{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T09:14:59Z","timestamp":1777022099629,"version":"3.51.4"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2016R1D1A1A09919551"],"award-info":[{"award-number":["NRF-2016R1D1A1A09919551"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2916674","type":"journal-article","created":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T19:53:12Z","timestamp":1557863592000},"page":"64955-64965","source":"Crossref","is-referenced-by-count":43,"title":["Digital Watermarking Technique for Text Document Protection Using Data Mining Analysis"],"prefix":"10.1109","volume":"7","author":[{"given":"Umair","family":"Khadam","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7212-1408","authenticated-orcid":false,"given":"Muhammad Munwar","family":"Iqbal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0488-4598","authenticated-orcid":false,"given":"Muhammad Awais","family":"Azam","sequence":"additional","affiliation":[]},{"given":"Shehzad","family":"Khalid","sequence":"additional","affiliation":[]},{"given":"Seungmin","family":"Rho","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5396-8897","authenticated-orcid":false,"given":"Naveen","family":"Chilamkurti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-016-0647-2"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.17706\/IJCEE.2014.V6.857"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ETCS.2010.494"},{"key":"ref32","first-page":"1","article-title":"Chinese text zero-watermark based on sentence&#x2019;s entropy","author":"meng","year":"2010","journal-title":"Proc of Int Conf on Multimedia Technology (ICMT)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCO.2013.6718288"},{"key":"ref30","first-page":"955","article-title":"Text document authentication by integrating inter character and word spaces watermarking","volume":"2","author":"yang","year":"2004","journal-title":"Proc IEEE Int Conf Multimedia Expo (ICME)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ISA.2011.5873351"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.07.040"},{"key":"ref35","first-page":"600","article-title":"A robust text digital watermarking algorithm based on fragments regrouping strategy","author":"cheng","year":"2010","journal-title":"Proc IEEE Int Conf Inf Theory Inf Secur (ICITIS)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2013.6508287"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/2938503.2938510","article-title":"Content-preserving text watermarking through unicode homoglyph substitution","author":"rizzo","year":"2016","journal-title":"Proc Int Database Eng Appl Symp"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63856-0_47"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/514652"},{"key":"ref12","article-title":"Digital image watermarking for printed and scanned documents","volume":"10420","author":"thongkor","year":"2017","journal-title":"Proc SPIE"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5325040"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/02533839.2014.981210"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2017.33"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/5.771071"},{"key":"ref17","article-title":"A high capacity algorithm for information hiding in Arabic text","author":"taha","year":"0","journal-title":"J King Saud Univ -Comput Inf Sci"},{"key":"ref18","first-page":"25","article-title":"Content authentication of english text via Internet using zero watermarking technique and Markov model","volume":"7","author":"ba-alwi","year":"2014","journal-title":"Int J Appl Inf Syst"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CISP.2010.5648007"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.4304\/jetwi.2.1.48-55"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070123"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3126010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2570812"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/49.464718"},{"key":"ref29","first-page":"775","article-title":"A text watermarking algorithm based on word classification and inter-word space statistics","author":"kim","year":"2003","journal-title":"Proc ICDAR"},{"key":"ref5","first-page":"50","article-title":"Information hiding in text to improve performance for word document","volume":"3","author":"khadim","year":"2015","journal-title":"International Journal of Research and Technology"},{"key":"ref8","first-page":"1093","article-title":"A survey of digital watermarking","volume":"7","author":"hao","year":"2005","journal-title":"J Comput Res Develop"},{"key":"ref7","first-page":"482","article-title":"Hiding information in document images","author":"brassil","year":"1995","journal-title":"Proc Conf Inf Sci Syst (CISS)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"ref9","first-page":"1","article-title":"An existential review on text watermarking techniques","volume":"120","author":"kaur","year":"2015","journal-title":"Int J Comput Appl"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.11648\/j.ijdst.20170305.11"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.12.023"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/VSMM.2016.7863183"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i48\/87787"},{"key":"ref48","first-page":"1","article-title":"Print-scan invariant text image watermarking for hardcopy document authentication","author":"tan","year":"2018","journal-title":"Multimedia Tools Appl"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0327-y"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1049\/el:20080522"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCT.2017.8188589"},{"key":"ref42","doi-asserted-by":"crossref","DOI":"10.1117\/12.643560","article-title":"Natural language watermarking: Challenges in building a practical system","volume":"6072","author":"topkara","year":"2006","journal-title":"Proc SPIE"},{"key":"ref24","article-title":"Copyright protection of plain text using digital watermarking","author":"jalil","year":"2010"},{"key":"ref41","first-page":"1","article-title":"Print-scan invariant text image watermarking for hardcopy document authentication","author":"tan","year":"2018","journal-title":"Multimedia Tools Appl"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/3152823","article-title":"FontCode: Embedding information in text documents using glyph perturbation","volume":"37","author":"xiao","year":"2018","journal-title":"ACM Trans Graph"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.aop.2017.11.013"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1752"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2016.62.80"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2016.12.007"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08713871.pdf?arnumber=8713871","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:41:22Z","timestamp":1643244082000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8713871\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2916674","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}