A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

被引:30
作者
Ahvanooey, Milad Taleby [1 ]
Li, Qianmu [1 ]
Shim, Hiuk Jae [2 ]
Huang, Yanyan [3 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[3] Nanjing Univ Sci & Technol, Sch Automat, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
WATERMARKING; ALGORITHM; SCHEME;
D O I
10.1155/2018/5325040
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, and so on is just the plain text. Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy. During the last decade, digital watermarking and steganography techniques have been used as alternatives to prevent tampering, distortion, and media forgery and also to protect both copyright and authentication. This paper presents a comparative analysis of information hiding techniques, especially on those ones which are focused on modifying the structure and content of digital texts. Herein, various text watermarking and text steganography techniques characteristics are highlighted along with their applications. In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques. Finally, some guidelines and directions are suggested for future works.
引用
收藏
页数:22
相关论文
共 50 条
[21]   A Robust Algorithm for Digital Image Copyright Protection and Tampering Detection: Employing DWT, DCT, and Blowfish Techniques [J].
Salama, Ahmed S. ;
Shoitan, Rasha ;
Abdallah, Mohamed S. ;
Cho, Young Im ;
Nagm, Ahmad M. .
TRAITEMENT DU SIGNAL, 2023, 40 (05) :2019-2027
[22]   A novel copyright protection for digital images using extra scrambled information [J].
Shin, Jin-Wook ;
Yang, Jucheng ;
Park, Dong-Sun ;
Yoon, Sook .
VISAPP 2006: PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTER VISION THEORY AND APPLICATIONS, VOL 1, 2006, :27-+
[23]   Marking and detection of text documents using transform-domain techniques [J].
Liu, Y ;
Mant, J ;
Wong, E ;
Low, S .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 :317-328
[24]   A Comparative Study of Stemming Techniques on the Malay Text [J].
Mohemad, Rosmayati ;
Muhait, Nazratul Naziah Mohd ;
Noor, Noor Maizura Mohamad ;
Mamat, Nur Fadilla Akma .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (12) :133-139
[25]   Comparative Analysis of Relational Database Watermarking Techniques: An Empirical Study [J].
Rani, Sapana ;
Halder, Raju .
IEEE ACCESS, 2022, 10 :27970-27989
[26]   On the accuracy of hiding information metrics: Counterfeit protection for education and important certificatesle [J].
Hmood, Ali K. ;
Kasirun, Z. M. ;
Jalab, Hamid A. ;
Alam, Gazi Mahabubul ;
Zaidan, A. A. ;
Zaidan, B. B. .
INTERNATIONAL JOURNAL OF THE PHYSICAL SCIENCES, 2010, 5 (07) :1054-1062
[27]   Chaos and Fractal-Based Information Hiding Techniques as Applied to Steganography [J].
Ntaoulas, Nikolaos ;
Drakopoulos, Vasileios .
PERSPECTIVES IN DYNAMICAL SYSTEMS II-NUMERICAL AND ANALYTICAL APPROACHES, DSTA 2021, 2024, 454 :387-401
[28]   Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques [J].
Zaidan, B. B. ;
Zaidan, A. A. .
MEASUREMENT, 2018, 117 :277-294
[29]   A comparative analysis and performance evaluation of web application protection techniques against injection attacks [J].
Ali, Nabeel Salih ;
Bin Shibghatullah, Abdul Samad ;
Alhilali, Ahmed Hazim ;
Al-Khammasi, Salam ;
Kadhim, Mohammed Falih ;
Fatlawi, Hayder K. .
INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2020, 18 (02) :196-228
[30]   Information Hiding Techniques for Infrared Images: exploring the state-of-the art and challenges [J].
Pomponiu, Victor ;
Cavagnino, Davide ;
Botta, Marco ;
Nejati, Hossein .
ELECTRO-OPTICAL AND INFRARED SYSTEMS: TECHNOLOGY AND APPLICATIONS XII; AND QUANTUM INFORMATION SCIENCE AND TECHNOLOGY, 2015, 9648