Novel Arabic e-Text Watermarking Supporting Partial Dishonesty Based on Counting-Based Secret Sharing

被引:20
作者
Almehmadi, Esraa [1 ]
Gutub, Adnan [1 ]
机构
[1] Umm Al Qura Univ, Comp Engn Dept, Mecca, Saudi Arabia
关键词
Information hiding; e-text Watermarking; e-text Steganography; Counting-based secret sharing; Semi-complete verification; Arabic text security;
D O I
10.1007/s13369-021-06200-7
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Nowadays, the proliferation done on information systems had led to an alarming increase in security breaches. This security trend is now viewed as an essential foundation in the success of the information systems platforms planning, development and administration stages. The ideal way to protect the integrity and ownership of information within the transmission are performed via watermarking. It generally embeds secret data in the intended e-text media for the user's integrity proof purposes afterwards. The challenge comes in full verification as if parts of this watermarking data are corrupted. This work presents Arabic e-text watermarking supporting partial dishonesty situations benefiting from counting-based secret sharing. In this paper, we are utilizing the extension Arabic character ""Kashida" to serve for hiding the watermarking data. The process of hiding watermarking bits is considering full security, which is not to hide the secrets directly as previous references. This work uses the password to ignite counting-based secret sharing to generate the stream shares of watermarking hidden bits to be embedded. The research tests our proposed Arabic e-text watermarking approach using four existing methods of data hiding. The comparisons have been run on the Arabic benchmark of Imam Nawawi's forty hadeeth as standard text statements (40 Prophet Hadiths) indicating interesting remarkable results and promising research contributions.
引用
收藏
页码:2585 / 2609
页数:25
相关论文
共 42 条
[1]  
Aabed MA, 2007, ICSPC: 2007 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, P756
[2]  
Adnan G., 2010, Bahria University Journal of Information Communication Technology, V3, P68
[3]  
Agarwal M., 2013, International Journal of Network Security & Its Applications, V5, P91, DOI DOI 10.5121/IJNSA.2013.5107
[4]  
Ahmadoh Esraa Mohammad, 2015, Lecture Notes on Information Theory, V3, P42, DOI 10.18178/lnit.3.1.42-47
[5]   Security enhancement of shares generation process for multimedia counting-based secret-sharing technique [J].
Al-Ghamdi, Maimoona ;
Al-Ghamdi, Manal ;
Gutub, Adnan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (12) :16283-16310
[6]  
Al-Juaid N.A., 2018, J Inf Secur Cybercrimes Res (JISCR), V1, P8, DOI [10.26735/16587790.2018.006, DOI 10.26735/16587790.2018.006]
[7]  
Al-Nofaie S., 2016, J COMPUT SCI COMPUTA, V6, P59, DOI 10.20967/jcscm.2016.03.004
[8]  
Al-Nofaie S., 2016, P 3 INT C MATH SCI C, P38
[9]   Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces [J].
Al-Nofaie, Safia ;
Gutub, Adnan ;
Al-Ghamdi, Manal .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (08) :963-974
[10]  
Al-Qurashi A., 2018, J COMPUTER SCI COMPU, V8, P87, DOI [10.20967/jcscm.2018.04.006, DOI 10.20967/JCSCM.2018.04.006]