Document Marking and Identification using Both Line and Word Shifting - INFOCOM '95. Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies
نویسنده
چکیده
We continue our study of document marking t o deter illicit dissemination. A n experiment we performed reveals that the distortion on the photocopy of a document is very different in the vertical and horizontal directions. This leads to the strategy that marks a text line both vertically using line shifting and horizontally using word shifting. A line that is marked is always accompanied by two unmarked control lines one above and one below. They are used t o measure distortions in the vertical and horizontal directions in order to decide whether line or word shift should be detected. Line shifts are detected using a centroid method that bases its decision on the relative distance of line centroids. Word shifts are detected using a correlation method that treats a profile as a waveform and decides whether it originated from a waveform whose middle block has been shifted left or right. The maximum likelihood detectors for both methods are given.
منابع مشابه
The Use of Communications Networks to Increase Personal Privacy - INFOCOM '95. Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies
Communications Networks can separate as well as join iMormation. This ability can be used to increase personal privacy in an environment where advances in technology makes it possible to collect and correlate increasing amounts of information about individuals. The tools and principles necessary to increase personal privacy are demonstrated by creating an anonymous credit card, in which a perso...
متن کاملComputing approximate blocking probabilities for a class of all-optical networks - INFOCOM '95. Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies
W e study a class of all-optical networks using wavelength division multiplexing and wavelength routing in which a connection between a pair of nodes in the network is assigned a path and a wavelength o n that path. Moreover, o n the links of that path n o other connection can share the assigned wavelength. Using a generalized reduced load approximation scheme we calculate the blocking probabil...
متن کاملDocument Identification To Discourage Illicit Copying - Global Telecommunications Conference, 1995. GLOBECOM '95., IEEE
A n important application of future communications networks will be electronic publishing and digital library, provided copyright can be protected. A way to discourage illicit copying and distribution of documents is t o uniquely mark each document copy b y shifting certain lines or words slightly so that the original registered recipient can be identified f rom an illicit copy b y detecting it...
متن کاملAn Enhanced Random Early Marking Algorithm for Internet Flow Control - INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies
AbstructWe propose earlier an optimization based flow control for the Internet called Random Early Mark@ (REM). In this paper we propose and evaluate an enhancement that attempts to sped up the convergence of REM in the face of large feedback delays. REM can be regarded as an implementation of an optimization algorithm in a distributed network. The basic idea is to treat the optimization algori...
متن کاملDocument Marking and Identification Using Both Line and Word Shifting
We continue our study of document marking to deter illicit dissemination. An experiment we performed reveals that the distortion on the photocopy of a document is very diierent in the vertical and horizontal directions. This leads to the strategy that marks a text line both vertically using line shifting and horizontally using word shifting. A line that is marked is always accompanied by two un...
متن کامل