2010 2nd IEEE International Conference on Information Management and Engineering 2010
DOI: 10.1109/icime.2010.5477622
|View full text |Cite
|
Sign up to set email alerts
|

A watermarking scheme for natural language documents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…In the Unicode, there are special zero-width characters (ZWC) which are employed to provide specific entities such as Zero Width Joiner (ZWJ), e.g., ZWJ joins two supportable characters together in particular languages, POP directional, and Zero Width Non-Joiner (ZWNJ), etc. Practically, the ZWC characters do not have traces, widths or written symbol in digital texts [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 11 , 15 , 18 , 25 , 26 , 27 , 28 , 33 , 34 , 41 , 42 , 43 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 86 , 87 , 88 , 89 , 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 ,…”
Section: Literature Reviewmentioning
confidence: 99%
See 3 more Smart Citations
“…In the Unicode, there are special zero-width characters (ZWC) which are employed to provide specific entities such as Zero Width Joiner (ZWJ), e.g., ZWJ joins two supportable characters together in particular languages, POP directional, and Zero Width Non-Joiner (ZWNJ), etc. Practically, the ZWC characters do not have traces, widths or written symbol in digital texts [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 11 , 15 , 18 , 25 , 26 , 27 , 28 , 33 , 34 , 41 , 42 , 43 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 86 , 87 , 88 , 89 , 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 ,…”
Section: Literature Reviewmentioning
confidence: 99%
“…The text typically consists of several words, sentences, verbs, nouns, adverbs, adjectives, and so on. Several linguistic-based approaches have used characteristics such as synonyms, abbreviations, the similarity of words, and so on, to embed secret bits into a CM [ 17 , 62 , 70 , 71 , 80 , 81 , 82 , 83 , 84 , 85 , 106 , 109 ]. In general, we can classify the linguistic based approaches into two types: syntactic and semantic.…”
Section: Various Types Of Text Hiding Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…In other words, watermarking aims to protect intellectual property of digital media against unauthorized copy or access by embedding a watermark (visible or invisible) in the cove media which can remain beside the data, and it can be used whenever there is any query about the originality of media (e.g., the hidden watermark refers to the original owner) [2][3][4][5][6][7][8][9][10]. Over the last two decades, many information hiding techniques have been proposed in terms of text watermarking and text steganography for copyright protection [11][12][13][14], proof of ownership [15][16][17][18][19][20][21][22][23], and copy control and authentication [24][25][26][27][28][29][30][31]. Although the aim of steganography is different, it also can be used for the copyright protection of digital texts like watermarking.…”
Section: Introductionmentioning
confidence: 99%