[1]
Brassil J, Low S, Maxemchuk N, et a1. Electronic marking and identification techniques to discourage document copying [J]. IEEE J Select Areas Common, 1995. 13: 1495-1504.
DOI: 10.1109/49.464718
Google Scholar
[2]
Lang Ou, Xingming Sun, Yuling Liu. Adaptive Algorithm of Text Information Hiding Based on Character Intensity [J]. Computer Applications. 2007, 24 (5) : 130-132.
Google Scholar
[3]
Weibing Cao, Guanzhong Dai, Yu Xia. Technology of Information Hiding Based on Text Document [J]. Computer Application. 2003, 10.
Google Scholar
[4]
Xianghui Li, Cheng Zhong. Research on Improving Information Hiding Capacity for Word Text Document[J]. Computer Technology and Development. 2006, 16 (9) : 97-99.
Google Scholar
[5]
Yinghui Xu, Yu Yang, Xinxin Niu. Text steganography based on semantics [J]. Computer Systems and Applications. 2006, 6 : 91-94.
Google Scholar
[6]
Minzhi Zhao, Xingming Sun, Huazheng Xiang. Research on the Chinese Text Steganography Based on the Modification of Empty Word [J]. Computer Engineering and Applications. 2006, 42 (3) : 158-160.
Google Scholar
[7]
Wangsheng Fang, Liping Shao. The Research of Information Hiding Technology Based on Portable Executable File Format [J]. Control and Automation. 2006, 2.
Google Scholar
[8]
Youji Liu, Xingming Sun, Gang Luo. A Novel Information Hiding Algorithm Based on Structure of PDF Document [J]. Computer Engineering. 2006, 32(17) : 230-232.
Google Scholar
[9]
Bender W, Gruhl D, Morimoto N, Techniques for Data Hiding, IBM Syst. J., Vol. 35, nos. 3-4, pp.313-336, (1996).
DOI: 10.1147/sj.353.0313
Google Scholar
[10]
Brassil J, Low S, Maxemchuk N, and Gorman L O', Copyright protection for the electronic distribution of text document, Proc. IEEE, No. 7, July 1999, pp.1181-1196.
DOI: 10.1109/5.771071
Google Scholar
[11]
Microsoft Office Word 97-2007 binary file format specification. Microsoft Corporation.
Google Scholar