{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T18:01:27Z","timestamp":1774375287275,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540427339","type":"print"},{"value":"9783540454960","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_14","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T13:08:40Z","timestamp":1178370520000},"page":"185-200","source":"Crossref","is-referenced-by-count":86,"title":["Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation"],"prefix":"10.1007","author":[{"given":"Mikhail J.","family":"Atallah","sequence":"first","affiliation":[]},{"given":"Victor","family":"Raskin","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Crogan","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Hempelmann","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Kerschbaum","sequence":"additional","affiliation":[]},{"given":"Dina","family":"Mohamed","sequence":"additional","affiliation":[]},{"given":"Sanket","family":"Naik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"key":"14_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Information Hiding. First International Workshop","year":"1996","unstructured":"Anderson, R. (ed.) 1996. Information Hiding. First International Workshop. Cambridge, UK, May\/June 1996. Proceedings. Lecture Notes in Computer Science 1174"},{"key":"14_CR2","series-title":"Lect Notes Comput Sci","volume-title":"Information Hiding II: 2nd International Workshop, IH\u2019 98","year":"1998","unstructured":"Aucsmith, D., J. Hartmanis, G. Goos, and J. Van Leeuwen (eds.) 1998. Information Hiding II: 2nd International Workshop, IH\u2019 98. Portland, Oregon, USA, April 1998. Proceedings. Lecture Notes in Computer Science 1525."},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Petitcolas, F. A. P., R. J. Anderson, and M. G. Kuhn 1999. Information Hiding-A Survey. Proceedings of the IEEE 87(7), pp. 1062\u20131078. July 1999.","DOI":"10.1109\/5.771065"},{"key":"14_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Information Hiding","year":"2000","unstructured":"Pfitzmann, A. (ed.) 2000. Information Hiding. Third International Workshop, IH\u2019 99. Dresden, Germany, September\/October 1999. Proceedings. Lecture Notes in Computer Science 1768."},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., and F. A. P. Petitcolas (eds.) 2000. Information Hiding. Techniques for Steganography and Digital Watermarking.","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"N. F. Johnson, Z. Duric, and S. Jajodia (eds.) 2000. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures. Advances in Information Security, Vol. 1.","DOI":"10.1007\/978-1-4615-4375-6_1"},{"key":"14_CR7","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1109\/ICIP.1996.560429","volume":"3","author":"I. J. Cox","year":"1996","unstructured":"Cox, I. J., J. Kilian, F. T. Leighton, T. Shamoon 1996. Secure spread spectrum watermarking for images, audio and video. International Conference on Image Processing, Vol. 3, pp. 243\u2013246.","journal-title":"International Conference on Image Processing"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Cox, I. J., and M. L. Miller 1996. A review of watermarking and the importance of perceptual modeling. Proc. SPIE-Int. Soc. Opt. Eng., Vol. 3016, pp. 92\u201399.","DOI":"10.1117\/12.274502"},{"key":"14_CR9","unstructured":"Katzenbeisser, S. C. 2000. Principles of Steganography. In [5, pp. 17\u201341]."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Brassil, J., N. F. Maxemchuk, and L. O\u2019Gorman 1994. Electronic Marking and Identification Technique to Discourage Document Copying. Proceedings of INFOCOM\u2019 94, pp. 1278\u20131287.","DOI":"10.1109\/INFCOM.1994.337544"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Maxemchuk, N. F. 1994. Electronic Document Distribution. AT&T Technical Journal, September\/October 1994, pp. 73\u201380.","DOI":"10.1002\/j.1538-7305.1994.tb00612.x"},{"issue":"3","key":"14_CR12","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/26.662643","volume":"46","author":"S. H. Low","year":"1998","unstructured":"Low, S. H., N. F. Maxemchuk, and A. M. Lapone 1998. Document Identification for Copyright Protection Using Centroid Detection. IEEE Transcations on Communication 46(3), pp. 372\u2013383.","journal-title":"IEEE Transcations on Communication"},{"key":"14_CR13","unstructured":"Atallah, M. J., C. J. McDonough, V. Raskin, and S. Nirenburg 2000. Natural Language Processing for Information Assurance and Security: An Overview and Implementations. In: Preproceedings of the Workshop on New Paradigms in Information Security, Cork, Ireland, September 2000. To appear in: M. Shaeffer (ed.), NSPW\u2019 00: Proceedings of Workshop on New Paradigms in Information Security, Cork, Ireland, September 2000. ACM Publications, 2001."},{"key":"14_CR14","unstructured":"Atallah, M. J., and S. S. Wagstaff 1996. Watermarking Data Using Quadratic Residues. Working Paper, Department of Computer Science, Purdue University."},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1080\/0161-119291866883","volume":"3","author":"P. Wayner","year":"1992","unstructured":"Wayner, P. 1992. Mimic Functions. Cryptologia XVI(3), pp. 193\u2013214.","journal-title":"Cryptologia XVI"},{"key":"14_CR16","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1080\/0161-119591883962","volume":"3","author":"P. Wayner","year":"1995","unstructured":"Wayner, P. 1995. Strong Theoretical Steganography. Cryptologia XIX(3), 285\u2013299.","journal-title":"Cryptologia XIX"},{"key":"14_CR17","series-title":"Lect Notes Comput Sci","first-page":"333","volume-title":"Proceedings of the International Conference on Information and Communication Security","author":"M. Chapman","year":"1997","unstructured":"Chapman, M., and G. Davida 1997. Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text. Proceedings of the International Conference on Information and Communication Security. Lecture Notes in Computer Sciences 1334, pp. 333\u2013345."},{"issue":"4","key":"14_CR18","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1117\/1.1287594","volume":"9","author":"M. Kutter","year":"2000","unstructured":"Kutter, M., and F. A. P. Petitcolas 2000. Fair Evaluation Methods for Watermarking Systems. Journal of Electronic Imaging 9(4), pp. 445\u2013455.","journal-title":"Journal of Electronic Imaging"},{"issue":"5","key":"14_CR19","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/79.879339","volume":"17","author":"F. A. P. Petitcolas","year":"2000","unstructured":"Petitcolas, F. A. P. 2000. Watermarking Scheme Evaluation-Algorithms Need Common Benchmarks. IEEE Signal Processing Magazine 17(5), pp. 58\u201364.","journal-title":"IEEE Signal Processing Magazine"},{"key":"14_CR20","unstructured":"Nirenburg, S., and V. Raskin 2001. Principles of Ontological Semantics (forthcoming). Pre-publication draft, http:\/\/crl.nmsu.edu\/Staff.pages\/Technical\/sergei\/book\/index-book.html ."},{"key":"14_CR21","volume-title":"Memoranda in Computer and Cognitive Science, MCCS-96-292","author":"K. Mahesh","year":"1996","unstructured":"Mahesh, K. 1996. Ontology Development for Machine Translation: Ideology and Methodology. Memoranda in Computer and Cognitive Science, MCCS-96-292. Las Cruces, NM, New Mexico State University, Computing Research Laboratory."},{"issue":"3\u20134","key":"14_CR22","first-page":"276","volume":"13","author":"S. Nirenburg","year":"1987","unstructured":"Nirenburg, S., and V. Raskin 1987. The subworld concept lexicon and the lexicon management system. Computational Linguistics, 13(3\u20134), pp. 276\u2013289.","journal-title":"Computational Linguistics"},{"key":"14_CR23","volume-title":"Memoranda in Computer and Cognitive Science, MCCS-96-304","author":"S. Nirenburg","year":"1996","unstructured":"Nirenburg, S., and V. Raskin 1996. Ten Choices for Lexical Semantics. Memoranda in Computer and Cognitive Science, MCCS-96-304. Las Cruces, NM, New Mexico State University, Computing Research Laboratory."},{"key":"14_CR24","volume-title":"Memoranda in Computer and Cognitive Science, MCCS-98-315","author":"E. Viegas","year":"1998","unstructured":"Viegas, E., and V. Raskin 1998. Computational Semantic Lexicon Acquisition: Methodology and Guidelines. Memoranda in Computer and Cognitive Science, MCCS-98-315. Las Cruces, NM, New Mexico State University, Computing Research Laboratory."},{"issue":"1-2","key":"14_CR25","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/BF00997231","volume":"10","author":"B. Onyshkevych","year":"1995","unstructured":"Onyshkevych, B., and S. Nirenburg 1995. A lexicon for knowledge-based MT. Machine Translation, 10(1-2), pp. 5\u201357.","journal-title":"Machine Translation"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T02:14:39Z","timestamp":1736993679000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_14","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}