{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,2]],"date-time":"2025-02-02T05:32:45Z","timestamp":1738474365312,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540889601"},{"type":"electronic","value":"9783540889618"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88961-8_15","type":"book-chapter","created":{"date-parts":[[2008,10,15]],"date-time":"2008-10-15T01:22:43Z","timestamp":1224033763000},"page":"209-223","source":"Crossref","is-referenced-by-count":1,"title":["Authorship Proof for Textual Document"],"prefix":"10.1007","author":[{"given":"J.","family":"Wu","sequence":"first","affiliation":[]},{"given":"D. R.","family":"Stinson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-36415-3_13","volume-title":"Information Hiding","author":"M. Atallah","year":"2003","unstructured":"Atallah, M., Raskin, V., Hempelmann, C.F., Karahan, M., Sion, R., Topkara, U., Triezenberg, K.E.: Natural Language Watermarking and Tamperproofing. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 196\u2013212. Springer, Heidelberg (2003)"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/3-540-45496-9_14","volume-title":"Information Hiding","author":"M. Atallah","year":"2001","unstructured":"Atallah, M., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., Naik, S.: Natural language watermarking: design, analysis, and a proof-of-concept implementation. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 185\u2013199. Springer, Heidelberg (2001)"},{"key":"15_CR3","unstructured":"Beale, S., Nirenburg, S., Mahesh, K.: Semantic Analysis in the MikroKosmos Machine Translation Project. In: Proc. of the 2nd SNLP 1995, Bangkok, Thailand (1995)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Brassil, J., Low, S., Maxemchuk, N., O\u2019Gorman, L.: Marking text features of document images to deter illicit dissemination. In: Proc. of the 12th IAPR International Conference on Computer Vision and Image Processing, Jerusalem, Israel, vol.\u00a02, pp. 315\u2013319 (1994)","DOI":"10.1109\/ICPR.1994.576927"},{"key":"15_CR5","unstructured":"Brassil, J., Low, S., Maxemchuk, N.F., O\u2019Gorman, L.: Hiding information in documents images. In: Conference on Information Sciences and Systems (CISS 1995) (1995)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Chotikakamthorn, N.: Electronic document data hiding technique using inter-character space. In: Proc. of The 1998 IEEE Asia-Pacific Conference on Circuits and Systems, IEEE APCCAS 1998, Chiangmai, Thailand, pp. 419\u2013422 (1998)","DOI":"10.1109\/APCCAS.1998.743799"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Chotikakamthorn, N.: Document image data hiding techniques using character spacing width sequence coding. In: Proc. IEEE Intl. Conf. Image Processing, Japan (1999)","DOI":"10.1109\/ICIP.1999.822894"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Gupta, G., Pieprzyk, J., Wang, H.X.: An attack-localizing watermarking scheme for natural language documents. In: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, Taipei, Taiwan (2006)","DOI":"10.1145\/1128817.1128842"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1007\/3-540-45453-5_96","volume-title":"Advances in Multimedia Information Processing - PCM 2001","author":"H. Ji","year":"2001","unstructured":"Ji, H., Sook, J., Young, H.: A new digital watermarking for text document images using diagonal profile. In: Shum, H.-Y., Liao, M., Chang, S.-F. (eds.) PCM 2001. LNCS, vol.\u00a02195, p. 748. Springer, Heidelberg (2001)"},{"issue":"1-2","key":"15_CR10","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1023\/A:1013312707578","volume":"2","author":"M.S. Kankanhalli","year":"2002","unstructured":"Kankanhalli, M.S., Hau, K.F.: Watermarking of electronic text documents. Electronic Commerce Research\u00a02(1-2), 169\u2013187 (2002)","journal-title":"Electronic Commerce Research"},{"key":"15_CR11","unstructured":"Kim, Y., Moon, K., Oh, I.: A text watermarking algorithm based on word classification and inter-word space statistics. In: Conference on Document Analysis and Recognition (ICDAR 2003) (1995)"},{"key":"15_CR12","unstructured":"Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions, and reversals. Dokl. Akad. Nauk SSSR 163, 845\u2013848 (Russian); Translated as Soviet Physics Dokl. 10, 707\u2013710 (1965)"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Low, S., Maxemchuk, N., Brassil, J., O\u2019Gorman, L.: Document marking and identification using both line and word shifting. In: Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Bringing Information to People, INFOCOM 1995, Boston, USA, vol.\u00a02, pp. 853\u2013860 (1995)","DOI":"10.1109\/INFCOM.1995.515956"},{"key":"15_CR14","unstructured":"Mahesh, K., Nirenburg, S.: Meaning Representation for Knowledge Sharing in Practical Machine Translation. In: Proc. the FLAIRS 1996 Track on Information Interchange. Florida AI Research Symposium (1996)"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Nirenburg, S.: Application-Oriented Computational Semantics. In: Johnson, R., Rosner, M. (eds.) Computational Linguistics and Formal Semantics (1991)","DOI":"10.1017\/CBO9780511611803.009"},{"key":"15_CR16","unstructured":"Onyshkevych, B.: An Ontological- Semantic Framework for Text Analysis. Ph.D. Diss., School of Computer Science, Carnegie Mellon University (1997)"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Sun, X., Luo, G., Huang, H.: Component-based digital watermarking of Chinese texts. In: Proceedings of the 3rd international conference on Information security, Shanghai, China (2004)","DOI":"10.1145\/1046290.1046306"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Topkara, M., Riccardi, G., Hakkani-Tur, D., Atallah, M.J.: Natural Language Watermarking: Challenges in Building a Practical System. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA (2006)","DOI":"10.1117\/12.643560"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Topkara, M., Taskiran, C., Delp, E.J.: Natural Language Watermarking. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA (2005)","DOI":"10.1117\/12.593790"},{"key":"15_CR20","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/3-540-39965-8_18","volume-title":"Envisioning Machine Translation in the Information Future","author":"S. Helmreich","year":"2000","unstructured":"Helmreich, S., Farwell, D.: Text Meaning Representation as a Basis for Representation of Text Interpretation. In: White, J.S. (ed.) AMTA 2000. LNCS (LNAI), vol.\u00a01934, pp. 179\u2013188. Springer, Heidelberg (2000)"},{"key":"15_CR21","unstructured":"http:\/\/www.surety.com\/"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88961-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T19:16:08Z","timestamp":1738437368000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88961-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540889601","9783540889618"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88961-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}