{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:27:31Z","timestamp":1771025251373,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540210610","type":"print"},{"value":"9783540246244","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24624-4_10","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T04:00:52Z","timestamp":1294372852000},"page":"129-140","source":"Crossref","is-referenced-by-count":19,"title":["Natural Language Watermarking Using Semantic Substitution for Chinese Text"],"prefix":"10.1007","author":[{"given":"Yuei-Lin","family":"Chiang","sequence":"first","affiliation":[]},{"given":"Lu-Ping","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Wen-Tai","family":"Hsieh","sequence":"additional","affiliation":[]},{"given":"Wen-Chih","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Brassil, J., Low, S., Maxemchuk, N., O\u2019 Gorman, L.: Electronic marking and identification techniques to discourage document copying. In: Proceedings of IEEE INFOCOM 1994, pp. 1278\u20131287 (1994)","DOI":"10.1109\/INFCOM.1994.337544"},{"key":"10_CR2","unstructured":"Brassil, J., Low, S., Maxemchuk, N., O\u2019 Gorman, L.: Hiding information in document images. In: Proceedings of the 29th Annual Conference on Information Sciences and Systems, pp. 482\u2013489 (1995)"},{"key":"10_CR3","unstructured":"Charniak, E.: Statistical parsing with a context-free grammar and word statistics. In: Proceedings of NCAI 1997, pp. 598\u2013603 (1997)"},{"key":"10_CR4","series-title":"\u00a76.5 in An Introduction to the Theory of Numbers","first-page":"67","volume-title":"Quadratic Residues","author":"G.H. Hardy","year":"1979","unstructured":"Hardy, G.H., Wright, E.M.: Quadratic Residues, 5th edn. \u00a76.5 in An Introduction to the Theory of Numbers, pp. 67\u201368. Clarendon Press, Oxford (1979)","edition":"5"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Johnson, M.: The effect of alternative tree representations on tree bank grammars. In: Proceedings of the Joint Conference on New methods in Language Processing and Computational Natural Language Learning (NeMLaP3\/CoNLL 1998), pp. 39\u201348 (1998)","DOI":"10.3115\/1603899.1603908"},{"key":"10_CR6","unstructured":"Low, S., Maxemchuk, N., Brassil, J., O\u2019 Gorman, L.: Document marking and identification using both line and word shifting. In: Proceedings of IEEE INFOCOM 1995 (1995)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-36415-3_13","volume-title":"Information Hiding","author":"M. Atallah","year":"2003","unstructured":"Atallah, M., Raskin, V., Hempelmann, C.F., Karahan, M., Sion, R., Triezenberg, K.E., Topkara, U.: Natural Language Watermarking and Tamperproofing. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 196\u2013212. Springer, Heidelberg (2003)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Atallah, M.J., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., Naik, S.: Natural Language Watermarking: Design, Analysis, and Proof-of-Concept Implementation. Published in the Proceedings of the 4th International Information Hiding Workshop, Pittsburgh, Pennsylvania, April 25-27 (2001)","DOI":"10.1007\/3-540-45496-9_14"},{"key":"10_CR9","unstructured":"Xia, F., Palmer, M., Xue, N., Okurowski, M.E., Kovarik, J., Chiou, F.-D., Kroch, T., Marcus, M.: Developing Guidelines and Ensuring Consistency for Chinese Text Annotation. In: Second International Conference on Language Resources and Evaluation (LREC 2000), pp. 3\u201310 (2000)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24624-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T13:46:53Z","timestamp":1740836813000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24624-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210610","9783540246244"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24624-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}