[1] 毛一鸣. 抗打印扫描攻击的数字水印算法研究[D]. 哈尔滨:哈尔滨工业大学, 2021. [2] 方涵. 屏摄鲁棒水印方法研究[D]. 合肥:中国科学技术大学, 2021. [3] Wu M, Liu B D. Data hiding in binary image for authentication and annotation[J]. IEEE Transactions on Multimedia, 2004, 6(4):528-538. [4] 张驰. 二值文本图像数字水印技术研究[D]. 重庆:重庆大学, 2007. [5] 赵星阳, 孙继银, 李琳琳. 基于字符阶梯边沿调整的文本水印算法[J]. 计算机应用, 2008, 28(12):3175-3178, 3182. Zhao X Y, Sun J Y, Li L L. Watermarking of text images using character step edge adjustment[J]. Journal of Computer Applications, 2008, 28(12):3175-3178, 3182. (in Chinese) [6] 郭承青, 徐国爱, 钮心忻, 等. 抗打印扫描攻击的大容量文本水印[J]. 应用科学学报, 2011, 29(2):140-146. Guo C Q, Xu G A, Niu X X, et al. High-capacity text watermarking resistive to print-scan process[J]. Journal of Applied Sciences, 2011, 29(2):140-146. (in Chinese) [7] 亓文法, 李晓龙, 杨斌, 等. 用于信息追踪的文本水印算法[J]. 通信学报, 2008, 29(10):183-190. Qi W F, Li X L, Yang B, et al. Document watermarking scheme for information tracking[J]. Journal on Communications, 2008, 29(10):183-190. (in Chinese) [8] 李晓妮. 一种文本文档中的信息隐藏方法和装置:CN107248134B[P]. 2021-05-11. [9] 李晓妮. 一种纸质文档安全管控与溯源追踪的方法和装置:CN107066844B[P]. 2020-08-14. [10] 雷敏, 杨榆, 胡若翔. 基于文字复杂度的抗打印扫描文本水印算法[J]. 北京邮电大学学报, 2015, 38(S1):58-62. Lei M, Yang Y, Hu R X. A print resilient watermark scheme based on character complexity[J]. Journal of Beijing University of Posts and Telecommunications, 2015, 38(S1):58-62. (in Chinese) [11] Sun X M, Wang S F, Xia Z H, et al. Skeleton-based Chinese text image watermark algorithm robust to printing and scanning[J]. Information Technology Journal, 2013, 12(11):2130-2137. [12] Brassil J T, Low S, Maxemchuk N F, et al. Electronic marking and identification techniques to discourage document copying[J]. IEEE Journal on Selected Areas in Communications, 1995, 13(8):1495-1504. [13] Brassil J T, Low S, Maxemchuk N F. Copyright protection for the electronic distribution of text documents[C]//Proceedings of the IEEE, 1999, 87(7):1181-1196. [14] 赵卫娟, 关虎, 黄樱, 等. 文本水印技术研究综述[J]. 中国传媒大学学报(自然科学版), 2020, 27(6):55-62. Zhao W J, Guan H, Huang Y, et al. A survey of text watermarking[J]. Journal of Communication University of China (Science and Technology), 2020, 27(6):55-62. (in Chinese) [15] 黄华, 齐春, 李俊, 等. 一种新的文本数字水印标记策略和检测方法[J]. 西安交通大学学报, 2002, 36(2):165-168, 181. Huang H, Qi C, Li J, et al. New watermarking scheme and centroid detecting method for text documents[J]. Journal of Xi'an Jiaotong University, 2002, 36(2):165-168, 181. (in Chinese) [16] 赵东宁, 张勇, 李德毅. 基于云模型的文本数字水印技术[J]. 计算机应用, 2003, 23(S2):100-102. Zhao D N, Zhang Y, Li D Y. Text watermarking based on cloudy mode[J]. Computer Applications, 2003, 23(S2):100-102. (in Chinese) [17] 杨洁, 张敏瑞. 基于行移和字移编码的二值文本数字水印技术[J]. 西安邮电学院学报, 2006, 11(3):101-105. Yang J, Zhang M R. Document marking technique based on both line and word shifting[J]. Journal of Xi'an University of Post and Telecommunications, 2006, 11(3):101-105. (in Chinese) [18] 惠路华. 基于Word文档的数字水印算法研究与实现[D]. 南京:南京理工大学, 2008. [19] 张珍珍, 许盛伟, 崔敏龙. 基于数字水印的纸质文档保护研究[J]. 北京电子科技学院学报, 2015, 23(2):51-57. Zhang Z Z, Xu S W, Cui M L. The research of paper document tracking system solution based on watermarking technology[J]. Journal of Beijing Electronic Science and Technology Institute, 2015, 23(2):51-57. (in Chinese) [20] Khosravi B, Khosravi B, Khosravi B, et al. A new method for pdf steganography in justified texts[J]. Journal of Information Security and Applications, 2019, 45:61-70. [21] Qi W F, Guo W, Zhang T, et al. Robust authentication for paper-based text documents based on text watermarking technology[J]. Mathematical Biosciences and Engineering:MBE, 2019, 16(4):2233-2249. [22] 亓文法, 刘宇鑫, 李晓龙, 等. 基于字符结构特征的文本水印嵌入和提取方法:CN102968582A[P]. 2016-03-30. [23] 李晓妮. 一种敏感内容数据信息防护方法和系统:CN107239713A[P]. 2017-10-10. [24] 李晓妮. 基于图像特征匹配的水印方法和装置:CN108711131B[P]. 2022-08-16. [25] 杨榆, 陈雨薇, 雷敏, 等. 一种用于打印文档溯源的数字水印处理方法及装置:CN107644391B[P]. 2019-11-26. [26] Tan L N, Sun X M, Sun G. Print-scan resilient text image watermarking based on stroke direction modulation for chinese document authentication[J]. Radio Engineering, 2012, 21(1):170-181. [27] Tan L N, Hu K, Zhou X M, et al. Print-scan invariant text image watermarking for hardcopy document authentication[J]. Multimedia Tools and Applications, 2019, 78(10):13189-13211. [28] 李晓妮. 一种水印字库的自动生成方法和装置:CN108763879A[P]. 2018-11-06. [29] Xiao C, Zhang C, Zheng C X. FontCode:embedding information in text documents using glyph perturbation[J]. ACM Transactions on Graphics, 2018, 37(2):1-16. [30] Cu V L, Burie J C, Ogier J M, et al. Hiding security feature into text content for securing documents using generated font[C]//2019 International Conference on Document Analysis and Recognition (ICDAR), 2019:1214-1219. [31] Cu V L, Burie J C, Ogier J M, et al. A robust data hiding scheme using generated content for securing genuine documents[C]//2019 International Conference on Document Analysis and Recognition (ICDAR), 2019:787-792. [32] 孙杉. 基于自动生成字库的中文鲁棒文档水印方法[D]. 合肥:中国科学技术大学, 2021. [33] 孙杉, 张卫明, 方涵, 等. 中文水印字库的自动生成方法[J]. 中国图象图形学报, 2022, 27(1):262-276. Sun S, Zhang W M, Fang H, et al. Automatic generation of Chinese document watermarking fonts[J]. Journal of Image and Graphics, 2022, 27(1):262-276. (in Chinese) [34] Wang C, Zhu Y N, Shen Z Y, et al. Font transfer based on parallel auto-encoder for glyph perturbation via strokes moving[C]//21st International Conference on Algorithms and Architectures for Parallel Processing. Virtual Event, 2022:586-602. [35] Wang Y Z, Lian Z H. DeepVecFont:synthesizing high-quality vector fonts via dual-modality learning[J]. ACM Transactions on Graphics, 2021, 40(6):1-16. [36] Gao Y C, Lian Z H, Tang Y M, et al. Automatic generation of Chinese vector fonts via deep layout inferring[C]//SIGGRAPH Asia 2019 Technical Briefs, 2019:33-36. [37] Lian Z H, Gao Y C. CVFont:synthesizing Chinese vector fonts via deep layout inferring[J]. Computer Graphics Forum, 2022, 41(6):212-225. [38] He K M, Zhang X Y, Ren S Q, et al. Deep residual learning for image recognition[C]//2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016:770-778. [39] Ren S Q, He K M, Girshick R, et al. Faster R-CNN:towards real-time object detection with region proposal networks[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017, 39(6):1137-1149. |