Escolar Documentos
Profissional Documentos
Cultura Documentos
ABSTRACT
With the wide use of various communication technologies and internet, it has become tremendously easy
to reproduce, communicate, and distribute digital contents. As far as there is authentication and
copyright protection issues have arisen. Textual way of communication is the most widely used medium
for travelling the data over the Internet besides image, audio, and video. There are various platforms for
the plain text such as books, newspapers, web pages, advertisement, research papers, legal documents,
letters, novels, poetry, and many other documents. For the security of text contents is a significant issue
for copyright protection which cannot be condoned. In this thesis, I have proposed a zero-watermarking
approach towards text watermarking; propose a zero text watermarking algorithm based on occurrence
frequency of vowel ASCII characters and articles for copyright protection of plain text. Uses of watermark
for the watermark embedding process are smaller in length. The embedding algorithm makes use of
frequency vowel characters and articles to generate a specialized author key. The extraction algorithm
uses this key to extract watermark, hence identify the original copyright owner. Here also using
stegnography technique to provide better security to text documents. Experimental results illustrate the
effectiveness of the proposed algorithm on text documents encountering various tempering attacks
performed by different independent attackers and the results are also compared with the recent work on
text watermarking.
I.
INTRODUCTION
To provide the security to the digital contents has gained remarkable importance in current digital time.
Internet has become an essential part of our daily life for the transfer of different forms of data such as
emails, articles, news papers, websites, images, audios, videos, commercials, and opinion blogs.
Information over the Internet is mostly in the form of text and the copyright protection of text is one of
the main concerns of its original author. Text is the most important and core part of legal documents,
reports, and journals, but its security has been seriously ignored. The threats of electronic publishing like
illegal copying and re-distribution of copyrighted material, plagiarism and other forms of copyright
violations need to be explicitly addressed, particularly for plain text.
A. Information Hiding
Information hiding techniques are an essential with a huge application in a number of application areas.
Digital audio, video, text, and images are gradually more furnished with identification marks
imperceptibly. The identification mark can be author name, copyright information, a serial number or
any other message. Information hiding techniques help to prevent un-authorized copying directly.
Information hiding techniques fulfill all requirement of providing security to digital contents. Information
hiding is a general term which surrounding with a various sub parts, like: cryptography, watermarking,
and steganography.
17 | 2015, IJAFRC All Rights Reserved
www.ijafrc.org
www.ijafrc.org
The resilience against attacks on text has been improved and the watermark has been made
robust to attacks of varying length.
The algorithms are tested under the insertion, deletion, and combined tampering attacks in both
localized and dispersed forms.
The proposed technique provides optimal results using vowel characters and articles.
www.ijafrc.org
a) Embedding Algorithm
The algorithm in which the watermark is embedding into text is called embedding algorithm. The
embedding algorithm logically embeds the watermark in text without making any changes in text
document and it generates the author key. Setgnography is also applied to provide the better security.
Flowchart for embedding algorithm is shown in figure 2.
Start
Apply attack on
watermarked encrypted text
www.ijafrc.org
Apply De-Watermarking
and Extract Secret Message
www.ijafrc.org
Attack file 1
Watermark
Attack file 2
95
Attack file3
80
Average
96
90
63.9335
Accuracy (%)
PSNR
63.9911
63.7544
64.0555
MSE
0.0259
0.0274
0.0256
Inserted
64
58
62
61.33
36
42
38
38.66
0.0263
Words
Deleted
Words
From the graphical figures 4 shown below, it shows the accuracy of watermark w1 which used to in this
proposed algorithm, and values of MSE and PSNR are also shown.
y 150
ca
r
u
c 100
ca
k
r 50
a
m
re
ta
0
w
accuracy
PSNR
0.0258
0.0274
0.0253
MSE
A1
A2
A3
Attack files
www.ijafrc.org
In the below graphical figures 5, it shows the accuracy of watermark w2 which used to in this proposed
algorithm, and values of MSE and PSNR are also shown.
Parameters
Previous Algorithm
W1
W2
Proposed algorithm
W1
W2
W3
www.ijafrc.org
Watermark
75.92
67.22
90
74.49
97.50
40
12
21
10
Accuracy
(%)
Watermark
112
Length
300
yc
ar 250
u
cc 200
a
k
ra 150
m 100
re
ta
50
w
0
97.5
w3
67.22
75.92
74.49
90
w2
w1
previous algo
proposed algo
[10]
[11]
[12]
A.khan et al., Optimizing Perceptual Shaping of a Digital Watermark Using Genetic Programming,
Iranian Journal of Electrical and Computer Engineering, vol. 3, 2004, pp. 144-150.
Khan Asifullah, Intelligent perceptual shaping of a digital watermark, Diss. Ghulam Ishaq Khan
Institute of Engineering Sciences and Technology, 2006.
Afzel Noore et al., "Robust biometric image watermarking for fingerprint and face template
protection." IEICE Electronics Express, vol. 3 no.2,2006, pp.23-28.
B.Macq et al, A method of text watermarking using presuppositions, SPIE International
Conference on Security, Steganography, and Watermarking of Multimedia Contents, 2007
D. Huang and H. Yan, Interword distance changes represented by sine waves for watermarking text
images, IEEE Trans. Circuits and Systems for Video Technology, Vol.11-12, 2001, pp.1237-1245.
D. Neeta, K. Snehal, and D. Jacobs, Implementation of LSB Steganography and Its Evaluation for
various Bits, IEEE Conference paper, South Africa, december 2006, pp 173-178.
F. A. P. Petitcolas et al., Information hiding - A survey, Proceedings of the IEEE, vol. 87, no. 7, 1999,
pp.1062 1077.
Fahd N. Al-Wesabi, English Text Zero-Watermark Based on Markov Model of Letter Level Order
Two, vol. 3, 2012.
Jaseena K.U. and Anita John, Text Watermarking using Combined Image and Text for
Authentication and Protection, International Journal of Computer Applications, vol. 20, 2011, pp.813.
H. M. Meral et al., Natural language watermarking via morpho syntactic alterations, Computer
Speech and Language, vol.23, 2009, pp.107-125.
H. M. Meral, E. Sevin et al., Syntactic tools for text watermarking, 19th SPIE Electronic Imaging
Conf. 6505: Security, Steganography, and Watermarking of Multimedia Contents, San Jose, 2007.
J. Zhang, Q. Li, C. Wang, and J. Fang, A novel application for text watermarking in digital reading,
in Proceedings of International Conference on Artificial Intelligence and Computational
Intelligence (AICI 09), Shanghai, China, 2009, pp. 103-111.
www.ijafrc.org
[16]
[17]
[18]
[19]
J Ingemar, et al.,"Secure spread spectrum watermarking for images, audio and video", Image
Processing International Conference, IEEE, Vol. 3, 1996, pp-243-246
J. T. Brassil, S. Low, and N. F. Maxemchuk, Copyright Protection for the Electronic Distribution of
Text Documents, Proceedings of the IEEE, vol. 87, no. 7, 1999, pp.1181-1196.
J. T. Brassil, S. Low, N. F. Maxemchuk, and L. OGorman, Electronic Marking and Identification
Techniques to Discourage Document Copying, IEEE Journal on Selected Areas in Communications,
vol. 13, no. 8, 1995, pp. 1495-1504.
Z. Jalil, A. M. Mirza, and T. Iqbal, A Zero-Watermarking Algorithm for Text Documents using
Structural Components,International Conference on Information and Emerging Technologies
(ICIET), 2010
Zunera.Jalil, M. Arfan Jaffar, and Anwar M. Mirza. "A novel text watermarking algorithm using
image watermark." International journal of innovative computing, information, and control, vol.7,
2010, pp.1255-1271
Zunera Jalil, Anwar M. Mirza, and Maria Sabir, Content based Zero-Watermarking Algorithm for
Authentication of Text Documents, International Journal of Computer Science and Information
Security, Vol. 7, No. 2, February, 2010.
Zunera Jalil et al. "Improved Zero Text Watermarking Algorithm against Meaning Preserving
Attacks", World Academy of Science, Engineering and Technology, pp. 592-596.
www.ijafrc.org