2007 8th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services 2007
DOI: 10.1109/telsks.2007.4375954
|View full text |Cite
|
Sign up to set email alerts
|

Security of Copy-Control Watermarks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…e authentication mechanism can be used for a text document to detect any tampering. If tampering is identified, then the document cannot be considered as original, also for legal purposes, and it is necessary to authenticate text document [43].…”
Section: Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…e authentication mechanism can be used for a text document to detect any tampering. If tampering is identified, then the document cannot be considered as original, also for legal purposes, and it is necessary to authenticate text document [43].…”
Section: Authenticationmentioning
confidence: 99%
“…Likewise, they want their essential documents to be available on the Internet for revenue generation. e watermarking is also applied here to provide access control and stop illegal copying [43].…”
Section: Copy Controlmentioning
confidence: 99%
“…Currently, the publishers and the content providers are seeking more reliable ways to control copy or access to their valuable documents, and simultaneously, they want to make the documents accessible on the Internet in order to obtain more revenue. The text watermarking is a desirable technique on the online systems that provide access control to prevent illegal copy or restrict the number of times of copying the original text [8,57].…”
Section: (I) Digital Copyright Protection (Proof Of Ownership)mentioning
confidence: 99%
“…The online publishing of articles and newspapers in form of plain text documents has brought several issues related to authenticating the integrity of these documents. Text watermarking can be applied as an authentication tool to verify the integrity of plain text documents [57].…”
Section: (I) Digital Copyright Protection (Proof Of Ownership)mentioning
confidence: 99%
“…During the last two decades, many text hiding algorithms have been introduced in terms of text steganography and text watermarking for covert communication [ 1 , 6 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 20 , 31 , 36 , 39 , 51 , 91 ], copyright protection [ 3 , 4 , 5 , 7 , 18 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 44 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 72 , 73 , 74 , 75 , 87 , <...>…”
Section: Introductionmentioning
confidence: 99%