2002
DOI: 10.1007/3-540-36415-3_13
|View full text |Cite
|
Sign up to set email alerts
|

Natural Language Watermarking and Tamperproofing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
80
0

Year Published

2005
2005
2011
2011

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 78 publications
(80 citation statements)
references
References 7 publications
0
80
0
Order By: Relevance
“…Natural language watermarking embeds information using linguistic transformations such as synonym substitution, syntactic transformations and semantic transformations (see [18], [17], [2], [19], [1], [8], [10]). It embeds a bitstream as a watermark in a text document, while preserving the meaning, context, and flow of the document.…”
Section: Natural Language Watermarkingmentioning
confidence: 99%
See 4 more Smart Citations
“…Natural language watermarking embeds information using linguistic transformations such as synonym substitution, syntactic transformations and semantic transformations (see [18], [17], [2], [19], [1], [8], [10]). It embeds a bitstream as a watermark in a text document, while preserving the meaning, context, and flow of the document.…”
Section: Natural Language Watermarkingmentioning
confidence: 99%
“…There have only been a few such schemes, e.g., [2], [1] and [8], that are suitable for this purpose. In [2] Atallah et al treat a text as a collection of sentences.…”
Section: Previous Schemesmentioning
confidence: 99%
See 3 more Smart Citations