[1] | Adobe (2010) Making the case PDF/A and Adobe Acrobat. White paper, Adobe Systems Incorporated., Available: http://goo.gl/F4ZkL - Accessed 2013 Jun 22.
|
[2] | Gupta R, Karayil A, Rajendran R (2008) Contract lifecycle management. White paper, Infosys, Available: http://goo.gl/aEQj9 - Accessed 2013 Jun 22.
|
[3] | Villars SFRL (2006) The information lifecycle management imperative. White paper, IDC Information and data, Available: http://goo.gl/4aOqo - Accessed 2013 Jun 22.
|
[4] | Berghel H (2012) Wikileaks and the matter of private manning. Computer 45: : 70–73.
|
[5] | Coles-Kemp L, Theoharidou M (2010) Insider threat and information security management. In:Probst CW, Hunker J, Gollmann D, Bishop M, editors, Insider Threats in Cyber Security, Springer US, volume 49 of Advances in Information Security. pp.45–71.
|
[6] | Kessler G (2012) Information security: New threats or familiar problems? Computer 45: : 59–65.
|
[7] | Gaff BM, Loren RA, Spinney EA (2012) Intellectual Property, Part II. Computer 45: : 9–11.
|
[8] | Cox I (1997) Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6: 1673–1687.
|
[9] | Garcia-Hernandez JJ, Feregrino-Uribe C, Cumplido R (2013) Collusion-resistant audio fingerprinting system in the modulated complex lapped transform domain. PLoS ONE 8: e65985.
|
[10] | Cox IJ, Kilian J, Leighton T, Shamoon T (1996) Secure spread spectrum watermarking for images, audio and video. In: International Conference on Image Processing, 1996. Proceedings. volume 3 , pp. 243–246.
|
[11] | Schick R, Ruland C (2011) Document tracking - on the way to a new security service. In: 2011 Conference on Network and Information Systems Security (SAR-SSI). pp. 1–5.
|
[12] | Jalil Z, Mirza A (2009) A review of digital watermarking techniques for text documents. In: International Conference on Information and Multimedia Technology. ICIMT '09. pp. 230–234.
|
[13] | Zhou X, Wang Z, Zhao W, Wang S, Yu J (2009) Performance analysis and evaluation of text watermarking. In: International Symposium on Computer Network and Multimedia Technology. pp. 1–4.
|
[14] | Zhou X, Zhao W,Wang Z, Pan L (2009) Security theory and attack analysis for text watermarking. In: International Conference on E-Business and Information System Security. EBISS '09. pp. 1–6.
|
[15] | Brassil JT, Member S, Low S, O'Gorman L, Maxemchuk NF (1995) Electronic marking and identification techniques to discourage document copying. In: IEEE Journal on Selected Areas in Communications. pp. 1278–1287.
|
[16] | Low S, Maxemchuk N, Lapone A (1998) Document identification for copyright protection using centroid detection. IEEE Transactions on Communications 46: : 372–383.
|
[17] | Brassil J, Low S, Maxemchuk NF, O'Gorman L (1994) Hiding information in document images. In: Conference on Information Sciences and Systems (CISS-95). pp. 482–489.
|
[18] | Low S, Maxemchuk N, Brassil J, O'Gorman L (1995) Document marking and identification using both line and word shifting. In: INFOCOM '95, Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies. pp. 853–860 vol.2.
|
[19] | Chotikakamthorn N (1998) Electronic document data hiding technique using inter-character space. In: The 1998 IEEE Asia-Pacific Conference on Circuits and Systems. IEEE APCCAS 1998. pp. 419–422.
|
[20] | Alattar AM, Alattar OM (2004) Watermarking electronic text documents containing justified paragraphs and irregular line spacing. In: Delp EJ, Wong PW, editors, Security, Steganography, and Watermarking of Multimedia Contents. SPIE, volume 5306 of Proceedings of SPIE, pp. 685–695.
|
[21] | Kim YW, Moon KA, Oh IS (2003) A text watermarking algorithm based on word classification and inter-word space statistics. In: Proceedings Seventh International Conference on Document Analysis and Recognition 2003. pp. 775–779.
|
[22] | Huang D, Yan H (2001) Interword distance changes represented by sine waves for watermarking text images. IEEE Transactions on Circuits and Systems for Video Technology 11: 1237–1245.
|
[23] | Low SH, Maxemchuk NF (2000) Capacity of text marking channel. IEEE Signal Processing Letters 7: 345–347.
|
[24] | Choo HG, Kim WY (2004) Data-hiding capacity improvement for text watermarking using space coding method. In: Kalker T, Cox I, Ro Y, editors, Digital Watermarking, Springer Berlin Heidelberg, volume 2939 of Lecture Notes in Computer Science. pp. 593–599.
|
[25] | Yawai W, Hiransakolwong N (2012) Increase the hiding-bit capacity and strength for text watermarking with the line intersection on text image. In: 8th International Conference on Computing Technology and Information Management (ICCM). volume 1, pp. 427–433.
|
[26] | Tang YL, Huang YT (2010) Print-and-scan resilient watermarking for authenticating paper-based certificates. In: 2010 First International Conference on Pervasive Computing Signal Processing and Applications (PCSPA). pp. 357–361.
|
[27] | Lefebvre F, Gueluy A, Delannay D, Macq B (2001) A print and scan optimized watermarking scheme. In: 2001 IEEE Fourth Workshop on Multimedia Signal Processing. pp. 511–516.
|
[28] | Qadir M, Ahmad I (2005) Digital text watermarking: secure content delivery and data hiding in digital documents. In: 39th Annual 2005 International Carnahan Conference on Security Technology, 2005. CCST '05. pp. 101–104.
|
[29] | He B, Wu Y, Kang K, Guo W (2009) A robust binary text digital watermarking algorithm for print-scan process. In: 2009 WRI World Congress on Computer Science and Information Engineering. volume 7, pp. 290–294.
|
[30] | Wang ZJ, Wu M, Trappe W, Liu KJR (2004) Group-oriented fingerprinting for multimedia forensics. EURASIP Journal on Applied Signal Processing 2004: 2153–2173.
|
[31] | Kuribayashi M (2011) Hierarchical spread spectrum fingerprinting scheme based on CDMA technique. EURASIP Journal on Information Security 2011: 16.
|
[32] | de Madrid A (2013). Biblioteca Digital del Ateneo de Madrid. Available: http://goo.gl/eioo6. - Accessed 2013 Jun 22.
|
[33] | Hore A, Ziou D (2010) Image quality metrics: PSNR vs. SSIM. In: 20th International Conference on Pattern Recognition (ICPR). Washington, DC, USA, pp. 2366–2369.
|
[34] | Frigo M, Johnson S (2005) The design and implementation of fftw3. Proceedings of the IEEE 93: 216–231.
|
[35] | Ismail Avcbas BS (1999) Statistical analysis of image quality measures. Technical report, Department of Electrical and Electronic Engineering, Bogazi?i University, ?stanbul, Turkey.
|
[36] | Wang Z, Bovik A, Sheikh H, Simoncelli E (2004) Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing 13: 600–612.
|
[37] | Frank Warmerdam MW Andrey Kiselev, Kelly D (2013). Libtiff. Available: http://www.libtiff.org/. - Accessed 2013 Jun 22.
|
[38] | IJG (2013). Libjpeg. Available: http://www.ijg.org/. - Accessed 2013 Jun 22.
|
[39] | Distler T (2013). IQA. Available: http://tdistler.com/iqa/. - Accessed 2013 Jun 22.
|