Concise analysis of current text automation and watermarking approaches

被引:16
作者
Alkawaz, Mohammed Hazim [1 ]
Sulong, Ghazali [2 ]
Saba, Tanzila [3 ]
Almazyad, Abdulaziz S. [4 ,5 ]
Rehman, Amjad [4 ]
机构
[1] Management & Sci Univ, Fac Informat Sci & Engn, Shah Alam, Selangor, Malaysia
[2] Univ Teknol Malaysia, Fac Comp, Johor Baharu, Johor, Malaysia
[3] Prince Sultan Univ, Coll Comp & Informat Sci, Riyadh 11586, Saudi Arabia
[4] Al Yamamah Univ, Coll Comp & Informat Syst, Riyadh 11512, Saudi Arabia
[5] King Saud Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
关键词
watermarking; content authentication; copyright; information security; text document image; DIGITAL WATERMARKING; CLASSIFICATION; IMAGES; MARKING; ONLINE; SCHEME;
D O I
10.1002/sec.1738
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With ceaseless utilization of web and other online advances, it has turned out to be amazingly simple to imitate, discuss, and convey digital material. Subsequently, confirmation and copyright assurance issues have been emerged. Text is the most widely used media of communication on the web as compared with images and videos. The significant part of books, daily papers, websites, commercial, research papers, reports, and numerous different archives are just the plain text. Therefore, copyrights protection of plain text is a critical issue that could not be accepted at all. This paper presents a concise analysis on information hiding techniques and their consequences. Various watermarking systems properties are highlighted along with different types of attacks and their possible defenses. Additionally, the current applications for text document watermarking and the reasons for the problems of text document watermarking are described. Finally, attacks characteristics are discussed including types of attacks, volumes, and nature on text. Current watermarking approaches are reviewed in depth, and consequently, their advantages and weaknesses are highlighted. Copyright (C) 2017 John Wiley & Sons, Ltd.
引用
收藏
页码:6365 / 6378
页数:14
相关论文
共 99 条
  • [1] Machine aided malaria parasitemia detection in Giemsa-stained thin blood smears
    Abbas, Naveed
    Saba, Tanzila
    Mohamad, Dzulkifli
    Rehman, Amjad
    Almazyad, Abdulaziz S.
    Al-Ghamdi, Jarallah Saleh
    [J]. NEURAL COMPUTING & APPLICATIONS, 2018, 29 (03) : 803 - 818
  • [2] Data Hiding Based on Improved Exploiting Modification Direction Method and Huffman Coding
    Ahmad, Ali
    Sulong, Ghazali
    Rehman, Amjad
    Alkawaz, Mohammed
    Saba, Tanzila
    [J]. JOURNAL OF INTELLIGENT SYSTEMS, 2014, 23 (04) : 451 - 459
  • [3] An innovative technique for contrast enhancement of computed tomography images using normalized gamma-corrected contrast-limited adaptive histogram equalization
    Al-Ameen, Zohair
    Sulong, Ghazali
    Rehman, Amjad
    Al-Dhelaan, Abdullah
    Saba, Tanzila
    Al-Rodhaan, Mznah
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2015, : 1 - 12
  • [4] Al-Haj AM, 2010, ADV TECHNIQUES MULTI
  • [5] Detection of copy-move image forgery based on discrete cosine transform
    Alkawaz, Mohammed Hazim
    Sulong, Ghazali
    Saba, Tanzila
    Rehman, Amjad
    [J]. NEURAL COMPUTING & APPLICATIONS, 2018, 30 (01) : 183 - 192
  • [6] Amano T., 1999, Proceedings of the Fifth International Conference on Document Analysis and Recognition. ICDAR '99 (Cat. No.PR00318), P91, DOI 10.1109/ICDAR.1999.791732
  • [7] [Anonymous], 2011, INT J INNOV COMPUT I
  • [8] [Anonymous], DISAPPEARING CRYPTOG
  • [9] Atallah M. J., 2001, Proceedings New Security Paradigm Workshop, P51
  • [10] Atallah M. J., 2001, Information Hiding, P185