A review of text watermarking: theory, methods, and applications

NS Kamaruddin, A Kamsin, LY Por, H Rahman - IEEE Access, 2018 - ieeexplore.ieee.org
During the recent years, the issue of preserving the integrity of digital text has become a
focus of interest in the transmission of online content on the Internet. Watermarking has a …

A review of digital watermarking techniques for text documents

Z Jalil, AM Mirza - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
Copyright protection of plain text while traveling over the Internet is very crucial. Digital
watermarking provides the complete copyright protection solution for this problem. Text …

A new approach to Persian/Arabic text steganography

MH Shirali-Shahreza… - 5th IEEE/ACIS …, 2006 - ieeexplore.ieee.org
Conveying information secretly and establishing hidden relationship has been of interest
since long past. Text documents have been widely used since very long time ago. Therefore …

Linguistic steganography based on adaptive probability distribution

X Zhou, W Peng, B Yang, J Wen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Text has become one of the most extensively used digital media in Internet, which provides
steganography an effective carrier to realize confidential message hiding. Nowadays …

[PDF][PDF] A text watermarking algorithm based on word classification and inter-word space statistics.

YW Kim, KA Moon, IS Oh - ICDAR, 2003 - Citeseer
Text documents can be watermarked by patterning the inter-word spaces. This paper
proposes a text watermarking algorithm that exploits the novel concepts of word …

Pattern-based data hiding for binary image authentication by connectivity-preserving

H Yang, AC Kot - IEEE Transactions on Multimedia, 2007 - ieeexplore.ieee.org
In this paper, a novel blind data hiding method for binary images authentication aims at
preserving the connectivity of pixels in a local neighborhood is proposed. The" flippability" of …

[HTML][HTML] Fine-grain watermarking for intellectual property protection

SG Rizzo, F Bertini, D Montesi - EURASIP Journal on Information Security, 2019 - Springer
The current online digital world, consisting of thousands of newspapers, blogs, social media,
and cloud file sharing services, is providing easy and unlimited access to a large treasure of …

Generative steganography based on long readable text generation

Y Cao, Z Zhou, C Chakraborty, M Wang… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Text steganography has received a lot of attention in the application of covert
communication. How to ensure desirable capacity and imperceptibility has become a key …

Sharpness estimation for document and scene images

J Kumar, F Chen, D Doermann - Proceedings of the 21st …, 2012 - ieeexplore.ieee.org
Images of document pages have different characteristics than images of natural scenes, and
so the sharpness measures developed for natural scene images do not necessarily extend …

A robust document image watermarking scheme using deep neural network

S Ge, Z Xia, J Fei, Y Tong, J Weng, M Li - Multimedia Tools and …, 2023 - Springer
Watermarking is an important copyright protection technology which generally embeds the
identity information into the carrier imperceptibly. Then the identity can be extracted to prove …