C. Culnane, A. Treharne, and . Ho, A new multi-set modulation technique for increasing hiding capacity of binary watermarks for print and scan processes, Proceedings of the International Workshop on Digital Watermarking, pp.96-110, 2006.

C. Culnane, H. Treharne, and A. Ho, Improving multi-set formatted binary text watermarking using continuous line embedding, Proceedings of the Second International Conference on Innovative Computing, Information and Control, 2007.

A. Dasare and M. Dhore, Secure approach for hiding data in MS Word documents using MCDFF, Proceedings of the International Conference on Computing, Communication, Control and Automation, pp.296-300, 2015.

G. Gupta, C. Mazumdar, M. Rao, and R. Bhosale, Paradigm shift in document related frauds: Characteristics identification for development of a non-destructive automated system for printed documents, Digital Investigation, vol.3, issue.1, pp.43-55, 2006.

G. Gupta, S. Saha, S. Chakraborty, and C. Mazumdar, Document frauds: Identification and linking fake documents to scanners and printers, Proceedings of the International Conference on Computing: Theory and Applications, pp.497-501, 2007.

B. He, Y. Wu, K. Kang, and W. Guo, A robust binary text digital watermarking algorithm for the print-scan process, Proceedings of the WRI World Congress on Computer Science and Information Engineering, pp.290-294, 2009.

Z. Huang and J. Leng, Analysis of Hu's moment invariants on image scaling and rotation, Computer Engineering and Technology, vol.7, pp.476-480, 2010.

. Infowatch, /report2016), 2016.

A. Menezes, P. Van-oorschot, and S. Vanstone, Handbook of Applied Cryptography, 2001.

J. Noh and K. Rhee, Palmprint identification algorithm using Hu invariant moments and Otsu binarization, Proceedings of the Fourth Annual ACIS International Conference on Computer and Information Science, pp.94-99, 2005.

A. Odeh, K. Elleithy, M. Faezipour, and E. Abdelfattah, Highly efficient novel text steganography algorithms, Proceedings of the Long Island Systems, Applications and Technology Conference, 2015.
DOI : 10.1109/lisat.2015.7160209

L. Por, K. Wong, and K. Chee, UniSpaCh: A text-based data hiding method using Unicode space characters, Journal of Systems and Software, vol.85, issue.5, pp.1075-1082, 2012.

V. Potdar and E. Chang, Visibly invisible: Ciphertext as a steganographic carrier, Proceedings of the Fourth International Network Conference, pp.385-391, 2004.

R. Villan, S. Voloshynovskiy, O. Koval, J. Vila, E. Topak et al., Text data-hiding for digital and printed documents: Theoretical and practical considerations, Proceedings of SPIE-IS&T Electronic Imaging, vol.6072, pp.607212-607213, 2006.

M. Wu and B. Liu, Data hiding in binary images for authentication and annotation, IEEE Transactions on Multimedia, vol.6, issue.4, pp.528-538, 2004.

D. Zou and Y. Shi, Formatted text document data hiding robust to printing, copying and scanning, Proceedings of the IEEE International Symposium on Circuits and Systems, vol.5, pp.4971-4974, 2005.