Content authentication and tampering detection of Arabic text: an approach based on zero-watermarking and natural language processing

被引:1
作者
Hilal, Anwer Mustafa [1 ]
Al-Wesabi, Fahd N. [2 ,3 ]
Hamza, Manar Ahmed [1 ]
Medani, Mohammed [4 ]
Mahmood, Khalid [4 ]
Mahzari, Mohammad [5 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Dept Comp & Self Dev, Preparatory Year Deanship, Alkharj, Saudi Arabia
[2] King Khalid Univ, Coll Sci & Arts Muhayel, Dept Comp Sci, Abha, Muhayel Aseer, Saudi Arabia
[3] Sanaa Univ, Fac Comp & IT, Sanaa, Yemen
[4] King Khalid Univ, Coll Sci & Arts Muhayel, Dept Informat Syst, Abha, Muhayel Aseer, Saudi Arabia
[5] Prince Sattam Bin Abdulaziz Univ, Coll Sci & Humanities, Dept English, Alkharj, Saudi Arabia
关键词
Alphanumeric mechanism; Hidden Markov model; Zero-watermarking; Text analysis; Content authentication; Tampering detection; PRIVACY PROTECTION; INTEGRITY; ALGORITHM;
D O I
10.1007/s10044-021-01032-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to the rapid increase in exchange of text information via internet network, the security and the reliability of the digital content has become a major research issue. The main challenges faced by researchers are content authentication, integrity verification and tampering detection of digital contents. In this paper, these issues are addressed with great emphasis on text information, which is natural language dependent. Hence, a novel intelligent zero-watermarking approach is proposed for content authentication and tampering detection of Arabic text contents. In the proposed approach, both the embedding and extracting of the watermark are logically implemented, which causes no change on the digital text. This is achieved by using fourth-level-order and alphanumeric mechanism of Markov model as a soft computing technique for the analysis of Arabic text to obtain the features of the given text which is considered as the digital watermark. This digital watermark is later used for the detection of any tampering attack on the received Arabic text. An extensive set of experiments using four datasets of varying lengths proves the effectiveness of the proposed approach in terms of robustness, effectiveness and applicability under multiple random locations of insertion, reorder and deletion attacks. Compared with baseline approaches, the proposed approach has improved performance regarding watermark robustness and tampering detection accuracy.
引用
收藏
页码:47 / 62
页数:16
相关论文
共 35 条
[1]  
Ahmed H., 2016, INT J COMPUTING INFO, V12, P243
[2]  
Ahmed R., 2015, International Journal of Artificial Intelligence & Applications, V6, P1, DOI DOI 10.5121/IJAIA.2015.6401
[3]  
Ahvanooey Milad Taleby, 2018, IEEE DATAPORT, P10
[4]  
Al-Maweri N.A.S., 2016, INDIAN J SCI TECHNOL, V9, P1, DOI DOI 10.17485/ijst/2016/v9i48/87787
[5]  
Al-Wesabi F. N., 2013, INT J COMPUT ENG TEC, V4, P284, DOI DOI 10.24297/IJCT.V4I2A2.3173
[6]  
Alginahi Yasser M., 2014, International Journal of Computer and Electrical Engineering, V6, P381, DOI 10.7763/ijcee.2014.v6.857
[7]  
ALI MZ, 2018, IEEE ACCESS
[8]   Chaos-based robust method of zero-watermarking for medical signals [J].
Ali, Zulfiqar ;
Imran, Muhammad ;
Alsulaiman, Mansour ;
Shoaib, Muhammad ;
Ullah, Sana .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 88 :400-412
[9]   A zero-watermarking algorithm for privacy protection in biomedical signals [J].
Ali, Zulfiqar ;
Imran, Muhammad ;
Alsulaiman, Mansour ;
Zia, Tanveer ;
Shoaib, Muhammad .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :290-303
[10]   Improved capacity Arabic text watermarking methods based on open word space [J].
Alotaibi, Reem A. ;
Elrefaei, Lamiaa A. .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2018, 30 (02) :236-248