A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

被引:30
作者
Ahvanooey, Milad Taleby [1 ]
Li, Qianmu [1 ]
Shim, Hiuk Jae [2 ]
Huang, Yanyan [3 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[3] Nanjing Univ Sci & Technol, Sch Automat, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
WATERMARKING; ALGORITHM; SCHEME;
D O I
10.1155/2018/5325040
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, and so on is just the plain text. Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy. During the last decade, digital watermarking and steganography techniques have been used as alternatives to prevent tampering, distortion, and media forgery and also to protect both copyright and authentication. This paper presents a comparative analysis of information hiding techniques, especially on those ones which are focused on modifying the structure and content of digital texts. Herein, various text watermarking and text steganography techniques characteristics are highlighted along with their applications. In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques. Finally, some guidelines and directions are suggested for future works.
引用
收藏
页数:22
相关论文
共 50 条
[41]   Robust Arabic and Pashto Text Detection in Camera-Captured Documents Using Deep Learning Techniques [J].
Khan, Nisar ;
Ahmad, Riaz ;
Ullah, Khalil ;
Muhammad, Siraj ;
Hussain, Ibrar ;
Khan, Ahmad ;
Ghadi, Yazeed Yasin ;
Mohamed, Heba G. .
IEEE ACCESS, 2023, 11 :135788-135796
[42]   A Systematic Comparative Analysis of Clustering Techniques [J].
Gupta, Satinder Bal ;
Yadav, Rajkumar ;
Gupta, Shivani .
APPLIED COMPUTER SYSTEMS, 2020, 25 (02) :87-104
[43]   Copyright Protection for 3D Printing by Embedding Information Inside 3D-Printed Objects [J].
Uehira, Kazutake ;
Suzuki, Masahiro ;
Silapasuphakornwong, Piyarat ;
Torii, Hideyuki ;
Takashima, Youichi .
DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 10082 :370-378
[44]   A cultural information system providing e-commerce web services, digital rights management and copyright protection [J].
Tsolis, Dimitrios K. ;
Sioutas, Spyros ;
Drossos, Lambros ;
Papatheodorou, Theodore S. .
JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2007, 13 (04) :543-571
[45]   Information hiding technology and application analysis based on decimal expansion of irrational numbers [J].
Liu, Xiaoyong ;
Lu, Pei ;
Shao, Jianxin ;
Cao, Haibin ;
Zhu, Zhenmin .
AOPC 2017: FIBER OPTIC SENSING AND OPTICAL COMMUNICATIONS, 2017, 10464
[46]   The edge process model and its application to information-hiding capacity analysis [J].
Voloshynovskiy, S ;
Koval, O ;
Mihcak, MK ;
Pun, T .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (05) :1813-1825
[47]   Comparative Study of Text-to-Speech Synthesis Techniques for Mobile Linguistic Translation Process [J].
Chomwihoke, Phanchita ;
Phankokkruad, Manop .
2014 IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM COMPUTING AND ENGINEERING, 2014, :449-454
[48]   Comparative Analysis of Heuristic Techniques applied to ODGP [J].
Gkaidatzis, Paschalis A. ;
Doukas, Dimitrios I. ;
Labridis, Dimitris P. ;
Bouhouras, Aggelos S. .
2017 1ST IEEE INTERNATIONAL CONFERENCE ON ENVIRONMENT AND ELECTRICAL ENGINEERING AND 2017 17TH IEEE INDUSTRIAL AND COMMERCIAL POWER SYSTEMS EUROPE (EEEIC / I&CPS EUROPE), 2017,
[49]   Comparative Analysis of Handover Authentication Techniques in VANETs [J].
Rewal, Purva ;
Mishra, Dheerendra .
WIRELESS PERSONAL COMMUNICATIONS, 2023, 132 (04) :2487-2506
[50]   CHARACTERISTIC ANALYSIS OF CARRIER BASED ON THE FILTERING AND A MULTI-WAVELET METHOD FOR THE INFORMATION HIDING [J].
Ren, Shuai ;
Zhang, Tao ;
Shi, Fangxia .
DISCRETE AND CONTINUOUS DYNAMICAL SYSTEMS-SERIES S, 2015, 8 (06) :1291-1299