In the first part of this paper, we propose a watermarking method for text documents that is less vulnerable to attacks than previous methods. In the second part, we propose a method for protecting the actual content of the document. In a section of independent interest, we discuss the interplay between error-correcting codes and steganography.
CITATION STYLE
Bern, M., Breidenbach, J., & Goldberg, D. (2001). Trustworthy paper documents. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2137, pp. 1–12). Springer Verlag. https://doi.org/10.1007/3-540-45496-9_1
Mendeley helps you to discover research relevant for your work.