Serveur d'exploration sur l'OCR

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Natural Language Watermarking Using Semantic Substitution for Chinese Text

Identifieur interne : 000A15 ( Istex/Corpus ); précédent : 000A14; suivant : 000A16

Natural Language Watermarking Using Semantic Substitution for Chinese Text

Auteurs : Yuei-Lin Chiang ; Lu-Ping Chang ; Wen-Tai Hsieh ; Wen-Chih Chen

Source :

RBID : ISTEX:7E2EF0391193E708162E15A57D945B192A1B5B97

Abstract

Abstract: Numerous schemes have been designed for watermarking multimedia contents. Many of these schemes are vulnerable to watermark erasing attacks. Naturally, such methods are ineffective on text unless the text is represented as a bitmap image, but in that case, the watermark can be erased easily by using Optical Character Recognition (OCR) to change the representation of the text from a bitmap to ASCII or EBCDIC. This study attempts to develop a method for embedding watermark in the text that is as successful as the frequency-domain methods have been for image and audio. The novel method embeds the watermark in original text, creating ciphertext, which preserves the meaning of the original text via various semantic replacements.

Url:
DOI: 10.1007/978-3-540-24624-4_10

Links to Exploration step

ISTEX:7E2EF0391193E708162E15A57D945B192A1B5B97

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Natural Language Watermarking Using Semantic Substitution for Chinese Text</title>
<author>
<name sortKey="Chiang, Yuei Lin" sort="Chiang, Yuei Lin" uniqKey="Chiang Y" first="Yuei-Lin" last="Chiang">Yuei-Lin Chiang</name>
<affiliation>
<mods:affiliation>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: ylchiang@iii.org.tw</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Chang, Lu Ping" sort="Chang, Lu Ping" uniqKey="Chang L" first="Lu-Ping" last="Chang">Lu-Ping Chang</name>
<affiliation>
<mods:affiliation>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: clp@iii.org.tw</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Hsieh, Wen Tai" sort="Hsieh, Wen Tai" uniqKey="Hsieh W" first="Wen-Tai" last="Hsieh">Wen-Tai Hsieh</name>
<affiliation>
<mods:affiliation>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: wentai@iii.org.tw</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Chen, Wen Chih" sort="Chen, Wen Chih" uniqKey="Chen W" first="Wen-Chih" last="Chen">Wen-Chih Chen</name>
<affiliation>
<mods:affiliation>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: wjchen@iii.org.tw</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:7E2EF0391193E708162E15A57D945B192A1B5B97</idno>
<date when="2004" year="2004">2004</date>
<idno type="doi">10.1007/978-3-540-24624-4_10</idno>
<idno type="url">https://api.istex.fr/document/7E2EF0391193E708162E15A57D945B192A1B5B97/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000A15</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Natural Language Watermarking Using Semantic Substitution for Chinese Text</title>
<author>
<name sortKey="Chiang, Yuei Lin" sort="Chiang, Yuei Lin" uniqKey="Chiang Y" first="Yuei-Lin" last="Chiang">Yuei-Lin Chiang</name>
<affiliation>
<mods:affiliation>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: ylchiang@iii.org.tw</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Chang, Lu Ping" sort="Chang, Lu Ping" uniqKey="Chang L" first="Lu-Ping" last="Chang">Lu-Ping Chang</name>
<affiliation>
<mods:affiliation>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: clp@iii.org.tw</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Hsieh, Wen Tai" sort="Hsieh, Wen Tai" uniqKey="Hsieh W" first="Wen-Tai" last="Hsieh">Wen-Tai Hsieh</name>
<affiliation>
<mods:affiliation>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: wentai@iii.org.tw</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Chen, Wen Chih" sort="Chen, Wen Chih" uniqKey="Chen W" first="Wen-Chih" last="Chen">Wen-Chih Chen</name>
<affiliation>
<mods:affiliation>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: wjchen@iii.org.tw</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2004</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">7E2EF0391193E708162E15A57D945B192A1B5B97</idno>
<idno type="DOI">10.1007/978-3-540-24624-4_10</idno>
<idno type="ChapterID">10</idno>
<idno type="ChapterID">Chap10</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: Numerous schemes have been designed for watermarking multimedia contents. Many of these schemes are vulnerable to watermark erasing attacks. Naturally, such methods are ineffective on text unless the text is represented as a bitmap image, but in that case, the watermark can be erased easily by using Optical Character Recognition (OCR) to change the representation of the text from a bitmap to ASCII or EBCDIC. This study attempts to develop a method for embedding watermark in the text that is as successful as the frequency-domain methods have been for image and audio. The novel method embeds the watermark in original text, creating ciphertext, which preserves the meaning of the original text via various semantic replacements.</div>
</front>
</TEI>
<istex>
<corpusName>springer</corpusName>
<author>
<json:item>
<name>Yuei-Lin Chiang</name>
<affiliations>
<json:string>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</json:string>
<json:string>E-mail: ylchiang@iii.org.tw</json:string>
</affiliations>
</json:item>
<json:item>
<name>Lu-Ping Chang</name>
<affiliations>
<json:string>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</json:string>
<json:string>E-mail: clp@iii.org.tw</json:string>
</affiliations>
</json:item>
<json:item>
<name>Wen-Tai Hsieh</name>
<affiliations>
<json:string>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</json:string>
<json:string>E-mail: wentai@iii.org.tw</json:string>
</affiliations>
</json:item>
<json:item>
<name>Wen-Chih Chen</name>
<affiliations>
<json:string>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</json:string>
<json:string>E-mail: wjchen@iii.org.tw</json:string>
</affiliations>
</json:item>
</author>
<language>
<json:string>eng</json:string>
</language>
<abstract>Abstract: Numerous schemes have been designed for watermarking multimedia contents. Many of these schemes are vulnerable to watermark erasing attacks. Naturally, such methods are ineffective on text unless the text is represented as a bitmap image, but in that case, the watermark can be erased easily by using Optical Character Recognition (OCR) to change the representation of the text from a bitmap to ASCII or EBCDIC. This study attempts to develop a method for embedding watermark in the text that is as successful as the frequency-domain methods have been for image and audio. The novel method embeds the watermark in original text, creating ciphertext, which preserves the meaning of the original text via various semantic replacements.</abstract>
<qualityIndicators>
<score>5.106</score>
<pdfVersion>1.3</pdfVersion>
<pdfPageSize>430 x 660 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<keywordCount>0</keywordCount>
<abstractCharCount>743</abstractCharCount>
<pdfWordCount>3714</pdfWordCount>
<pdfCharCount>22727</pdfCharCount>
<pdfPageCount>12</pdfPageCount>
<abstractWordCount>116</abstractWordCount>
</qualityIndicators>
<title>Natural Language Watermarking Using Semantic Substitution for Chinese Text</title>
<genre.original>
<json:string>OriginalPaper</json:string>
</genre.original>
<chapterId>
<json:string>10</json:string>
<json:string>Chap10</json:string>
</chapterId>
<genre>
<json:string>conference [eBooks]</json:string>
</genre>
<serie>
<editor>
<json:item>
<name>Gerhard Goos</name>
<affiliations>
<json:string>Karlsruhe University, Germany</json:string>
</affiliations>
</json:item>
<json:item>
<name>Juris Hartmanis</name>
<affiliations>
<json:string>Cornell University, NY, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Jan van Leeuwen</name>
<affiliations>
<json:string>Utrecht University, The Netherlands</json:string>
</affiliations>
</json:item>
</editor>
<issn>
<json:string>0302-9743</json:string>
</issn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Lecture Notes in Computer Science</title>
<copyrightDate>2004</copyrightDate>
</serie>
<host>
<editor>
<json:item>
<name>Ton Kalker</name>
<affiliations>
<json:string>Hewlett-Packard Laboratories, Palo Alto, CA, USA</json:string>
<json:string>E-mail: ton.kalker@hp.com</json:string>
</affiliations>
</json:item>
<json:item>
<name>Ingemar Cox</name>
<affiliations>
<json:string>University College, London, Torrington Place, UK</json:string>
<json:string>E-mail: i.cox@ee.ucl.ac.uk</json:string>
</affiliations>
</json:item>
<json:item>
<name>Yong Man Ro</name>
<affiliations>
<json:string>IVY Lab., Information and Communication University (ICU), 119, Munjiro, Yuseong-gu, 305-714, Deajeon, Korea</json:string>
<json:string>E-mail: yro@icu.ac.kr</json:string>
</affiliations>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computers and Society</value>
</json:item>
<json:item>
<value>Operating Systems</value>
</json:item>
<json:item>
<value>Data Encryption</value>
</json:item>
<json:item>
<value>Algorithm Analysis and Problem Complexity</value>
</json:item>
<json:item>
<value>Multimedia Information Systems</value>
</json:item>
<json:item>
<value>Management of Computing and Information Systems</value>
</json:item>
</subject>
<isbn>
<json:string>978-3-540-21061-0</json:string>
</isbn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Digital Watermarking</title>
<genre.original>
<json:string>Proceedings</json:string>
</genre.original>
<bookId>
<json:string>978-3-540-24624-4</json:string>
</bookId>
<volume>2939</volume>
<pages>
<last>140</last>
<first>129</first>
</pages>
<issn>
<json:string>0302-9743</json:string>
</issn>
<genre>
<json:string>Book Series</json:string>
</genre>
<eisbn>
<json:string>978-3-540-24624-4</json:string>
</eisbn>
<copyrightDate>2004</copyrightDate>
<doi>
<json:string>10.1007/b95658</json:string>
</doi>
</host>
<publicationDate>2004</publicationDate>
<copyrightDate>2004</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-24624-4_10</json:string>
</doi>
<id>7E2EF0391193E708162E15A57D945B192A1B5B97</id>
<fulltext>
<json:item>
<original>true</original>
<mimetype>application/pdf</mimetype>
<extension>pdf</extension>
<uri>https://api.istex.fr/document/7E2EF0391193E708162E15A57D945B192A1B5B97/fulltext/pdf</uri>
</json:item>
<json:item>
<original>false</original>
<mimetype>application/zip</mimetype>
<extension>zip</extension>
<uri>https://api.istex.fr/document/7E2EF0391193E708162E15A57D945B192A1B5B97/fulltext/zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/document/7E2EF0391193E708162E15A57D945B192A1B5B97/fulltext/tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Natural Language Watermarking Using Semantic Substitution for Chinese Text</title>
<respStmt xml:id="ISTEX-API" resp="Références bibliographiques récupérées via GROBID" name="ISTEX-API (INIST-CNRS)"></respStmt>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<availability>
<p>SPRINGER</p>
</availability>
<date>2004</date>
</publicationStmt>
<sourceDesc>
<biblStruct type="inbook">
<analytic>
<title level="a" type="main" xml:lang="en">Natural Language Watermarking Using Semantic Substitution for Chinese Text</title>
<author>
<persName>
<forename type="first">Yuei-Lin</forename>
<surname>Chiang</surname>
</persName>
<email>ylchiang@iii.org.tw</email>
<affiliation>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</affiliation>
</author>
<author>
<persName>
<forename type="first">Lu-Ping</forename>
<surname>Chang</surname>
</persName>
<email>clp@iii.org.tw</email>
<affiliation>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</affiliation>
</author>
<author>
<persName>
<forename type="first">Wen-Tai</forename>
<surname>Hsieh</surname>
</persName>
<email>wentai@iii.org.tw</email>
<affiliation>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</affiliation>
</author>
<author>
<persName>
<forename type="first">Wen-Chih</forename>
<surname>Chen</surname>
</persName>
<email>wjchen@iii.org.tw</email>
<affiliation>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</affiliation>
</author>
</analytic>
<monogr>
<title level="m">Digital Watermarking</title>
<title level="m" type="sub">Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003. Revised Papers</title>
<idno type="pISBN">978-3-540-21061-0</idno>
<idno type="eISBN">978-3-540-24624-4</idno>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="DOI">10.1007/b95658</idno>
<idno type="BookID">978-3-540-24624-4</idno>
<idno type="BookTitleID">81677</idno>
<idno type="BookSequenceNumber">2939</idno>
<idno type="BookVolumeNumber">2939</idno>
<idno type="BookChapterCount">48</idno>
<editor>
<persName>
<forename type="first">Ton</forename>
<surname>Kalker</surname>
</persName>
<email>ton.kalker@hp.com</email>
<affiliation>Hewlett-Packard Laboratories, Palo Alto, CA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Ingemar</forename>
<surname>Cox</surname>
</persName>
<email>i.cox@ee.ucl.ac.uk</email>
<affiliation>University College, London, Torrington Place, UK</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Yong</forename>
<forename type="first">Man</forename>
<surname>Ro</surname>
</persName>
<email>yro@icu.ac.kr</email>
<affiliation>IVY Lab., Information and Communication University (ICU), 119, Munjiro, Yuseong-gu, 305-714, Deajeon, Korea</affiliation>
</editor>
<imprint>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<date type="published" when="2004"></date>
<biblScope unit="volume">2939</biblScope>
<biblScope unit="page" from="129">129</biblScope>
<biblScope unit="page" to="140">140</biblScope>
</imprint>
</monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Goos</surname>
</persName>
<affiliation>Karlsruhe University, Germany</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Juris</forename>
<surname>Hartmanis</surname>
</persName>
<affiliation>Cornell University, NY, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Jan</forename>
<surname>van Leeuwen</surname>
</persName>
<affiliation>Utrecht University, The Netherlands</affiliation>
</editor>
<biblScope>
<date>2004</date>
</biblScope>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="seriesId">558</idno>
</series>
<idno type="istex">7E2EF0391193E708162E15A57D945B192A1B5B97</idno>
<idno type="DOI">10.1007/978-3-540-24624-4_10</idno>
<idno type="ChapterID">10</idno>
<idno type="ChapterID">Chap10</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<creation>
<date>2004</date>
</creation>
<langUsage>
<language ident="en">en</language>
</langUsage>
<abstract xml:lang="en">
<p>Abstract: Numerous schemes have been designed for watermarking multimedia contents. Many of these schemes are vulnerable to watermark erasing attacks. Naturally, such methods are ineffective on text unless the text is represented as a bitmap image, but in that case, the watermark can be erased easily by using Optical Character Recognition (OCR) to change the representation of the text from a bitmap to ASCII or EBCDIC. This study attempts to develop a method for embedding watermark in the text that is as successful as the frequency-domain methods have been for image and audio. The novel method embeds the watermark in original text, creating ciphertext, which preserves the meaning of the original text via various semantic replacements.</p>
</abstract>
<textClass>
<keywords scheme="Book Subject Collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass>
<keywords scheme="Book Subject Group">
<list>
<label>I</label>
<label>I24040</label>
<label>I14045</label>
<label>I15033</label>
<label>I16021</label>
<label>I18059</label>
<label>I24067</label>
<item>
<term>Computer Science</term>
</item>
<item>
<term>Computers and Society</term>
</item>
<item>
<term>Operating Systems</term>
</item>
<item>
<term>Data Encryption</term>
</item>
<item>
<term>Algorithm Analysis and Problem Complexity</term>
</item>
<item>
<term>Multimedia Information Systems</term>
</item>
<item>
<term>Management of Computing and Information Systems</term>
</item>
</list>
</keywords>
</textClass>
</profileDesc>
<revisionDesc>
<change when="2004">Published</change>
<change xml:id="refBibs-istex" who="#ISTEX-API" when="2016-3-19">References added</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<original>false</original>
<mimetype>text/plain</mimetype>
<extension>txt</extension>
<uri>https://api.istex.fr/document/7E2EF0391193E708162E15A57D945B192A1B5B97/fulltext/txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="Springer, Publisher found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo SeriesType="Series" TocLevels="0">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff1">
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Goos</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff2">
<EditorName DisplayOrder="Western">
<GivenName>Juris</GivenName>
<FamilyName>Hartmanis</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff3">
<EditorName DisplayOrder="Western">
<GivenName>Jan</GivenName>
<Particle>van</Particle>
<FamilyName>Leeuwen</FamilyName>
</EditorName>
</Editor>
<Affiliation ID="Aff1">
<OrgName>Karlsruhe University</OrgName>
<OrgAddress>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2">
<OrgName>Cornell University</OrgName>
<OrgAddress>
<State>NY</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff3">
<OrgName>Utrecht University</OrgName>
<OrgAddress>
<Country>The Netherlands</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo BookProductType="Proceedings" ContainsESM="No" Language="En" MediaType="eBook" NumberingDepth="2" NumberingStyle="ContentOnly" OutputMedium="All" TocLevels="0">
<BookID>978-3-540-24624-4</BookID>
<BookTitle>Digital Watermarking</BookTitle>
<BookSubTitle>Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003. Revised Papers</BookSubTitle>
<BookVolumeNumber>2939</BookVolumeNumber>
<BookSequenceNumber>2939</BookSequenceNumber>
<BookDOI>10.1007/b95658</BookDOI>
<BookTitleID>81677</BookTitleID>
<BookPrintISBN>978-3-540-21061-0</BookPrintISBN>
<BookElectronicISBN>978-3-540-24624-4</BookElectronicISBN>
<BookChapterCount>48</BookChapterCount>
<BookCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2004</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I24040" Priority="1" Type="Secondary">Computers and Society</BookSubject>
<BookSubject Code="I14045" Priority="2" Type="Secondary">Operating Systems</BookSubject>
<BookSubject Code="I15033" Priority="3" Type="Secondary">Data Encryption</BookSubject>
<BookSubject Code="I16021" Priority="4" Type="Secondary">Algorithm Analysis and Problem Complexity</BookSubject>
<BookSubject Code="I18059" Priority="5" Type="Secondary">Multimedia Information Systems</BookSubject>
<BookSubject Code="I24067" Priority="6" Type="Secondary">Management of Computing and Information Systems</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
<BookContext>
<SeriesID>558</SeriesID>
</BookContext>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff4">
<EditorName DisplayOrder="Western">
<GivenName>Ton</GivenName>
<FamilyName>Kalker</FamilyName>
</EditorName>
<Contact>
<Email>ton.kalker@hp.com</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff5">
<EditorName DisplayOrder="Western">
<GivenName>Ingemar</GivenName>
<FamilyName>Cox</FamilyName>
</EditorName>
<Contact>
<Email>i.cox@ee.ucl.ac.uk</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff6">
<EditorName DisplayOrder="Western">
<GivenName>Yong</GivenName>
<GivenName>Man</GivenName>
<FamilyName>Ro</FamilyName>
</EditorName>
<Contact>
<Email>yro@icu.ac.kr</Email>
</Contact>
</Editor>
<Affiliation ID="Aff4">
<OrgName>Hewlett-Packard Laboratories</OrgName>
<OrgAddress>
<City>Palo Alto</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff5">
<OrgName>University College</OrgName>
<OrgAddress>
<City>London, Torrington Place</City>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff6">
<OrgDivision>IVY Lab.</OrgDivision>
<OrgName>Information and Communication University (ICU)</OrgName>
<OrgAddress>
<Street>119, Munjiro, Yuseong-gu</Street>
<Postcode>305-714</Postcode>
<City>Deajeon</City>
<Country>Korea</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</BookHeader>
<Part ID="Part4">
<PartInfo TocLevels="0">
<PartID>4</PartID>
<PartSequenceNumber>4</PartSequenceNumber>
<PartTitle>III: Non-St+Stego</PartTitle>
<PartChapterCount>3</PartChapterCount>
<PartContext>
<SeriesID>558</SeriesID>
<BookTitle>Digital Watermarking</BookTitle>
</PartContext>
</PartInfo>
<Chapter ID="Chap10" Language="En">
<ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" NumberingDepth="2" NumberingStyle="ContentOnly" TocLevels="0">
<ChapterID>10</ChapterID>
<ChapterDOI>10.1007/978-3-540-24624-4_10</ChapterDOI>
<ChapterSequenceNumber>10</ChapterSequenceNumber>
<ChapterTitle Language="En">Natural Language Watermarking Using Semantic Substitution for Chinese Text</ChapterTitle>
<ChapterFirstPage>129</ChapterFirstPage>
<ChapterLastPage>140</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2004</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext>
<SeriesID>558</SeriesID>
<PartID>4</PartID>
<BookID>978-3-540-24624-4</BookID>
<BookTitle>Digital Watermarking</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff7">
<AuthorName DisplayOrder="Western">
<GivenName>Yuei-Lin</GivenName>
<FamilyName>Chiang</FamilyName>
</AuthorName>
<Contact>
<Email>ylchiang@iii.org.tw</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff7">
<AuthorName DisplayOrder="Western">
<GivenName>Lu-Ping</GivenName>
<FamilyName>Chang</FamilyName>
</AuthorName>
<Contact>
<Email>clp@iii.org.tw</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff7">
<AuthorName DisplayOrder="Western">
<GivenName>Wen-Tai</GivenName>
<FamilyName>Hsieh</FamilyName>
</AuthorName>
<Contact>
<Email>wentai@iii.org.tw</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff7">
<AuthorName DisplayOrder="Western">
<GivenName>Wen-Chih</GivenName>
<FamilyName>Chen</FamilyName>
</AuthorName>
<Contact>
<Email>wjchen@iii.org.tw</Email>
</Contact>
</Author>
<Affiliation ID="Aff7">
<OrgDivision>Advanced e-Commerce Technology Lab.</OrgDivision>
<OrgName>Institute for Information Industry</OrgName>
<OrgAddress>
<Street>17FL.-A, No.333, Sec.2, Duenhua S. Rd.</Street>
<City>Taipei</City>
<Postcode>106</Postcode>
<Country>Taiwan, R.O.C.</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>Numerous schemes have been designed for watermarking multimedia contents. Many of these schemes are vulnerable to watermark erasing attacks. Naturally, such methods are ineffective on text unless the text is represented as a bitmap image, but in that case, the watermark can be erased easily by using Optical Character Recognition (OCR) to change the representation of the text from a bitmap to ASCII or EBCDIC. This study attempts to develop a method for embedding watermark in the text that is as successful as the frequency-domain methods have been for image and audio. The novel method embeds the watermark in original text, creating ciphertext, which preserves the meaning of the original text via various semantic replacements.</Para>
</Abstract>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Part>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Natural Language Watermarking Using Semantic Substitution for Chinese Text</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA" lang="en">
<title>Natural Language Watermarking Using Semantic Substitution for Chinese Text</title>
</titleInfo>
<name type="personal">
<namePart type="given">Yuei-Lin</namePart>
<namePart type="family">Chiang</namePart>
<affiliation>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</affiliation>
<affiliation>E-mail: ylchiang@iii.org.tw</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Lu-Ping</namePart>
<namePart type="family">Chang</namePart>
<affiliation>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</affiliation>
<affiliation>E-mail: clp@iii.org.tw</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Wen-Tai</namePart>
<namePart type="family">Hsieh</namePart>
<affiliation>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</affiliation>
<affiliation>E-mail: wentai@iii.org.tw</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Wen-Chih</namePart>
<namePart type="family">Chen</namePart>
<affiliation>Advanced e-Commerce Technology Lab., Institute for Information Industry, 17FL.-A, No.333, Sec.2, Duenhua S. Rd., 106, Taipei, Taiwan, R.O.C.</affiliation>
<affiliation>E-mail: wjchen@iii.org.tw</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre type="conference [eBooks]" displayLabel="OriginalPaper"></genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2004</dateIssued>
<copyrightDate encoding="w3cdtf">2004</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<internetMediaType>text/html</internetMediaType>
</physicalDescription>
<abstract lang="en">Abstract: Numerous schemes have been designed for watermarking multimedia contents. Many of these schemes are vulnerable to watermark erasing attacks. Naturally, such methods are ineffective on text unless the text is represented as a bitmap image, but in that case, the watermark can be erased easily by using Optical Character Recognition (OCR) to change the representation of the text from a bitmap to ASCII or EBCDIC. This study attempts to develop a method for embedding watermark in the text that is as successful as the frequency-domain methods have been for image and audio. The novel method embeds the watermark in original text, creating ciphertext, which preserves the meaning of the original text via various semantic replacements.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Digital Watermarking</title>
<subTitle>Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003. Revised Papers</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Ton</namePart>
<namePart type="family">Kalker</namePart>
<affiliation>Hewlett-Packard Laboratories, Palo Alto, CA, USA</affiliation>
<affiliation>E-mail: ton.kalker@hp.com</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Ingemar</namePart>
<namePart type="family">Cox</namePart>
<affiliation>University College, London, Torrington Place, UK</affiliation>
<affiliation>E-mail: i.cox@ee.ucl.ac.uk</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Yong</namePart>
<namePart type="given">Man</namePart>
<namePart type="family">Ro</namePart>
<affiliation>IVY Lab., Information and Communication University (ICU), 119, Munjiro, Yuseong-gu, 305-714, Deajeon, Korea</affiliation>
<affiliation>E-mail: yro@icu.ac.kr</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="Book Series" displayLabel="Proceedings"></genre>
<originInfo>
<copyrightDate encoding="w3cdtf">2004</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book Subject Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book Subject Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I24040">Computers and Society</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14045">Operating Systems</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I15033">Data Encryption</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I16021">Algorithm Analysis and Problem Complexity</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18059">Multimedia Information Systems</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I24067">Management of Computing and Information Systems</topic>
</subject>
<identifier type="DOI">10.1007/b95658</identifier>
<identifier type="ISBN">978-3-540-21061-0</identifier>
<identifier type="eISBN">978-3-540-24624-4</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">81677</identifier>
<identifier type="BookID">978-3-540-24624-4</identifier>
<identifier type="BookChapterCount">48</identifier>
<identifier type="BookVolumeNumber">2939</identifier>
<identifier type="BookSequenceNumber">2939</identifier>
<identifier type="PartChapterCount">3</identifier>
<part>
<date>2004</date>
<detail type="part">
<title>III: Non-St+Stego</title>
</detail>
<detail type="volume">
<number>2939</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>129</start>
<end>140</end>
</extent>
</part>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2004</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Goos</namePart>
<affiliation>Karlsruhe University, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Juris</namePart>
<namePart type="family">Hartmanis</namePart>
<affiliation>Cornell University, NY, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jan</namePart>
<namePart type="family">van Leeuwen</namePart>
<affiliation>Utrecht University, The Netherlands</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<copyrightDate encoding="w3cdtf">2004</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2004</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">7E2EF0391193E708162E15A57D945B192A1B5B97</identifier>
<identifier type="DOI">10.1007/978-3-540-24624-4_10</identifier>
<identifier type="ChapterID">10</identifier>
<identifier type="ChapterID">Chap10</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg, 2004</accessCondition>
<recordInfo>
<recordContentSource>SPRINGER</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2004</recordOrigin>
</recordInfo>
</mods>
</metadata>
<enrichments>
<istex:refBibTEI uri="https://api.istex.fr/document/7E2EF0391193E708162E15A57D945B192A1B5B97/enrichments/refBib">
<teiHeader></teiHeader>
<text>
<front></front>
<body></body>
<back>
<listBibl>
<biblStruct xml:id="b0">
<analytic>
<title level="a" type="main">Electronic marking and identification techniques to discourage document copying</title>
<author>
<persName>
<forename type="first">J</forename>
<surname>Brassil</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Low</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">N</forename>
<surname>Maxemchuk</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">O</forename>
<surname>Gorman</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">L</forename>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Proceedings of IEEE INFOCOM '94</title>
<meeting>IEEE INFOCOM '94</meeting>
<imprint>
<date type="published" when="19943"></date>
<biblScope unit="page" from="1278" to="1287"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b1">
<analytic>
<title level="a" type="main">Hiding information in document images</title>
<author>
<persName>
<forename type="first">J</forename>
<surname>Brassil</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Low</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">N</forename>
<surname>Maxemchuk</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">O</forename>
<surname>Gorman</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">L</forename>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Proceedings of the 29th Annual Conference on Information Sciences and Systems</title>
<meeting>the 29th Annual Conference on Information Sciences and Systems</meeting>
<imprint>
<date type="published" when="1995"></date>
<biblScope unit="page" from="482" to="489"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b2">
<analytic>
<title level="a" type="main">Statistical parsing with a context-free grammar and word statistics</title>
<author>
<persName>
<forename type="first">E</forename>
<surname>Charniak</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Proceedings of NCAI-1997</title>
<meeting>NCAI-1997</meeting>
<imprint>
<date type="published" when="1997"></date>
<biblScope unit="page" from="598" to="603"></biblScope>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b3">
<analytic>
<title level="a" type="main">Quadratic Residues</title>
<author>
<persName>
<forename type="first">G</forename>
<forename type="middle">H</forename>
<surname>Hardy</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">E</forename>
<forename type="middle">M</forename>
<surname>Wright</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">§6.5 in An Introduction to the Theory of Numbers</title>
<meeting>
<address>
<addrLine>Oxford, England</addrLine>
</address>
</meeting>
<imprint>
<publisher>Clarendon Press</publisher>
<date type="published" when="1979"></date>
<biblScope unit="page" from="67" to="68"></biblScope>
</imprint>
</monogr>
<note>5th. ed</note>
</biblStruct>
<biblStruct xml:id="b4">
<analytic>
<title level="a" type="main">The effect of alternative tree representations on tree bank grammars</title>
<author>
<persName>
<forename type="first">M</forename>
<surname>Johnson</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Proceedings of the Joint Conference on New methods in Language Processing and Computational Natural Language Learning</title>
<meeting>the Joint Conference on New methods in Language Processing and Computational Natural Language Learning</meeting>
<imprint>
<date type="published" when="1998"></date>
<biblScope unit="page" from="39" to="48"></biblScope>
</imprint>
</monogr>
<note>NeMLaP3. /CoNLL'98)</note>
</biblStruct>
<biblStruct xml:id="b5">
<analytic>
<title level="a" type="main">Document marking and identification using both line and word shifting</title>
<author>
<persName>
<forename type="first">S</forename>
<surname>Low</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">N</forename>
<surname>Maxemchuk</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<surname>Brassil</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">O</forename>
<surname>Gorman</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">L</forename>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Proceedings of IEEE INFOCOM '95</title>
<meeting>IEEE INFOCOM '95</meeting>
<imprint>
<date type="published" when="1995"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b6">
<analytic>
<title level="a" type="main">Natural Language Watermarking and Tamperproofing</title>
<author>
<persName>
<forename type="first">M</forename>
<surname>Atallah</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">V</forename>
<surname>Raskin</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">C</forename>
<forename type="middle">F</forename>
<surname>Hempelmann</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">M</forename>
<surname>Karahan</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">R</forename>
<surname>Sion</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">K</forename>
<forename type="middle">E</forename>
<surname>Triezenberg</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">U</forename>
<surname>Topkara</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Proc. of the Information Hiding Workshop IHW</title>
<meeting>. of the Information Hiding Workshop IHW</meeting>
<imprint>
<publisher>Springer Verlag</publisher>
<date type="published" when="2002"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b7">
<analytic>
<title level="a" type="main">Natural Language Watermarking: Design, Analysis, and Proof-of-Concept Implementation</title>
<author>
<persName>
<forename type="first">Mikhail</forename>
<forename type="middle">J</forename>
<surname>Atallah</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">Michael</forename>
<surname>Victor Raskin</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">Christian</forename>
<surname>Crogan</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">Florian</forename>
<surname>Hempelmann</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">Dina</forename>
<surname>Kerschbaum</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">Sanket</forename>
<surname>Mohamed</surname>
</persName>
</author>
<author>
<persName>
<surname>Naik</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">the Proceedings of the 4th International Information Hiding Workshop</title>
<meeting>
<address>
<addrLine>Pittsburgh, Pennsylvania</addrLine>
</address>
</meeting>
<imprint>
<date type="published" when="2001"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b8">
<analytic>
<title level="a" type="main">Developing Guidelines and Ensuring Consistency for Chinese Text Annotation</title>
<author>
<persName>
<forename type="first">Fei ;</forename>
<surname>Xia</surname>
</persName>
</author>
<author>
<persName>
<surname>Palmer</surname>
</persName>
</author>
<author>
<persName>
<surname>Martha</surname>
</persName>
</author>
<author>
<persName>
<surname>Xue</surname>
</persName>
</author>
<author>
<persName>
<surname>Nianwen</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">Mary</forename>
<surname>Okurowski</surname>
</persName>
</author>
<author>
<persName>
<surname>Ellen</surname>
</persName>
</author>
<author>
<persName>
<surname>Kovarik</surname>
</persName>
</author>
<author>
<persName>
<surname>John</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">Fu-Dong ;</forename>
<surname>Chiou</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">Tony</forename>
<surname>Kroch</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">Mitch</forename>
<surname>Marcus</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Second International Conference on Language Resources and Evaluation (LREC-2000</title>
<imprint>
<date type="published" when="2000"></date>
<biblScope unit="page" from="3" to="10"></biblScope>
</imprint>
</monogr>
</biblStruct>
</listBibl>
</back>
</text>
</istex:refBibTEI>
</enrichments>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/OcrV1/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000A15 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 000A15 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    OcrV1
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:7E2EF0391193E708162E15A57D945B192A1B5B97
   |texte=   Natural Language Watermarking Using Semantic Substitution for Chinese Text
}}

Wicri

This area was generated with Dilib version V0.6.32.
Data generation: Sat Nov 11 16:53:45 2017. Site generation: Mon Mar 11 23:15:16 2024