1H. Kwon, Y.g Kim, S. Lee, J. Lim. A Tool for the Detection of Hidden Data in Microsoft Compound Document File Format [C]. In: Proc of International Conference on Information Science and Security ICISS, 2008:141-146.
2Atallah M J, Raskin V. Natural language watermarking and tamper proofing [EB/OL]. 2009-10-20. www.cerias.purdue. edu/homes/wmnlt/semdemo.html.
3PAL IT S, GARA IN U. A novel technique for the watermarking of symbolically compressed documents [C]. DIAL' 06: Proceedings of the 2nd International Conference on Document Image Analysis for Libraries. Washington, DC: IEEE Computer Society, 2006:291 -296.
5Brassil J T, Low S, Maxemchuk N F. Copyright protection for the electronic distribution of text documents [J]. Proceedings of the IEEE, 1999, 87(7):1181-1196.
6Low S H, Maxemchunk N F. Performance comparison of two text marking methods [J]. IEEE Journal on Selected Areas in Communications, 1998, 16(4):561-572.
8Brassil J, Low S, Maxemchuk N F, et al Electronic marking and identification techniques to discourage document copying [J]. IEEE Journal on Sel Areas in Commun, 1995, 13(8):1495-1504.
9Cox J, Miller M L. The First 50 Years of Electronic Watermarking. Applied Signal Processing[J]. 2002, 12(2):126-132.
10A. Castiglione, A. D. Santis, C. Soriente. Taking Advantages of a Disadvantage: Digital Forensics and Steganography using Document Metadata [J]. The Journal of Systems and Software, 2007, 80 (7): 750-764.
3Maxemchuk N F.Electronic Document Distribution.AT & T Technical Journal,1994,73 (5):73-80
4Low S H,Maxemchuk N F,Lapone A M.Document Identification for Copyright Protection Using Centroid Detection.IEEE Trans.Communications,1998,46(3):372-383
5Gonzalez R C,Woods R E.Digital Image Processing (2nd Edition).Boston,MA,USA:Addison-Wesley Longman Publishing CO.,Inc.,1992
6Atallah M J,Raskin V,Crogan M,et al.Natural Language Watermarking:Design,Analysis,and a Proof-of-concept Imple-mentation.In Proc.Int.Workshop on Information Hiding,Volume 2137 of Lecture Notes in Computer Science,Springer-verlag,Berlin,2001:185-199
7Cox J,Miller M L.The First 50 Years of Electronic Watermarking.Applied Signal Processing,2002,2:126-132
8Cox I J,Killian J,Leighton F T,et al.Secure Spread Spectrum Watermarking for Multimedia.IEEE Transactions on Image Processing,1997,6 (12):1673-1687
9Brassil J,Low S,Maxemchuk N F,et al.Electronic Marking and Identification Techniques to Discourage Document Copying.IEEE Journal on Sel.Areas in Commun.,1995,13(8):1495-1504
10Brassil J T,Low S,Maxemchuk N F.Copyright Protection for the Electronic Distribution of Text Documents.Proceedings of the IEEE,1999,87(7)