Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

An Invisible Text Watermarking Algorithm using Image Watermark

  • Conference paper
  • First Online:
Innovations in Computing Sciences and Software Engineering

Abstract

Copyright protection of digital contents is very necessary in today’s digital world with efficient communication mediums as internet. Text is the dominant part of the internet contents and there are very limited techniques available for text protection. This paper presents a novel algorithm for protection of plain text, which embeds the logo image of the copyright owner in the text and this logo can be extracted from the text later to prove ownership. The algorithm is robust against content-preserving modifications and at the same time, is capable of detecting malicious tampering. Experimental results demonstrate the effectiveness of the algorithm against tampering attacks by calculating normalized hamming distances. The results are also compared with a recent work in this domain

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Asifullah Khan, Anwar M. Mirza and Abdul Majid, “Optimizing Perceptual Shaping of a Digital Watermark Using Genetic Programming”, Iranian Journal of Electrical and Computer Engineering, vol. 3, pp. 144-150, 2004.

    Google Scholar 

  2. J. T. Brassil, S. Low, N. F. Maxemchuk, and L. O’Gorman, “Electronic Marking and Identification Techniques to Discourage Document Copying,” IEEE Journal on Selected Areas in Communications, vol. 13, no. 8, October 1995, pp. 1495-1504.

    Article  Google Scholar 

  3. J. T. Brassil, S. Low, and N. F. Maxemchuk, "Copyright Protection for the Electronic Distribution of Text Documents," Proceedings of the IEEE, vol. 87, no. 7, July 1999, pp.1181-1196.

    Article  Google Scholar 

  4. N. F. Maxemchuk, S. H. Low, “Performance Comparison of Two Text Marking Methods,” IEEE Journal of Selected Areas in Communications (JSAC), May 1998. vol. 16 no. 4 1998. pp. 561-572.

    Google Scholar 

  5. N. F. Maxemchuk, “Electronic Document Distribution,” AT&T Technical Journal, September 1994, pp. 73-80. 6.

    Google Scholar 

  6. N. F. Maxemchuk and S. Low, “Marking Text Documents,” Proceedings of the IEEE International Conference on Image Processing, Washington, DC, Oct. 26-29, 1997, pp. 13-16.

    Google Scholar 

  7. S. H. Low, N. F. Maxemchuk, and A. M. Lapone, "Document Identification for Copyright Protection Using Centroid Detection," IEEE Transactions on Communications, Mar. 1998, vol. 46, no.3, pp 372-381.

    Article  Google Scholar 

  8. S. H. Low and N. F. Maxemchuk, “Capacity of Text Marking Channel,” IEEE Signal Processing Letters, vol. 7, no. 12 , Dec. 2000, pp. 345 -347.

    Article  Google Scholar 

  9. D. Huang and H. Yan, "Interword distance changes represented by sine waves for watermarking text images," IEEE Trans. Circuits and Systems for Video Technology, Vol.11, No.12, pp.1237-1245, Dec 2001.

    Article  MathSciNet  Google Scholar 

  10. T. Amano and D. Misaki, "A feature calibration method for watermarking of document images," Proceedings of ICDAR, pp.91-94, 1999.

    Google Scholar 

  11. M. J. Atallah, C. McDonough, S. Nirenburg, and V. Raskin, “Natural Language Processing for Information Assurance and Security: An Overview and Implementations”, Proceedings 9th ACM/SIGSAC New Security Paradigms Workshop, September, 2000, Cork, Ireland, pp. 51–65.

    Google Scholar 

  12. M. J. Atallah, V. Raskin, M. C. Crogan, C. F. Hempelmann, F. Kerschbaum, D. Mohamed, and S.Naik, “Natural language watermarking: Design,analysis, and a proof-of-concept implementation”, Proceedings of the Fourth Information HidingWorkshop, vol. LNCS 2137, 25-27 April 2001, Pittsburgh, PA.

    Google Scholar 

  13. Hassan M. Meral et al., “Natural language watermarking via morphosyntactic alterations”, Computer Speech and Language, 23, 107-125, 2009.

    Article  Google Scholar 

  14. Hasan M. Meral, Emre Sevinç, Ersin Ünkar, Bülent Sankur, A. Sumru Özsoy, Tunga Güngör, Syntactic tools for text watermarking, 19th SPIE Electronic Imaging Conf. 6505: Security, Steganography, and Watermarking of Multimedia Contents, Jan. 2007, San Jose.

    Google Scholar 

  15. M. Atallah, C. McDonough, S. Nirenburg, and V. Raskin, “Natural Language Processing for Information Assurance and Security: An Overview and Implementations,” Proceedings 9th ACM/SIGSAC New Security Paradigms Workshop, September, 2000, Cork, Ireland, pp. 51–65.

    Google Scholar 

  16. M. Atallah, V. Raskin, C. F. Hempelmann, M. Karahan, R. Sion, U. Topkara, and K. E. Triezenberg, “Natural Language Watermarking and Tamperproofing”, Fifth Information Hiding Workshop, vol. LNCS, 2578, October, 2002, Noordwijkerhout, The Netherlands, Springer-Verlag.

    Google Scholar 

  17. M. Topkara, C. M. Taskiran, and E. Delp, “Natural language watermarking,” Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents VII, 2005.

    Google Scholar 

  18. U. Topkara, M. Topkara, M. J. Atallah, The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions”. In Proceedings of ACM Multimedia and Security Conference, Geneva, 2006.

    Google Scholar 

  19. Xingming Sun, Alex Jessey Asiimwe. Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers. Lecture Notes in Computer Science (LNCS) 3612: 958-961, Springer Press, August 2005.

    Google Scholar 

  20. Topkara, M., Topraka, U., Atallah, M.J., 2007. Information hiding through errors: a confusing approach. In: Delp III, E.J., Wong, P.W. (Eds.), Security, Steganography, and watermarking of Multimedia Contents IX. Proceedings of SPIE-IS&T Electronic Imaging SPIE 6505. pp. 65050 V-1–65050 V-12.

    Google Scholar 

  21. B. Macq and O. Vybornova, “A method of text watermarking using presuppositions,” in Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, January 2007.

    Google Scholar 

  22. Peng Lu et al., “An optimized natural language watermarking algorithm based on TMR”, on proceedings of 9th International Conference for Young Computer Scientists, 2009.

    Google Scholar 

  23. Carlos Lopez, “Watermarking of digital geospatial datasets: a review of technical, legal and copyright issues”, International Journal of Geographical Information Science, 2002. Vol.16, No. 6, 589-607.

    Article  Google Scholar 

  24. “Reuters corpus,” http://about.reuters.com/researchandstandards/corpus/index.asp.

  25. Z. Jalil and A.M. Mirza, “A Novel Text Watermarking Algorithm Based on Double Letters”, International Journal of Computer Mathematics. (Submitted)

    Google Scholar 

  26. "Preposition" The Columbia Encyclopedia, Sixth Edition. 2008. Encyclopedia.com. Aug. 2009

    Google Scholar 

  27. “English Preposition List”, http://www.englishclub.com/grammar/prepositions-list.htm

  28. Sinclair, J. 1991. Corpus, Concordance, Collocation Oxford: Oxford University Press

    Google Scholar 

  29. Z. Jalil and A. M. Mirza, “A Preposition based Algorithm for Copyright Protection of Text Documents”, Journal of the Chinese Institute of Engineers. (Submitted)

    Google Scholar 

Download references

Acknowledgment

One of the authors, Ms. Zunera Jalil, 041-101673-Cu-014 would like to acknowledge the Higher Education Commission of Pakistan for providing the funding and resources to complete this work under Indigenous Fellowship Program.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zunera Jalil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media B.V.

About this paper

Cite this paper

Jalil, Z., Mirza, A.M. (2010). An Invisible Text Watermarking Algorithm using Image Watermark. In: Sobh, T., Elleithy, K. (eds) Innovations in Computing Sciences and Software Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-9112-3_25

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-9112-3_25

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-9111-6

  • Online ISBN: 978-90-481-9112-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics