1. [1] M. Kuribayashi, T. Fukushima, and N. Funabiki, “Robust and secure data hiding for PDF text document,” IEICE Trans. Inf. & Syst., vol.E102-D, no.1, pp.41-47, Jan. 2019. 10.1587/transinf.2018mup0003
2. [2] E. Elsayed and D. Fathy, “Evaluation of quran recitation via OWL ontology based system,” The International Arab Journal of Information Technology, vol.16, no.6, pp.970-977, 2019.
3. [3] N.S. Kamaruddin, A. Kamsin, L.Y. Por, and H. Rahman, “A review of text watermarking: Theory, methods, and applications,” IEEE Access, vol.6, pp.8011-8018, 2018. 10.1109/access.2018.2796585
4. [4] H. Morita, J.C.N. Schuldt, T. Matsuda, G. Hanaoka, and T. Iwata, “On the security of non-interactive key exchange against related-key attacks,” IEICE Trans. Fundamentals, vol.E100-A, no.9, pp.1910-1923, Sept. 2017. 10.1587/transfun.e100.a.1910
5. [5] A.A. Alwan, M.A. Shahidan, N.N. Amir, Sjarif, M.M. Hashim, and M.S. Mohd, “A review and open issues of diverse text watermarking techniques in spatial domain,” Journal of Theoretical and Applied Information Technology, vol.96, pp.5819-5840, 2018.