Natural language watermarking and tamperproofing.
In LNCS 2578, Springer, volume 5, pages 196–212.
Bindra, G. (2011). Invisible communication through
portable document file (pdf) format. In Proc. 7th Int’l
Conference on Intelligent Information Hiding and
Multimedia Signal Processing (IIH-MSP’11), pages
173–176.
Brassil, J., Low, S., Maxemchuk, N., and Gorman, L.
(1995). Hiding information in document images. In
Proc. of the 29th Annual Conference on Information
Sciences and Systems, pages 482–489.
Chroni, M., Fylakis, A., and Nikolopoulos, S. (2013). Wa-
termarking images in the frequency domain by ex-
ploiting self-inverting permutations. In Proc. 9th Int’l
Conference on Web Information Systems and Tech-
nologies (WEBIST’13), pages 45–54.
Chroni, M., Fylakis, A., and Nikolopoulos, S. (2014). From
image to audio watermarking using self-inverting per-
mutations. In Proc. 10th Int’l Conference on Web
Information Systems and Technologies (WEBIST’14),
pages 177–184.
Chroni, M. and Nikolopoulos, S. (2012). An efficient graph
codec system for software watermarking. In Proc.
36th Int’l Conference on Computers, Software, and
Applications (COMPSAC’12), pages 595–600.
Collberg, C. and Nagra, J. (2010). Surreptitious Software.
Addison-Wesley.
Cox, I., Miller, M., Bloom, J., Fridrich, J., and Kalker,
T. (2008). Digital Watermarking and Steganography.
Morgan Kaufmann, 2nd edition.
Golumbic, M. (1980). Algorithmic Graph Theory and Per-
fect Graphs. Academic Press, Inc., New York.
Gu, Y. and Yang, Y. (2009). A text digital watermarking al-
gorithm for pdf document based on scrambling tech-
nique. In Journal of Foshan University (Natural Sci-
ence Edition), volume 2, pages 43–46.
Huang, D. and Yan, H. (2001). Interword distance changes
represented by sine waves for watermarking text im-
ages. In IEEE Trans. Circuits and Systems for Video
Technology, volume 11(12), pages 1237–1245.
Kankanhalli, M. and Hau, K. (2002). Watermarking of
electronic text documents. Electronic Commerce Re-
search, 2(1-2):169–187.
Lee, I. and Tsai, W. (2010). A new approach to covert com-
munication via pdf files. In Signal Processing, volume
90(2), pages 557–565.
Liu, H., Li, L., Li, J., and Huang, J. (2012). Three novel
algorithms for hiding data in pdf files based on incre-
mental updates. In Digital Forensics and Watermark-
ing, Springer Berlin Heidelberg, pages 167–180.
Liu, X., Zhang, Q., Tang, C., Zhao, J., and Liu, J. (2008). A
steganographic algorithm for hiding data in pdf files
based on equivalent transformation. In Int’l Sym-
posiums on Information Processing (ISIP’08), pages
417–421.
Liu, Y., Sun, X., and Luo, G. (2006). A novel information
hiding algorithm based on structure of pdf document.
In Computer Engineering, volume 32(17), pages 230–
232.
Low, S. and Maxemchuk, N. (2000). Capacity of text mark-
ing channel. In IEEE Signal Processing Letters, vol-
ume 7(12), pages 345–347.
Low, S., Maxemchuk, N., and Lapone, A. (1998). Docu-
ment identification for copyright protection using cen-
troid detection. In IEEE Transactions on Communica-
tions, volume 46(3), pages 372–381.
Lu, P., Lu, Z., Zhou, Z., and Gu, J. (2008). An optimized
natural language watermarking algorithm based on
tmr. In Proc. 9th International Conference for Young
Computer Scientists, pages 1459–1463.
Maxemchuk, N. and Low, S. (1997). Marking text docu-
ments. In Proc. of the IEEE Int’l Conference on Image
Processing, pages 13–16.
Maxemchuk, N. and Low, S. (1998). Performance compar-
ison of two text marking methods. In IEEE Journal
of Selected Areas in Communications, volume 16(4),
pages 561–572.
Meral, H., Sankur, B.,
¨
Ozsoy, A., G¨ung¨or, T., and Sevinc¸,
E. (2009). Natural language watermarking via mor-
phosyntactic alterations. In Computer Speech and
Language, volume 23(1), pages 107–125.
Simin, H., Xingming, S., and .Zhangjie, F. (2011). A novel
information hiding algorithm based on page object of
pdf document. In 10th IEEE Int’l Symposium on Dis-
tributed Computing and Applications to Business, En-
gineering and Science (DCABES’11), pages 266–270.
Sun, X. and Asiimwe, A. (2005). Noun-verb based tech-
nique of text watermarking using recursive decent se-
mantic net parsers. In LNCS 3612, volume Part III,
pages 968–971.
Topkara, M., Topraka, U., and Atallah, M. (2007). Infor-
mation hiding through errors: a confusing approach.
In Proc. of SPIE, Security, Steganography, and Wa-
termarking of Multimedia Contents IX, volume 6505,
pages 1–12.
Vybornova, O. and Macq, B. (2007). A method of text wa-
termarking using presuppositions. In Proc. of SPIE,
Security, Steganography, and Watermarking of Multi-
media Contents IX, volume 6505, pages 1–10.
Wang, Q. and Liu, X. (2009). A new watermarking algo-
rithm of pdf document based on correct coding. In
Computing Technology and Automation, volume 28,
pages 137–141.
Zhong, S., Cheng, X., and Chen, T. (2007). Data hiding in
a kind of pdf texts for secret communication. In In-
ternational Journal of Network Security, volume 4(1),
pages 17–26.
Zhou, X., Zhao, W., Wang, Z., and Pan, L. (2009). Security
theory and attack anlysis for text watermarking. In
Int’l Conference on E-Business and Information Sys-
tem Security (EBISS’09), pages 1–6.
WEBIST2015-11thInternationalConferenceonWebInformationSystemsandTechnologies
80