A NOVEL ZERO-WATERMARKING SCHEME FOR TEXT DOCUMENT AUTHENTICATION

Authors

  • Morteza Bashardoost UTM-IRDA, Digital Media Centre, Faculty of Computing, Universiti Teknologi Malaysia, 81310 UTM Johor Bahru, Johor, Malaysia
  • Mohd Shafry Mohd Rahim UTM-IRDA, Digital Media Centre, Faculty of Computing, Universiti Teknologi Malaysia, 81310 UTM Johor Bahru, Johor, Malaysia
  • Narges Hadipour UTM-IRDA, Digital Media Centre, Faculty of Computing, Universiti Teknologi Malaysia, 81310 UTM Johor Bahru, Johor, Malaysia

DOI:

https://doi.org/10.11113/jt.v75.5066

Keywords:

Watermarking, text document, authentication, Tamper detection, Zero-watermarking, plain text, information security

Abstract

The demand for copyright protection of text documents is extremely vital especially when the text is transmitted over the Internet. One of the best practical resolutions to maintain the security of document media is digital watermarking. Several approaches have been proposed to guarantee the safety and protection of the documents against dishonest copying and distribution. This paper suggests an innovative zero-watermarking scheme for the purpose of authentication and tamper detection in simple text documents. The algorithm generates a watermark based on the effective characters of the text contents which can be extracted later using extraction algorithm to identify the status of tampering in the text document. Experimental results demonstrate the effectiveness of the algorithm against random tampering attacks. Watermark pattern matching and watermark distortion rate are used as evaluation parameters on multiple text samples of varying length.

References

Brassil, J. T., S. Low, N. F. Maxemchuk and L. O. ’Gorman. 1995. Electronic Marking and Identification Techniques to Discourage Document Copying. IEEE J. Sel. Areas Commun. 13(8): 1495-1504.

Brassil, J., S. Low, N. Maxemchuk and L. O. ’Gorman. 1995. Hiding Information in Document Images. In Proceedings of the 29th Annual Conference on Information Sciences and Systems. Baltimore, Maryland. 22-24 March 1995. 482-489.

Brassil, J. T., S. Low and N. F. Maxemchuk. 1999. Copyright Protection for the Electronic Distribution of Text Documents. In Proceedings of the IEEE. 87(7): 1181-1196.

Huang, D. and H. Yan. 2001. Interword Distance Changes Represented by Sine Waves for Watermarking Text Images. Circuits Syst. Video Technol. IEEE Trans. 11(12): 1237-1245.

Harouni, M., M. S. M. Rahim, D. Mohamad, A. Rehman and T. Saba. 2012. Online Cursive Persian/Arabic Character Recognition by Detecting Critical Points. Int. J. Acad. Res. 4(2): 208-213.

Sharifara, A., M. S. M. Rahim and M. Bashardoost. 2013. A Novel Approach to Enhance Robustness in Digital Image Watermarking using Multiple Bit-Planes of Intermediate Significant Bits. In International Conference on Informatics and Creative Multimedia (ICICM). Kuala Lumpur, Malaysia. 3-6 Sept. 2013. 22-27.

Daraee, F. and S. Mozaffari. 2014. Watermarking in Binary Document Images using Fractal Codes. Pattern Recognition Letters. 35: 120-129.

Rameshbabu, K., P. Prasannakumar and K.E. Balachandrudu. 2013. Text Watermarking using Combined Image and Text. Int. J. Eng. Res. Technol. 2(12): 3812-3818.

Jadhav, A. and M. O. Sharma. 2014. Reversible Watermarking Technique using Histogram Shifting Modulations. Int. J. Innov. Technol. Explor. Eng. 4(4): 29-33.

Atallah, M. J., C. McDonough, S. Nirenburg and V. Raskin. 2000. Natural Language Processing for Information Assurance and Security: An Overview and Implementations. In Proceedings of the 2000 Workshop on New Security Paradigms. Ballycotton Co. Cork, Ireland. 18-21 Sept. 2000. 51-65.

Meral, H., B. Sankur, A. S. Özsoy, T. Gungor and E. Sevinc. 2009. Natural Language Watermarking via Morphosyntactic Alterations. Comput. Speech Lang. 23(1): 107-125.

Meral, H. M., E. Sevinç, E. Ünkar, B. Sankur, A. S. Özsoy and T. Güngör. 2007. Syntactic Tools for Text Watermarking. In Edward, J.D. and Ping, W.W. (eds.). SPIE 6505, Security, Steganography and Watermarking of Multimedia Contents IX.

Topkara, U., M. Topkara and M. Atallah. 2006. The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions. In Proceedings of the 8th Workshop on Multimedia and Security. Geneva, Switzerland. 26-27 Sept. 2006. 164-174.

Kim, M. 2008. Text Watermarking by Syntactic Analysis. In Proceedings of the 12th WSEAS International Conference on Computers. Heraklion, Crete Island, Greece. 23-25 July 2008. 904-909.

Atallah, M. J., V. Raskin, M. Crogan, C. Hempelmann, F. Kerschbaum, D. Mohamed and S. Naik. 2001. Natural Language Watermarking : Design, Analysis and a Proof-of-Concept Implementation. In Ira, S.M. (ed.). 4th International Workshop, IH 2001. Springer Berlin Heidelberg.

Topkara, M., C. M. Taskiran and E. J. Delpj III. 2005. Natural Language Watermarking. In Edward, J. and Ping, W.W. (eds.). Proc. of SPIE-IS&T Electronic Imaging, SPIE Vol. 5681.

Topkara, M., U. Topkara and M. J. Atallah. 2006. Words Are Not Enough: Sentence Level Natural Language Watermarking. In Proceedings of the 4th ACM International Workshop on Contents Protection and Security. Santa Barbara, CA, USA. 28 Oct. 2006. 37-46.

Sun, X. and A. J. Asiimwe. 2005. Noun-Verb based Technique of Text Watermarking using Recursive Decent Semantic Net Parsers. Lect. Notes Comput. Sci. 3612: 968-971.

Jiang, L., Z. Xu and Y. Xu. 2012. Commutative Encryption and Watermarking based on Orthogonal Decomposition. Multimed. Tools Appl. 70(3): 1617-1635.

Topkara, M., U. Topkara and M. J. Atallah. 2007. Information Hiding through Errors: A Confusing Approach. In Edward, J. D. and Ping, W. W. Proc. SPIE 6505, Security, Steganography and Watermarking of Multimedia Contents IX.

Macq, B. and O. Vybornova. 2007. A Method of Text Watermarking using Presuppositions. Proc. SPIE 6505, Security, Steganography and Watermarking of Multimedia Contents IX.

Vybornova, O. and B. Macq. 2007. Natural Language Watermarking and Robust Hashing based on Presuppositional Analysis. In IEEE International Conference on Information Reuse and Integration (IRI 2007). Las Vegas, IL. 13-15 Aug. 2007. 177-182.

Lu, P., Z. Lu, Z. Zhou and J. Gu. 2009. An Optimized Natural Language Watermarking Algorithm based on TMR. In Proceedings of 9th International Conference for Young Computer Scientists. Hunan. 18-21 Nov. 2008. 1459-1463.

Mir, N. 2014. Copyright for Web Content using Invisible Text Watermarking. Comput. Human Behav. 30: 648-653.

Jalil, Z., A. Mirza and H. Jabeen. 2010. Word Length based Zero-Watermarking Algorithm for Tamper Detection in Text Documents. In 2nd International Conference on Computer Engineering and Technology (ICCET). Chengdu. 16-18 Apr. 2010. 378-382.

Jalil, Z., A. Mirza and M. Sabir. 2010. Content based Zero-Watermarking Algorithm for Authentication of Text Documents. Int. J. Comput. Sci. Inf. Secur.( IJCSIS). 7(2): 212-217.

JaliI, Z., A. Hamza, S. S. M. Arif and A. Mirza. 2010. A Zero Text Watermarking Algorithm based on Non-Vowel ASCII Characters. In International Conference on Educational and Information Technology (ICEIT). Chongqing. 17-19 Sept. 2010. 503-507.

Tayan, O., M. N. Kabir and Y. M. Alginahi. 2014. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents. Hindawi Publishing Corporation 2014.

Zhang, S. and S. Yan. 2014. Unicode-based Zero-Watermarking Algorithm for Chinese Documents. In Maozhu, J. and Zhenyu, D. (eds.). Management Innovation and Information Technology.

Jalil, Z. and A. M. Mirza. 2010. Text Watermarking using Combined Image-plus-Text Watermark. In 2nd Int. Work. Educ. Technol. Comput. Sci. Wuhan. 6-7 March 2010. 11-14.

Downloads

Published

2015-07-29

Issue

Section

Science and Engineering

How to Cite

A NOVEL ZERO-WATERMARKING SCHEME FOR TEXT DOCUMENT AUTHENTICATION. (2015). Jurnal Teknologi, 75(4). https://doi.org/10.11113/jt.v75.5066