{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:46:11Z","timestamp":1761396371117,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T00:00:00Z","timestamp":1661126400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,22]]},"DOI":"10.1145\/3548785.3548794","type":"proceedings-article","created":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T16:08:13Z","timestamp":1663085293000},"page":"166-170","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Grayscale Text Watermarking"],"prefix":"10.1145","author":[{"given":"Simone","family":"Branchetti","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, University of Bologna, Italy"}]},{"given":"Flavio","family":"Bertini","sequence":"additional","affiliation":[{"name":"Department of Mathematical, Physical and Computer Sciences, University of Parma, Italy"}]},{"given":"Danilo","family":"Montesi","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Bologna, Italy"}]}],"member":"320","published-online":{"date-parts":[[2022,9,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1999.791732"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_14"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6853823"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1999.822893"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Diogo Campos Rodrigo\u00a0Rocha Silva and Jorge Bernardino. 2019. Text Mining in Hotel Reviews: Impact of Words Restriction in Text Classification.. In KDIR. 442\u2013449.","DOI":"10.5220\/0008346904420449"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.152"},{"key":"e_1_3_2_1_7_1","article-title":"Text Watermarking using Combined Image and Text for Authentication and","volume":"20","author":"Anita\u00a0John","year":"2011","unstructured":"Anita\u00a0John Jaseena\u00a0K.U. 2011. Text Watermarking using Combined Image and Text for Authentication and Protection. Int. Journal of Computer Applications 20, 4 (2011). https:\/\/doi.org\/10.1.1.206.4500","journal-title":"Journal of Computer Applications"},{"key":"e_1_3_2_1_8_1","article-title":"Watermarking Grayscale Images using Text for Copyright Protection","volume":"31","author":"Jobin\u00a0Abraham Varghese\u00a0Paul","year":"2011","unstructured":"Dr.Varghese\u00a0Paul Jobin\u00a0Abraham. 2011. Watermarking Grayscale Images using Text for Copyright Protection. International Journal of Computer Applications 31, 9(2011). https:\/\/doi.org\/10.1.1.735.1015","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.01.003"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Young-Won Kim Kyung-Ae Moon and Il-Seok Oh. 2003. A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics.. In ICDAR. Citeseer 775\u2013779.","DOI":"10.1109\/ICDAR.2003.1227767"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.04.002"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2008.04.001"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.07.040"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.12.023"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-019-0094-2"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3116203"},{"key":"e_1_3_2_1_17_1","volume-title":"Digital Watermarking\u2014An Overview and a Possible Solution. ICTIS","author":"Sharma U","year":"2019","unstructured":"Kartik\u00a0U Sharma, Pooja\u00a0P Talan, Pratiksha\u00a0P Nawade, Mir\u00a0Sadique Ali, and Akshay\u00a0U Sharma. 2019. Digital Watermarking\u2014An Overview and a Possible Solution. ICTIS (2019), 447\u2013455."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11539902_121"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2016.1202356"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161397"}],"event":{"name":"IDEAS'22: International Database Engineered Applications Symposium","acronym":"IDEAS'22","location":"Budapest Hungary"},"container-title":["Proceedings of the 26th International Database Engineered Applications Symposium"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548785.3548794","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548785.3548794","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:50:53Z","timestamp":1750182653000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548785.3548794"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,22]]},"references-count":20,"alternative-id":["10.1145\/3548785.3548794","10.1145\/3548785"],"URL":"https:\/\/doi.org\/10.1145\/3548785.3548794","relation":{},"subject":[],"published":{"date-parts":[[2022,8,22]]},"assertion":[{"value":"2022-09-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}