Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3548785.3548794acmotherconferencesArticle/Chapter ViewAbstractPublication PagesideasConference Proceedingsconference-collections
short-paper

Grayscale Text Watermarking

Published: 13 September 2022 Publication History
  • Get Citation Alerts
  • Abstract

    In an increasingly connected world, where information is easily spread through multiple channels and platforms, digital watermarking has been broadly investigated in authorship attribution and intellectual property protection of digital content. However, text contents pose many challenges due to a low capacity to embed a watermark. In this paper, we propose a new structural watermarking method for small pieces of text that may allow to hide upwards of 15 bits of watermark per character manipulating the underlying font grayscale values. The proposed method ensures length preservation and is robust to the copy and paste activities. Moreover, the method is able to embed a password-based watermark returning visually indistinguishable watermarked text.

    References

    [1]
    Tomio Amano and Daigo Misaki. 1999. A feature calibration method for watermarking of document images. In Proceedings of the Fifth International Conference on Document Analysis and Recognition. ICDAR’99 (Cat. No. PR00318). IEEE, 91–94.
    [2]
    Mikhail J Atallah, Victor Raskin, Michael Crogan, Christian Hempelmann, Florian Kerschbaum, Dina Mohamed, and Sanket Naik. 2001. Natural language watermarking: Design, analysis, and a proof-of-concept implementation. In International Workshop on Information Hiding. Springer, 185–200.
    [3]
    Jinfeng Bai, Zhineng Chen, Bailan Feng, and Bo Xu. 2014. Chinese image text recognition on grayscale pixels. In 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 1380–1384.
    [4]
    Anoop K Bhattacharjya and Hakan Ancin. 1999. Data embedding in text for a copier system. In Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348), Vol. 2. IEEE, 245–249.
    [5]
    Diogo Campos, Rodrigo Rocha Silva, and Jorge Bernardino. 2019. Text Mining in Hotel Reviews: Impact of Words Restriction in Text Classification. In KDIR. 442–449.
    [6]
    Alfredo Cuzzocrea, Wookey Lee, and Carson K Leung. 2015. High-recall information retrieval from linked big data. In 2015 IEEE 39th Annual Computer Software and Applications Conference, Vol. 2. IEEE, 712–717.
    [7]
    Anita John Jaseena K.U. 2011. Text Watermarking using Combined Image and Text for Authentication and Protection. Int. Journal of Computer Applications 20, 4 (2011). https://doi.org/10.1.1.206.4500
    [8]
    Dr.Varghese Paul Jobin Abraham. 2011. Watermarking Grayscale Images using Text for Copyright Protection. International Journal of Computer Applications 31, 9(2011). https://doi.org/10.1.1.735.1015
    [9]
    Behrooz Khosravi, Behnam Khosravi, Bahman Khosravi, and Khashayar Nazarkardeh. 2019. A new method for pdf steganography in justified texts. Journal of information security and applications 45 (2019), 61–70.
    [10]
    Young-Won Kim, Kyung-Ae Moon, and Il-Seok Oh. 2003. A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics. In ICDAR. Citeseer, 775–779.
    [11]
    Young-Won Kim and Il-Seok Oh. 2004. Watermarking text document images using edge direction histograms. Pattern Recognition Letters 25, 11 (2004), 1243–1251.
    [12]
    Hasan Mesut Meral, Bülent Sankur, A Sumru Özsoy, Tunga Güngör, and Emre Sevinç. 2009. Natural language watermarking via morphosyntactic alterations. Computer Speech & Language 23, 1 (2009), 107–125.
    [13]
    Nighat Mir. 2014. Copyright for web content using invisible text watermarking. Computers in Human Behavior 30 (2014), 648–653.
    [14]
    Lip Yee Por, KokSheik Wong, and Kok Onn Chee. 2012. UniSpaCh: A text-based data hiding method using Unicode space characters. J. of Systems and Software 85, 5 (2012), 1075–1082.
    [15]
    Stefano Giovanni Rizzo, Flavio Bertini, and Danilo Montesi. 2019. Fine-grain watermarking for intellectual property protection. EURASIP Journal on Information Security 2019, 1 (2019), 1–20.
    [16]
    Stefano Giovanni Rizzo, Flavio Bertini, Danilo Montesi, and Carlo Stomeo. 2017. Text watermarking in social media. In Proc. of the 2017 IEEE/ACM Inter. Conf. on Advances in Social Networks Analysis and Mining 2017. 208–211.
    [17]
    Kartik U Sharma, Pooja P Talan, Pratiksha P Nawade, Mir Sadique Ali, and Akshay U Sharma. 2019. Digital Watermarking—An Overview and a Possible Solution. ICTIS (2019), 447–455.
    [18]
    Xingming Sun and Alex Jessey Asiimwe. 2005. Noun-verb based technique of text watermarking using recursive decent semantic net parsers. In International Conference on Natural Computation. Springer, 968–971.
    [19]
    Milad Taleby Ahvanooey, Hassan Dana Mazraeh, and Seyed Hashem Tabasi. 2016. An innovative technique for web text watermarking (AITW). Information Security Journal: A Global Perspective 25, 4-6(2016), 191–196.
    [20]
    Umut Topkara, Mercan Topkara, and Mikhail J Atallah. 2006. The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. In Proceedings of the 8th workshop on Multimedia and security. 164–174.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    IDEAS '22: Proceedings of the 26th International Database Engineered Applications Symposium
    August 2022
    174 pages
    ISBN:9781450397094
    DOI:10.1145/3548785
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 September 2022

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Copyright Protection
    2. Digital Watermarking
    3. Grayscale Watermarking
    4. Structural Text Watermarking

    Qualifiers

    • Short-paper
    • Research
    • Refereed limited

    Conference

    IDEAS'22

    Acceptance Rates

    Overall Acceptance Rate 74 of 210 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 44
      Total Downloads
    • Downloads (Last 12 months)24
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media