Proceedings of the 11th International Conference on Web Information Systems and Technologies 2015
DOI: 10.5220/0005445800730080
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking PDF Documents using Various Representations of Self-inverting Permutations

Abstract: This work provides to web users copyright protection of their Portable Document Format (PDF) documents by proposing efficient and easily implementable techniques for PDF watermarking; our techniques are based on the ideas of our recently proposed watermarking techniques for software, image, and audio, expanding thus the digital objects that can be efficiently watermarked through the use of self-inverting permutations. In particular, we present various representations of a selfinverting permutation π * namely 1… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…PDF documents have been widely used in various internal networks such as e-government networks and enterprise information networks, and security issues have become increasingly prominent 3 . Watermarking, as a technical means to  281097756@qq.com, lis54@hn.sgcc.com.cn, lizizun1996@qq.com, 517793054@qq.com, 860755845@qq.com, 1523302247@qq.com protect file security and prevent malicious theft by others 4 , is commonly used to protect internal confidential official documents and files.…”
Section: Current Status Of Document Watermark Recognition Algorithmsmentioning
confidence: 99%
“…PDF documents have been widely used in various internal networks such as e-government networks and enterprise information networks, and security issues have become increasingly prominent 3 . Watermarking, as a technical means to  281097756@qq.com, lis54@hn.sgcc.com.cn, lizizun1996@qq.com, 517793054@qq.com, 860755845@qq.com, 1523302247@qq.com protect file security and prevent malicious theft by others 4 , is commonly used to protect internal confidential official documents and files.…”
Section: Current Status Of Document Watermark Recognition Algorithmsmentioning
confidence: 99%
“…This procedure is defined through the following mathematical equations. means the pattern marking rate transition and state which is given in equation 1and (2). From the Markov matrix, weight of every state is calculated and then the pattern matching rate is calculated for the attacked and the original document.…”
Section: Fig 5: Hsw Based Text Extractionmentioning
confidence: 99%
“…The geometrical attack attacks the text documents that are watermarked based on the invisible watermark. The attacker needs knowledge about the technique that is used for watermarking or watermarking key to remove the watermark [2].…”
Section: Introductionmentioning
confidence: 99%