{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T04:10:02Z","timestamp":1751861402320,"version":"3.41.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000141"},{"type":"electronic","value":"9783030000158"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00015-8_13","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T16:14:23Z","timestamp":1536768863000},"page":"147-159","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Multiple Watermarking Scheme for\u00a0Content Authentication of OOXML Format Documents"],"prefix":"10.1007","author":[{"given":"Niandong","family":"Liao","sequence":"first","affiliation":[]},{"given":"Caixia","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Lingyun","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"issue":"2","key":"13_CR1","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1162\/COLI_a_00176","volume":"40","author":"CY Chang","year":"2014","unstructured":"Chang, C.Y., Clark, S.: Practical linguistic steganography using contextual synonym substitution and a novel vertex coding method. Comput. Linguist. 40(2), 403\u2013448 (2014)","journal-title":"Comput. Linguist."},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Cheng, W., Feng, H., Yang, C.: A robust text digital watermarking algorithm based on fragments regrouping strategy. In: 2010 IEEE International Conference on Information Theory and Information Security (ICITIS), pp. 600\u2013603. IEEE (2010)","DOI":"10.1109\/ICITIS.2010.5689520"},{"key":"13_CR3","unstructured":"Duan, G.D., Zhao, X., Li, J.P., Liao, J.M.: A novel semi-fragile digital watermarking algorithm for image content authentication, localization and recovery. Dianzi Xuebao (Acta Electronica Sinica) 38(4), 842\u2013847 (2010)"},{"key":"13_CR4","unstructured":"ECMA International: Office open xml file formats-open packaging conventions. Dianzi Xuebao (Acta Electronica Sinica) 38(4), 842\u2013847 (2010)"},{"issue":"9","key":"13_CR5","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1002\/sec.378","volume":"5","author":"Z Fu","year":"2012","unstructured":"Fu, Z., Sun, X., Liu, Y., Li, B.: Text split-based steganography in OOXML format documents for covert communication. Secur. Commun. Netw. 5(9), 957\u2013968 (2012)","journal-title":"Secur. Commun. Netw."},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"He, Y.H.: Word spacing and character encoding based on a combination of text features digital watermarking algorithm. In: Applied Mechanics and Materials, vol. 401, pp. 2029\u20132032. Trans Tech Publ. (2013)","DOI":"10.4028\/www.scientific.net\/AMM.401-403.2029"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Hua, G., Huang, J., Shi, Y.Q., Goh, J., Thing, V.L.: Twenty years of digital audio watermarking a comprehensive review. Signal Process. 128, 222\u2013242 (2016)","DOI":"10.1016\/j.sigpro.2016.04.005"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Huanhuan, H., Xin, Z., Weiming, Z., Nenghai, Y.: Adaptive text steganography by exploring statistical and linguistical distortion. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp. 145\u2013150. IEEE (2017)","DOI":"10.1109\/DSC.2017.16"},{"issue":"7","key":"13_CR9","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/5.771070","volume":"87","author":"D Kundur","year":"1999","unstructured":"Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE 87(7), 1167\u20131180 (1999)","journal-title":"Proc. IEEE"},{"issue":"2","key":"13_CR10","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1360\/jos170315","volume":"17","author":"C Li","year":"2006","unstructured":"Li, C., Huang, J.W.: A semi-fragile image watermarking resisting to jpeg. J. Softw. 17(2), 315\u2013324 (2006)","journal-title":"J. Softw."},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Low, S.H., Maxemchuk, N.F., Brassil, J., O\u2019Gorman, L.: Document marking and identification using both line and word shifting. In: INFOCOM 1995, Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Bringing Information to People, Proceedings, vol. 2, pp. 853\u2013860. IEEE (1995)","DOI":"10.1109\/INFCOM.1995.515956"},{"issue":"3","key":"13_CR12","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1007\/s11042-012-1313-8","volume":"71","author":"L Xiang","year":"2014","unstructured":"Xiang, L., Sun, X., Luo, G., Xia, B.: Linguistic steganalysis using the features derived from synonym frequency. Multimed. Tools Appl. 71(3), 1893\u20131911 (2014)","journal-title":"Multimed. Tools Appl."},{"key":"13_CR13","first-page":"112","volume":"46","author":"M Xu","year":"2009","unstructured":"Xu, M., Wang, Y., Li, T.: A novel scheme of information hiding in word2007 document. J. Comput. Res. Dev. 46, 112\u2013116 (2009)","journal-title":"J. Comput. Res. Dev."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00015-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T03:32:43Z","timestamp":1751859163000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00015-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000141","9783030000158"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00015-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}