{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:14:17Z","timestamp":1772122457157,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T00:00:00Z","timestamp":1665187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T00:00:00Z","timestamp":1665187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,8]]},"DOI":"10.1109\/fie56618.2022.9962396","type":"proceedings-article","created":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T19:32:45Z","timestamp":1669750365000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Enhancement of Plagiarism Detection Techniques via Watermarking"],"prefix":"10.1109","author":[{"given":"Dylan","family":"Ryman","sequence":"first","affiliation":[{"name":"University of Cincinnati,Department of Engineering Education,Cincinnati,OH,USA"}]},{"given":"P.K.","family":"Imbrie","sequence":"additional","affiliation":[{"name":"University of Cincinnati,Department of Engineering Education,Cincinnati,OH,USA"}]},{"given":"Jeff","family":"Kastner","sequence":"additional","affiliation":[{"name":"University of Cincinnati,Department of Engineering Education,Cincinnati,OH,USA"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1007\/978-3-662-43886-2_36","article-title":"New forensic methods for ooxml format documents","author":"fu","year":"2014","journal-title":"Digital-Forensics and Watermarking"},{"key":"ref11","first-page":"59","article-title":"Hiding information into ooxml documents: New steganographic perspectives","volume":"2","author":"castiglione","year":"2011","journal-title":"J Wirel Mob Networks Ubiquitous Comput Dependable Appl"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2019.8823564"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00015-8_13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3313290"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxh139"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50209-0_1"},{"key":"ref17","year":"2016","journal-title":"ISO 29500-1 2016 Information technology &#x2014; Document description and processing languages &#x2014; Office Open XML File Formats &#x2014; Part 1 Fundamentals and Markup Language Reference"},{"key":"ref18","article-title":"Data hiding and detection in office open xml (ooxml) documents","author":"raffay","year":"2011","journal-title":"Master&#x2019;s thesis"},{"key":"ref19","article-title":"Ims learning tools interoperability: Enabling a mash-up approach to teaching and learning tools","author":"severance","year":"2009","journal-title":"Technology Instruction Cognition and Learning"},{"key":"ref4","article-title":"Content based zero-watermarking algorithm for authentication of text documents","volume":"7","author":"jalil","year":"2010","journal-title":"International Journal of Information and Computer Security"},{"key":"ref3","first-page":"1","article-title":"Digital watermarking: An overview","author":"voyatzis","year":"1998","journal-title":"9th European Signal Processing Conference (EUSIPCO 98)"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1080\/19393555.2016.1202356","article-title":"An innovative technique for web text watermarking (aitw)","volume":"25","author":"ahvanooey","year":"2016","journal-title":"information Security Journal A Global Perspective"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FGCT.2012.6476589"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1738"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00116"},{"key":"ref2","article-title":"Academic plagiarism detection: A systematic literature review","volume":"52","author":"folt\u00fdnek","year":"2019","journal-title":"ACM Comput Surv"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/10508420701519239"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5120\/21330-4300"},{"key":"ref20","year":"2021","journal-title":"Using Deep Linking to Select Resources"},{"key":"ref21","year":"2021","journal-title":"Configuring LTI Advantage Tools"}],"event":{"name":"2022 IEEE Frontiers in Education Conference (FIE)","location":"Uppsala, Sweden","start":{"date-parts":[[2022,10,8]]},"end":{"date-parts":[[2022,10,11]]}},"container-title":["2022 IEEE Frontiers in Education Conference (FIE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9962306\/9962373\/09962396.pdf?arnumber=9962396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T19:25:22Z","timestamp":1678821922000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9962396\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/fie56618.2022.9962396","relation":{},"subject":[],"published":{"date-parts":[[2022,10,8]]}}}