1995
DOI: 10.1109/49.464718
|View full text |Cite
|
Sign up to set email alerts
|

Electronic marking and identification techniques to discourage document copying

Abstract: Abstract-Modern computer networks make it possible to distribute documents quickly and economically by electronic means rather than by conventional paper means. However, the widespread adoption of electronic distribution of copyrighted material is currently impeded by the ease of unauthorized copying and dissemination. In this paper we propose techniques that discourage unauthorized distribution by embedding each document with a unique codeword. Our encoding techniques are indiscernible by readers, yet enable … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
62
0
5

Year Published

2003
2003
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 284 publications
(68 citation statements)
references
References 14 publications
1
62
0
5
Order By: Relevance
“…In word shifting method [30], the words are moved horizontally making spaces expanding between words to hide information. This method needs the presence of the original file or the original image due to the possibility that the file contains a variable number of spaces between adjacent words.…”
Section: Word-shift Codingmentioning
confidence: 99%
See 1 more Smart Citation
“…In word shifting method [30], the words are moved horizontally making spaces expanding between words to hide information. This method needs the presence of the original file or the original image due to the possibility that the file contains a variable number of spaces between adjacent words.…”
Section: Word-shift Codingmentioning
confidence: 99%
“…This approach modifies features a little bit to embed a watermark. In [30] the length of end lines of letters, b, d, h, etc is altered by extending or shortening it. Line and word shifting could be applied in any language even Arabic but the feature coding is done on a language based on its features.…”
Section: Feature Codingmentioning
confidence: 99%
“…Spread spectrum has been deployed in many researches to strengthen the robustness of the watermark. There are many researches of robust watermarking techniques (Bender, Gruhl, & Morimoto, 1995;O'Ruanaidh & Pun, 1998) and watermarks for other media such as motion picture (Echizen, Yoshiura, Arai, Himura, & Takeuchi, 1999) and text data (Brassil, Low, Maxemchuk, & O'Gorman, 1994;Brassil & O'Gorman, 1996).…”
Section: General Background Surrounding Digital Watermarksmentioning
confidence: 99%
“…In image-based approach, a watermark is embedded in text image. Brassil, et al were the first to propose a few text watermarking methods utilizing text image [4,5]; they also developed document watermarking schemes based on line shifts, word shifts as well as slight modifications to the characters [6]. Maxemchuk, et al [23,24,25] analyzed the performance of these methods, while later Low, et al [16,17] further analyzed their efficiency.…”
Section: Introductionmentioning
confidence: 99%