{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:23:18Z","timestamp":1757542998596},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,3,14]],"date-time":"2020-03-14T00:00:00Z","timestamp":1584144000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,14]],"date-time":"2020-03-14T00:00:00Z","timestamp":1584144000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11276-020-02296-1","type":"journal-article","created":{"date-parts":[[2020,3,14]],"date-time":"2020-03-14T12:02:36Z","timestamp":1584187356000},"page":"3831-3845","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A novel Bloom-filter-based scheme for secure text ownership protection"],"prefix":"10.1007","volume":"26","author":[{"given":"Walid I.","family":"Khedr","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,14]]},"reference":[{"key":"2296_CR1","doi-asserted-by":"publisher","first-page":"8011","DOI":"10.1109\/ACCESS.2018.2796585","volume":"6","author":"NS Kamaruddin","year":"2018","unstructured":"Kamaruddin, N. S., Kamsin, A., Por, L. Y., & Rahman, H. (2018). A review of text watermarking: theory, methods, and applications. IEEE Access,6, 8011\u20138028. https:\/\/doi.org\/10.1109\/ACCESS.2018.2796585.","journal-title":"IEEE Access"},{"issue":"4","key":"2296_CR2","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1007\/s11276-017-1606-y","volume":"25","author":"SS Jamal","year":"2019","unstructured":"Jamal, S. S., Shah, T., Farwa, S., & Khan, M. U. J. W. N. (2019). A new technique of frequency domain watermarking based on a local ring. Wireless Networks,25(4), 1491\u20131503. https:\/\/doi.org\/10.1007\/s11276-017-1606-y.","journal-title":"Wireless Networks"},{"issue":"2","key":"2296_CR3","first-page":"62","volume":"12","author":"NAAS Al-maweri","year":"2016","unstructured":"Al-maweri, N. A. A. S., Ali, R., Adnan, W. A. W., Ramli, A. R., & Ahmad, S. M. S. (2016). State-of-the-art in techniques of text digital watermarking: challenges and limitations. JCS,12(2), 62\u201380.","journal-title":"JCS"},{"issue":"7","key":"2296_CR4","doi-asserted-by":"publisher","first-page":"2453","DOI":"10.1007\/s11276-015-1157-z","volume":"22","author":"A Sen","year":"2016","unstructured":"Sen, A., Chatterjee, T., & DasBit, S. J. W. N. (2016). LoWaNA: Low overhead watermark based node authentication in WSN. Wireless Networks,22(7), 2453\u20132467. https:\/\/doi.org\/10.1007\/s11276-015-1157-z.","journal-title":"Wireless Networks"},{"issue":"12","key":"2296_CR5","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1109\/76.974678","volume":"11","author":"H Ding","year":"2001","unstructured":"Ding, H., & Hong, Y. (2001). Interword distance changes represented by sine waves for watermarking text images. IEEE Transactions on Circuits and Systems for Video Technology,11(12), 1237\u20131245. https:\/\/doi.org\/10.1109\/76.974678.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"11","key":"2296_CR6","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1016\/j.patrec.2004.04.002","volume":"25","author":"Y-W Kim","year":"2004","unstructured":"Kim, Y.-W., & Oh, I.-S. (2004). Watermarking text document images using edge direction histograms. Pattern Recognition Letters,25(11), 1243\u20131251. https:\/\/doi.org\/10.1016\/j.patrec.2004.04.002.","journal-title":"Pattern Recognition Letters"},{"key":"2296_CR7","first-page":"212","volume":"7","author":"Z Jalil","year":"2010","unstructured":"Jalil, Z., Mirza, A. M., & Sabir, M. (2010). Content based zero-watermarking algorithm for authentication of text documents. International Journal of Computer Science and Information Security,7, 212\u2013217.","journal-title":"International Journal of Computer Science and Information Security"},{"key":"2296_CR8","unstructured":"Atallah, M. J., Raskin, V., Hempelmann, C. F., Karahan, M., Sion, R., Topkara, U., et al. (2003). Natural language watermarking and tamperproofing (pp. 196-212, Information Hiding). Berlin: Springer."},{"key":"2296_CR9","doi-asserted-by":"crossref","unstructured":"Atallah, M. J., McDonough, C. J., Raskin, V., & Nirenburg, S. (2001). Natural language processing for information assurance and security: an overview and implementations. In Proceedings of the 2000 workshop on New security paradigms, 2001 2001 (pp. 51\u201365).","DOI":"10.1145\/366173.366190"},{"key":"2296_CR10","unstructured":"Atallah, M. J., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., et al. (2001). Natural language watermarking: design, analysis, and a proof-of-concept implementation (pp. 185\u2013200, Information Hiding). Berlin: Springer."},{"key":"2296_CR11","first-page":"125","volume":"3","author":"H Yazdani","year":"2013","unstructured":"Yazdani, H., Yazdani, V., & Doostari, M. A. (2013). A new method to persian text watermarking using curvaceous letters. Journal of Basic and Applied Scientific Research,3, 125\u2013131.","journal-title":"Journal of Basic and Applied Scientific Research"},{"issue":"3","key":"2296_CR12","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1080\/02533839.2014.981210","volume":"38","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Zhu, Y., & Xin, G. (2015). A zero-watermarking algorithm based on merging features of sentences for Chinese text. Journal of the Chinese Institute of Engineers,38(3), 391\u2013398.","journal-title":"Journal of the Chinese Institute of Engineers"},{"issue":"4","key":"2296_CR13","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s11859-016-1171-8","volume":"21","author":"P Zhu","year":"2016","unstructured":"Zhu, P., Xiang, G., Song, W., Li, A., Zhang, Y., & Tao, R. (2016). A text zero-watermarking algorithm based on Chinese phonetic alphabets. Wuhan University Journal of Natural Sciences,21(4), 277\u2013282. https:\/\/doi.org\/10.1007\/s11859-016-1171-8.","journal-title":"Wuhan University Journal of Natural Sciences"},{"key":"2296_CR14","doi-asserted-by":"crossref","unstructured":"Rizzo, S. G., Bertini, F., & Montesi, D. (2016). Content-preserving text watermarking through unicode homoglyph substitution. Paper presented at the Proceedings of the 20th International Database Engineering &#38; Applications Symposium, Montreal, QC, Canada.","DOI":"10.1145\/2938503.2938510"},{"issue":"48","key":"2296_CR15","first-page":"1","volume":"9","author":"NS Al-Maweri","year":"2016","unstructured":"Al-Maweri, N. S., Adnan, W. W., Ramli, A., Samsudin, K., & Rahman, S. (2016). Robust digital text watermarking algorithm based on unicode extended character. Indian Journal of Science and Technology,9(48), 1\u201314.","journal-title":"Indian Journal of Science and Technology"},{"issue":"2","key":"2296_CR16","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.jksuci.2016.12.007","volume":"30","author":"RA Alotaibi","year":"2018","unstructured":"Alotaibi, R. A., & Elrefaei, L. A. (2018). Improved capacity Arabic text watermarking methods based on open word space. Journal of King Saud University - Computer and Information Sciences,30(2), 236\u2013248. https:\/\/doi.org\/10.1016\/j.jksuci.2016.12.007.","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"key":"2296_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.07.007","author":"A Taha","year":"2018","unstructured":"Taha, A., Hammad, A. S., & Selim, M. M. (2018). A high capacity algorithm for information hiding in Arabic text. Journal of King Saud University - Computer and Information Sciences. https:\/\/doi.org\/10.1016\/j.jksuci.2018.07.007.","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"issue":"2","key":"2296_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3152823","volume":"37","author":"C Xiao","year":"2018","unstructured":"Xiao, C., Zhang, C., & Zheng, C. (2018). FontCode: Embedding information in text documents using glyph perturbation. ACM Transactions on Graphics,37(2), 1\u201316. https:\/\/doi.org\/10.1145\/3152823.","journal-title":"ACM Transactions on Graphics"},{"key":"2296_CR19","doi-asserted-by":"publisher","first-page":"64955","DOI":"10.1109\/ACCESS.2019.2916674","volume":"7","author":"U Khadam","year":"2019","unstructured":"Khadam, U., Iqbal, M. M., Azam, M. A., Khalid, S., Rho, S., & Chilamkurti, N. (2019). Digital watermarking technique for text document protection using data mining analysis. IEEE Access,7, 64955\u201364965. https:\/\/doi.org\/10.1109\/ACCESS.2019.2916674.","journal-title":"IEEE Access"},{"key":"2296_CR20","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1155\/2014\/514652","volume":"2014","author":"O Tayan","year":"2014","unstructured":"Tayan, O., Kabir, M. N., & Alginahi, Y. M. (2014). A hybrid digital-signature and zero-watermarking approach for authentication and protection of sensitive electronic documents. The Scientific World Journal,2014, 14. https:\/\/doi.org\/10.1155\/2014\/514652.","journal-title":"The Scientific World Journal"},{"issue":"18","key":"2296_CR21","doi-asserted-by":"publisher","first-page":"4047","DOI":"10.1016\/j.comnet.2013.09.003","volume":"57","author":"S Geravand","year":"2013","unstructured":"Geravand, S., & Ahmadi, M. (2013). Bloom filter applications in network security: A state-of-the-art survey. Computer Networks,57(18), 4047\u20134064. https:\/\/doi.org\/10.1016\/j.comnet.2013.09.003.","journal-title":"Computer Networks"},{"issue":"9","key":"2296_CR22","doi-asserted-by":"publisher","first-page":"2589","DOI":"10.1109\/TKDE.2015.2451616","volume":"27","author":"NK Nagwani","year":"2015","unstructured":"Nagwani, N. K. (2015). A comment on \u201cA similarity measure for text classification and clustering\u201d. IEEE Transactions on Knowledge and Data Engineering,27(9), 2589\u20132590. https:\/\/doi.org\/10.1109\/TKDE.2015.2451616.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"2296_CR23","unstructured":"News Summary. (2017). https:\/\/www.kaggle.com\/sunnysai12345\/news-summary. Accessed 17 Jan 2020."},{"issue":"10","key":"2296_CR24","doi-asserted-by":"publisher","first-page":"1279","DOI":"10.1109\/TKDE.2004.58","volume":"16","author":"KM Hammouda","year":"2004","unstructured":"Hammouda, K. M., & Kamel, M. S. (2004). Efficient phrase-based document indexing for web document clustering. IEEE Transactions on Knowledge and Data Engineering,16(10), 1279\u20131296.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"2296_CR25","unstructured":"Sanderson, M. J. N. L. E. (2010). Christopher D. Manning, Prabhakar Raghavan, Hinrich Sch\u00fctze, Introduction to information retrieval. Cambridge University Press. 2008. ISBN-13 978-0-521-86571-5, xxi\u2009+\u2009482 pages. 16(1), 100\u2013103."},{"key":"2296_CR26","doi-asserted-by":"publisher","unstructured":"Magara, M. B., Ojo, S. O., & Zuva, T. (2018). A comparative analysis of text similarity measures and algorithms in research paper recommender systems. In 2018 conference on information communications technology and society (ICTAS), 8-9 March 2018 (pp. 1\u20135). https:\/\/doi.org\/10.1109\/ictas.2018.8368766.","DOI":"10.1109\/ictas.2018.8368766"},{"key":"2296_CR27","doi-asserted-by":"crossref","unstructured":"Kumar, H. M. K., Harish, B. S., Kumar, S. V. A., & Aradhya, V. N. M. (2018). Classification of sentiments in short-text: an approach using mSMTP measure. Paper presented at the Proceedings of the 2nd international conference on machine learning and soft computing, Phu Quoc Island, Viet Nam,","DOI":"10.1145\/3184066.3184074"},{"issue":"7","key":"2296_CR28","doi-asserted-by":"publisher","first-page":"1575","DOI":"10.1109\/TKDE.2013.19","volume":"26","author":"Y Lin","year":"2014","unstructured":"Lin, Y., Jiang, J., & Lee, S. (2014). A similarity measure for text classification and clustering. IEEE Transactions on Knowledge and Data Engineering,26(7), 1575\u20131590. https:\/\/doi.org\/10.1109\/TKDE.2013.19.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"2296_CR29","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.cose.2017.08.015","volume":"72","author":"M Klonowski","year":"2018","unstructured":"Klonowski, M., & Piotrowska, A. M. (2018). Light-weight and secure aggregation protocols based on Bloom filters. Computers & Security,72, 107\u2013121. https:\/\/doi.org\/10.1016\/j.cose.2017.08.015.","journal-title":"Computers & Security"},{"issue":"3","key":"2296_CR30","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1007\/s11276-018-1698-z","volume":"25","author":"A Kumar","year":"2019","unstructured":"Kumar, A., & Pais, A. R. J. W. N. (2019). A new hybrid key pre-distribution scheme for wireless sensor networks. Wireless Networks,25(3), 1185\u20131199. https:\/\/doi.org\/10.1007\/s11276-018-1698-z.","journal-title":"Wireless Networks"},{"key":"2296_CR31","doi-asserted-by":"crossref","unstructured":"Amato, F., Cozzolino, G., Giacalone, M., Moscato, F., Romeo, F., & Xhafa, F. A Hybrid Approach for Document Analysis in Digital Forensic Domain. In Cham, 2019 (pp. 170\u2013179, Advances in Internet, Data and Web Technologies). Berlin: Springer International Publishing.","DOI":"10.1007\/978-3-030-12839-5_16"},{"key":"2296_CR32","unstructured":"Reuters-21578. http:\/\/ana.cachopo.org\/datasets-for-single-label-text-categorization. Accessed 17 Jan 2020."},{"key":"2296_CR33","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1155\/2018\/5325040","volume":"2018","author":"M Taleby Ahvanooey","year":"2018","unstructured":"Taleby Ahvanooey, M., Li, Q., Shim, H. J., & Huang, Y. (2018). A comparative analysis of information hiding techniques for copyright protection of text documents. Security and Communication Networks,2018, 22. https:\/\/doi.org\/10.1155\/2018\/5325040.","journal-title":"Security and Communication Networks"},{"issue":"1","key":"2296_CR34","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/TCC.2014.2385063","volume":"5","author":"S Xiong","year":"2017","unstructured":"Xiong, S., Yao, Y., Li, S., Cao, Q., He, T., Qi, H., et al. (2017). kBF: Towards approximate and bloom filter based key-value storage for cloud computing systems. IEEE Transactions on Cloud Computing,5(1), 85\u201398. https:\/\/doi.org\/10.1109\/TCC.2014.2385063.","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"18","key":"2296_CR35","doi-asserted-by":"publisher","first-page":"6365","DOI":"10.1002\/sec.1738","volume":"9","author":"MH Alkawaz","year":"2016","unstructured":"Alkawaz, M. H., Sulong, G., Saba, T., Almazyad, A. S., & Rehman, A. (2016). Concise analysis of current text automation and watermarking approaches. Security and Communication Networks,9(18), 6365\u20136378. https:\/\/doi.org\/10.1002\/sec.1738.","journal-title":"Security and Communication Networks"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02296-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-020-02296-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02296-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T17:16:30Z","timestamp":1695921390000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-020-02296-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,14]]},"references-count":35,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["2296"],"URL":"https:\/\/doi.org\/10.1007\/s11276-020-02296-1","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,14]]},"assertion":[{"value":"14 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}