distribution of text documents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
135
0
4

Year Published

2003
2003
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 288 publications
(139 citation statements)
references
References 14 publications
0
135
0
4
Order By: Relevance
“…After rotation normalization in the preshape space, the Procrustes distance [8], as shown in Fig. 2 between a database segment in the i th data slot and the input configuration si is given by dP (vi,j, si) = ||zi,j − vi,j|| 2 …”
Section: Procrustes Distance Calculationmentioning
confidence: 99%
See 1 more Smart Citation
“…After rotation normalization in the preshape space, the Procrustes distance [8], as shown in Fig. 2 between a database segment in the i th data slot and the input configuration si is given by dP (vi,j, si) = ||zi,j − vi,j|| 2 …”
Section: Procrustes Distance Calculationmentioning
confidence: 99%
“…To make the embedding unobtrusive, these changes are necessarily very light and thus may not survive photocopying. Methods to embed data by modulating the distance between successive lines of text [2] or words [3] are robust to noise but have very low embedding capacity because the modifications become very obtrusive at high embedding rates. Message bits can also be embedded into individual text characters by modulating their grayscale values or halftone patterns [4].…”
Section: Introductionmentioning
confidence: 99%
“…Researchers have studied various image features, which can be modified for localization and avoid destroy the original image. Mici et al [7] in 2005 and Brassil et al [8] in 1999 studied the copyright protection and provided methods of digital watermarking on binary images. They adjusted the space between lines and words.…”
Section: Introductionmentioning
confidence: 99%
“…The format-based methods always hide message by character spaces assignment, line shifting and word shifting [1], changing font format in compound documents or some sole characteristics in specific documents [2]. Linguistic steganography referred to natural language steganogra- phy [3], mainly uses mimicking techniques to directly generate a new cover text [4], or linguistically modifies content of cover text by synonym substitution (SS) [5]- [11], syntactic transformation [12], [13], or translation [14], [15] to camouflage the secret message.…”
Section: Introductionmentioning
confidence: 99%