[1] Huang S, Wu J K. Optical watermarking for printed document authentication [J]. IEEE Transactions on Information Forensics and Security, 2007, 2(2): 164-173.
[2] Brassil J T, Low S, Maxemchuk N F, et al. Electronic marking and identification techniques to discourage document copying [J]. IEEE Journal on Selected Areas in Communications, 1995, 13(8): 1495-1504.
[3] Huang D, Yan H. Interword distance changes represented by sine waves for watermarking text images [J]. IEEE Transaction on Circuits and Systems for Video Technology, 2001, 11(12): 1237-1245.
[4] Wu M, Liu B D. Data hiding in binary image for authentication and annotation [J]. IEEE Transactions on Multimedia, 2004, 6(4): 528-538.
[5] 亓文法, 李晓龙, 杨斌, 等. 用于信息追踪的文本水印算法[J]. 通信学报, 2008, 29(10): 143-190. Qi W F, Li X L, Yang B, et al. Document watermarking scheme for information tracking [J]. Journal on Communications, 2008, 29(10): 143-190.
[6] 赵星阳, 孙继银, 李琳琳. 基于字符阶梯边沿调整的文本水印算法[J]. 计算机应用, 2008, 28(12): 3175-3178, 3182. Zhao X Y, Sun J Y, Li L L. Watermarking of text images using character step edge adjustment [J]. Computer Applications, 2008, 28(12): 3175-3178, 3182.
[7] Cox I J, Kilian J, Leighton T, et al. Secure spread spectrum watermarking for multimedia image processing [J]. IEEE Transactions, 1997, 6(12): 1673-1687. |