A Tamper Proofing Text Watermarking Shift Algorithm for Copyright Protection
AUTHORS
,Department of Computer and Electrical Engineering, Higher Technological Institute, 10th of Ramadan City, Al-sharkia, Egypt.
ABSTRACT
Watermarking has proved its great reliability and flexibility for data protection and tamper detection. Among the different media in which watermarking technology is used, text watermarking represents the most challenging issue due to the different nature of various formats. Plain text is widely used for transferring information on the internet. There is a lack of used plain text watermarking techniques, so obviously it’s necessary to focus on that point. In this paper a novel text watermarking approach is proposed for copyright protection and tamper detection of plain text by inter-word spacing (depending on a secret key) and text fingerprint. This approach is a combination of several steps which work cooperatively. Simulation results manifest a promising performance accomplished by our approach in authentication and tampering detection fields.
KEYWORDS
Text watermarking; Copyright protection; Tamper detection; Authentication; Hash function; Word shift; Plain text
REFERENCES
[1] X. Zhou, W. Zhao, Z. Wang and L. Pan, “Security theory and attack analysis for text watermarking”, Proceedings of the 2009 International Conference on E-Business and Information System Security., May 23-24, Wuhan, IEEE, (2009), pp.1-6.(CrossRef)(Google Scholar)
[2] N.A. Al-Maweri and R. Ali, “ State-of-the-Art in Techniques of Text Digital Watermarking Challenges and Limitations”, Journal of computer sciences., (2016), pp.62-80.
[3] Q. Chen, Y. Zhang and L. Zhou, “ Word Text Watermarking for IP Protection and Tamper Localization”, IEEE, (2011), pp.3595-3598.(CrossRef)(Google Scholar)
[4] Z. Jalil and A. M. Mirza, “A review of digital watermarking techniques for text documents”, Proceedings of the 2009 International Conference on Information and Multimedia Technology., IEEE, (2009), pp. 230-234.(CrossRef)(Google Scholar)
[5] Y. W. Kim, Il-Seok Oh, “Watermarking text document images using edge direction histograms”, Elsevier, (2004), pp.1243-1251.(CrossRef)(Google Scholar)
[6] J. T. Brassil, S. Low, N. F. Maxemchuk, and L. O’Gorman, “Electronic Marking and Identification Techniques to Discourage Document Copying” IEEE Journal on Selected Areas in Communications., vol.13, no. 8, October (1995), pp.1495-1504.(CrossRef)(Google Scholar)
[7] J. T. Brassil, S. Low, N. Maxemchuk and L. O. ’Gorman, “Hiding Information in Document Images”, In Proceedings of the 29th Annual Conference on Information Sciences and Systems. Baltimore, Maryland. 22-24 March (1995), pp. 482-489.
[8] D. Huang and H. Yan, “Inter-word distance changes represented by sine waves for watermarking text images”, IEEE Trans. Circuits and Systems for Video Technology., vol.11, no.12, December (2001), pp.1237-1245.(CrossRef)(Google Scholar)
[9] J. T. Brassil, S. Low, and N. F. Maxemchuk, “Copyright Protection for the Electronic Distribution of Text Documents”, Proceedings of the IEEE., vol.87, no. 7, July (1999), pp.1181-1196.(CrossRef)(Google Scholar)
[10] T. Amano, “A feature calibration method for watermarking of document images”, IBM Research., Tokyo Research Laboratory., pp.1-4.(CrossRef)(Google Scholar)
[11] M. A. Al-Ahmad and A. E. Al-duwaikh, “ A New Fragile Digital Watermarking Technique for a PDF Digital Holy Quran”, proceedings of the 2013 International Conference on Advanced Computer Science Applications and Technologies., IEEE, (2013), pp.250-253.(CrossRef)(Google Scholar)
[12] R. Olanrewaju, F. Fajingbesi and N. Ishak, “Watermarking In Protecting And Validating The Integrity of Digital Information: A Case Study of The Holy Scripture”, proceedings of the 2016 6th International Conference on Information and Communication Technology for The Muslim World., IEEE, (2016), pp.222-227.(CrossRef)(Google Scholar)
[13] A. K. Bhattacharjya and H. Ancin, “Data embedding in text for a copier system”, IEEE, (1999), pp.245 -249.(CrossRef)(Google Scholar)
[14] J. Chen, F. Yang , H. Ma and Q. Lu, “ Text Watermarking Algorithm Based on Semantic Role Labeling”, IEEE, (2016), pp.117-120.(CrossRef)(Google Scholar)
[15] X. Sun and A. J. Asiimwe, “Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers”.(CrossRef)(Google Scholar)
[16] Natural Language Generation with Markov Chains and Grammar"TJHSST Senior Research Project Computer Systems Lab 2009-2010 Sam Zhang June 15, 2010
[17] M. L. Mali, N. N. Patil and J. B. Patil, “Implementation of Text Watermarking Technique Using Natural Language Watermarks”, proceedings of the 2013 International Conference on Communication Systems and Network Technologies., IEEE, (2013), pp.482-486.(CrossRef)(Google Scholar)
[18] M. J. Atallah and V. Raskin, “Natural Language Water-marking: Design, Analysis and a Proof of Concept Implementation”, Springer-Verlag Berlin Heidelberg, (2001), pp.185-200.(CrossRef)(Google Scholar)
[19] H. M. Meral and B. Sankur, “Natural language watermarking via morphosyntactic alterations”, Computer Speech and Language., Elsevier Ltd, (2009), pp.107-125.(CrossRef)(Google Scholar)
[20] Z. Jalil and A.M. Mirza, “Text watermarking using combined image-plus-text watermark”, Proceedings of the 2nd International Workshop on Education Technology and Computer Science., IEEE Xplore Press, (2010), pp.11-14.(CrossRef)(Google Scholar)
[21] Z. JaliI and H. Aziz, “ A Zero Text Watermarking Algorithm based on Non-Vowel ASCII Characters”, proceedings of the 2010 International Conference on Educational and Information Technology., IEEE, (2010), pp.503-507.(CrossRef)(Google Scholar)
[22] Z. Jalil and A.M. Mrirza, “ An Invisible Text Watermarking Algorithm Using Image Watermark”, Innovations in Computing Sciences and Software Engineering., Springer, New York, (2010), pp.147-152.(CrossRef)(Google Scholar)
[23] Z. Jalil, A. M. Mirza and M. Sabir, “ Content based Zero-Watermarking Algorithm for Authentication of Text Documents”, proceedings of the International Journal of Computer Science and Information Security., vol.7, no.2, February (2010), pp.212-217.(CrossRef)(Google Scholar)
[24] Z. Jalil A.M. Mrirza and H. Jabeen, “Word length based zero-watermarking algorithm for tamper detection in text documents”, Proceedings of the 2nd International Conference on Computer Engineering and Technology., Apr. 16-18, IEEE Xplore Press, Chengdu, (2010), pp.378- 382.(CrossRef)(Google Scholar)
[25] F. M. Ba-Alwi, M. M. Ghilan and F. N. Al-Wesabi, “Content Authentication of English Text via Internet using Zero Watermarking Technique and Markov Model”, International Journal of Applied Information Systems., vol.7, no. 1, April (2014), pp.25-36.(CrossRef)(Google Scholar)
[26] M. Bashardoost, M. Rahim and N. Hadipour, “A novel zero-watermarking scheme for text document authentication”, Journal Teknologi (Sciences & Engineering), (2015), pp.49–56.(CrossRef)(Google Scholar)
[27] D. Hanyurwimfura, Y. Liu and Z. Liu, “Text Format Based Relational Database Watermarking for Non-numeric Data”, proceedings of the 2010 International Conference On Computer Design And Applications , IEEE, (2010), pp.312-316.(CrossRef)(Google Scholar)
[28] Y. M. Alginahi , M. N. Kabir and O. Tayan, “An enhanced kashida-based watermarking approach for Arabic text documents”, IEEE, (2013), pp.301-304.(CrossRef)(Google Scholar)
[29] R. A. Alotaibi and L. A. Elrefaei, “Utilizing Word Space with Pointed and Un-pointed Letters for Arabic Text Watermarking”, proceedings of the 2016 UK Sim-AMSS 18th International Conference on Computer Modeling and Simulation., IEEE, (2016), pp.111-116.(CrossRef)(Google Scholar)
[30]R. A. Alotaibi and L. A. Elrefaei, “Improved capacity Arabic text watermarking methods based on open word space”, Journal of King Saud University – Computer and Information Sciences., (2017), pp.1-13.(CrossRef)(Google Scholar)
CITATION
COPYRIGHT
© 2018 A. Eid et al. Published by Global Vision Press. This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CCBY4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.