Proceedings of INFOCOM '94 Conference on Computer Communications
DOI: 10.1109/infcom.1994.337544
|View full text |Cite
|
Sign up to set email alerts
|

Electronic marking and identification techniques to discourage document copying

Abstract: Abstract-Modern computer networks make it possible to distribute documents quickly and economically by electronic means rather than by conventional paper means. However, the widespread adoption of electronic distribution of copyrighted material is currently impeded by the ease of unauthorized copying and dissemination. In this paper we propose techniques that discourage unauthorized distribution by embedding each document with a unique codeword. Our encoding techniques are indiscernible by readers, yet enable … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
63
0

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 107 publications
(63 citation statements)
references
References 11 publications
0
63
0
Order By: Relevance
“…For example, point in letters i and j can be displaced, length of strike in letters f and t can be changed, or by extending or shortening height of letters b, d, h, etc. [6,14]. A flaw of this method is that if an OCR program is used or if re-typing is done, the hidden content would get destroyed.…”
Section: Feature Codingmentioning
confidence: 99%
“…For example, point in letters i and j can be displaced, length of strike in letters f and t can be changed, or by extending or shortening height of letters b, d, h, etc. [6,14]. A flaw of this method is that if an OCR program is used or if re-typing is done, the hidden content would get destroyed.…”
Section: Feature Codingmentioning
confidence: 99%
“…Embedding of messages by lowering specified letters and varying spacing between words appears time and again throughout history. Recently, the technique has been revisited in a digital context by scientists who are investigating digital watermarking of text files [6], [49], [56], [93], [98]. Examples of nontextual semagrams are equally replete.…”
Section: Historymentioning
confidence: 99%
“…In a second scheme, which uses ordered dithering, an image is divided into 4-by-4 pixel blocks and brightness thresholds ; for each of the 16 pixels in the block are assigned from top to bottom, left to right. Next, define sets (6) Let be a pair of output signals that pass through . Then is either , , , or , where 0 indicates that the pixel will be turned "off" and 1 indicates "on."…”
Section: A Image Data Embedding Implicitly Based On Maskingmentioning
confidence: 99%
See 1 more Smart Citation
“…-The algorithm introduced in [15] is envisaged to have application in image tagging, copyright enforcement, counterfeit access and controlled access, although the authors do not explain how to use their algorithm to perform these functionalities. -In [1], electronic marking is applied to textual document, by word or line…”
Section: Watermarking Technologiesmentioning
confidence: 99%