Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology 2005
DOI: 10.1109/ccst.2005.1594854
|View full text |Cite
|
Sign up to set email alerts
|

Digital text watermarking: secure content delivery and data hiding in digital documents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…to insert data into text files. Qadir and Ahmad suggested a novel idea about text watermarking that it does not have any influence on changing the grammatical rules of the content and the layout. Authors manipulated the data to cover the specific data through providing a layout nondependent method.…”
Section: Digital Text Watermarking Approachesmentioning
confidence: 99%
“…to insert data into text files. Qadir and Ahmad suggested a novel idea about text watermarking that it does not have any influence on changing the grammatical rules of the content and the layout. Authors manipulated the data to cover the specific data through providing a layout nondependent method.…”
Section: Digital Text Watermarking Approachesmentioning
confidence: 99%
“…In the literature, the techniques employed to provide the necessary copyright protection and integrity robustness for digital content are known as digital watermarking. A watermark is a signature or unique logo of an organization or individual who owns the rights to digital content [ 1 ] and typically contains information related to the copyrights, ownership, publisher, and document information [ 2 ]. Watermarking extends the information in the cover text and becomes an attribute of the watermarked document, in which “the object of communication is the packaging and the hidden message only references that packaging” [ 3 ].…”
Section: Related Workmentioning
confidence: 99%
“…Security issues of text-watermarking are the characteristic of its specific requirements and features and differ greatly from those of other multimedia watermarking schemes [ 6 ]. For example, it is relatively easy to insert watermark data into images as compared with plain text since the images contain plenty of redundant areas allowing the watermark data to be inserted whilst retaining perceptual similarity with the original file [ 2 ]. Plain text, on the other hand, has a clear structure and little/no redundant data (as found in the case of many languages including English), which negatively affects both the watermark capacity and security [ 7 ], therefore increasing the difficulty involved addressing this research problem.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, demand is growing for intelligence and multimedia security studies that involve not only encryption, but also covert communication whose essence lies in concealing data [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 ]. Recently, information hiding or data hiding in digital texts, known as text hiding, has drawn considerable attention due to its extensive usage, and potential applications in the cybersecurity and network communication industries [ 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 5...…”
Section: Introductionmentioning
confidence: 99%