[1] BRASSIL J T,LOW S,MAXEMCHUK N F.Copyright Protection for the Electronic Distribution of Text Documents [J].Proceedings of the IEEE,1999,87(7):1 181-1 196.[2] BRASSIL J,LOW S,MAXEMCHUK N F,et al.Electronic Marking and Identification Techniques to Discourage Document Copying [J].IEEE Journal on Sel. Areas in Commun.,1995,13(8):1 495-1 504.[3] LOW S H,MAXEMCHUK N F,LAPONE A M.Document Identification for Copyright Protection for Copyright Protection Using Centroid Detection[J].IEEE Transactions on Communications,1998,46(5):372-383.[4] HUANG Hua,QI Chun,LI Jun,et al.New Watermarking Scheme and Centroid Detecting Method for Text Documents [J].Journal of Xi’an Jiaotong University,2002,36(2):165-168.[5] MIKHAIL J A,MCDONOUGH C J,RASKIN V,et al.Natural Language Processing for Information Assurance and Security:An Overview and Implementations [A].SHAEFFER M.NSPW ’00:Proceedings of Workshop on New Paradigms in Information Security [C].New York:ACM Press,2000.51-65.[6] NIRENBURG S,RASKIN V.Ontological Semantics [EB/OL].http://crl.nmsu.edu/Staff.pages/Technical/sergei/book/preface.pdf,2005-09-20.[7] ATALLAH M J,RASKIN V,CROGAN M,et al.Natural Language Watermarking:Design,Analysis,and a Proof-of-Concept Implementation [A].MOSKOWITZ I S.Pre-Proceedings of the 4th Information Hiding Workshop [C].Pittsburgh:Pittsburgh University Center,2001.193-208.[8] LU Bing-fu.From the Distribution of DE to Analyze It’s Basic Function and Derivate Function [EB/OL].http://www.colips.org/conference/icicsie2002/papers/LuBingfu.doc,2005-01-10. |