A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

被引:30
作者
Ahvanooey, Milad Taleby [1 ]
Li, Qianmu [1 ]
Shim, Hiuk Jae [2 ]
Huang, Yanyan [3 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[3] Nanjing Univ Sci & Technol, Sch Automat, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
WATERMARKING; ALGORITHM; SCHEME;
D O I
10.1155/2018/5325040
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, and so on is just the plain text. Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy. During the last decade, digital watermarking and steganography techniques have been used as alternatives to prevent tampering, distortion, and media forgery and also to protect both copyright and authentication. This paper presents a comparative analysis of information hiding techniques, especially on those ones which are focused on modifying the structure and content of digital texts. Herein, various text watermarking and text steganography techniques characteristics are highlighted along with their applications. In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques. Finally, some guidelines and directions are suggested for future works.
引用
收藏
页数:22
相关论文
共 50 条
[31]   Copyright protection of deep neural network models using digital watermarking: a comparative study [J].
Fkirin, Alaa ;
Attiya, Gamal ;
El-Sayed, Ayman ;
Shouman, Marwa A. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (11) :15961-15975
[32]   Analysis of the possibility of hiding decomposed information in the virtual reality environment [J].
Szymczyk, Tomasz ;
Czajka, Piotr .
ADVANCES IN SCIENCE AND TECHNOLOGY-RESEARCH JOURNAL, 2025, 19 (02) :283-295
[33]   Information System's Protection Algorithms, Comparative Analyses [J].
Al Zu'bi, Omar Radhi ;
Ibrahim, Yasir Khalil .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (12) :294-299
[34]   Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection [J].
Hung, Shi-Chei ;
Wu, Da-Chun ;
Tsai, Wen-Hsiang .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (04) :850-865
[35]   Dynamic feedback bit-level image privacy protection based on chaos and information hiding [J].
Zhang, Jinlong ;
Wen, Heping .
SCIENTIFIC REPORTS, 2024, 14 (01)
[36]   An enhanced image protection framework: polynomial-based secret sharing meets information hiding [J].
Li, Xiaopeng ;
Fu, Zhengxin ;
Gao, Yuan ;
Yu, Bin .
JOURNAL OF KING SAUD UNIVERSITY COMPUTER AND INFORMATION SCIENCES, 2025, 37 (06)
[37]   A Comparative Analysis of Software Protection Schemes [J].
Khan, Muhammad ;
Akram, Muhammad ;
Riaz, Naveed .
INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2015, 12 (03) :286-295
[38]   ECH3OA: An Enhanced Chimp-Harris Hawks Optimization Algorithm for copyright protection in Color Images using watermarking techniques [J].
Fahmy, Hager ;
El-Gendy, Eman M. ;
Mohamed, M. A. ;
Saafan, Mahmoud M. .
KNOWLEDGE-BASED SYSTEMS, 2023, 269
[39]   Comparative analysis of integer wavelet transforms in reversible data hiding using threshold based histogram modification [J].
Shaik, Ahmad ;
Thanikaiselvan, V. .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (07) :878-889
[40]   A dummy-based user privacy protection approach for text information retrieval [J].
Wu, Zongda ;
Shen, Shigen ;
Lian, Xinze ;
Su, Xinning ;
Chen, Enhong .
KNOWLEDGE-BASED SYSTEMS, 2020, 195