Concise analysis of current text automation and watermarking approaches

被引:16
作者
Alkawaz, Mohammed Hazim [1 ]
Sulong, Ghazali [2 ]
Saba, Tanzila [3 ]
Almazyad, Abdulaziz S. [4 ,5 ]
Rehman, Amjad [4 ]
机构
[1] Management & Sci Univ, Fac Informat Sci & Engn, Shah Alam, Selangor, Malaysia
[2] Univ Teknol Malaysia, Fac Comp, Johor Baharu, Johor, Malaysia
[3] Prince Sultan Univ, Coll Comp & Informat Sci, Riyadh 11586, Saudi Arabia
[4] Al Yamamah Univ, Coll Comp & Informat Syst, Riyadh 11512, Saudi Arabia
[5] King Saud Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
关键词
watermarking; content authentication; copyright; information security; text document image; DIGITAL WATERMARKING; CLASSIFICATION; IMAGES; MARKING; ONLINE; SCHEME;
D O I
10.1002/sec.1738
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With ceaseless utilization of web and other online advances, it has turned out to be amazingly simple to imitate, discuss, and convey digital material. Subsequently, confirmation and copyright assurance issues have been emerged. Text is the most widely used media of communication on the web as compared with images and videos. The significant part of books, daily papers, websites, commercial, research papers, reports, and numerous different archives are just the plain text. Therefore, copyrights protection of plain text is a critical issue that could not be accepted at all. This paper presents a concise analysis on information hiding techniques and their consequences. Various watermarking systems properties are highlighted along with different types of attacks and their possible defenses. Additionally, the current applications for text document watermarking and the reasons for the problems of text document watermarking are described. Finally, attacks characteristics are discussed including types of attacks, volumes, and nature on text. Current watermarking approaches are reviewed in depth, and consequently, their advantages and weaknesses are highlighted. Copyright (C) 2017 John Wiley & Sons, Ltd.
引用
收藏
页码:6365 / 6378
页数:14
相关论文
共 99 条
  • [21] Dittmann J., 2001, IEEE Multimedia, V8, P54, DOI 10.1109/93.959103
  • [22] Writers Identification Based on Multiple Windows Features Mining
    Fadhil, Murad Saadi
    Alkawaz, Mohammed Hazim
    Rehman, Amjad
    Saba, Tanzila
    [J]. 3D RESEARCH, 2016, 7 (01):
  • [23] Attribute-Based Encryption for Circuits
    Gorbunov, Sergey
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    [J]. JOURNAL OF THE ACM, 2015, 62 (06)
  • [24] Haron Habibollah, 2011, Journal of Computer Sciences, V7, P736, DOI 10.3844/jcssp.2011.736.743
  • [25] Online Persian/Arabic script classification without contextual information
    Harouni, M.
    Rahim, M. S. M.
    Al-Rodhaan, M.
    Saba, T.
    Rehman, A.
    Al-Dhelaan, A.
    [J]. IMAGING SCIENCE JOURNAL, 2014, 62 (08) : 437 - 448
  • [26] Multimedia watermarking techniques
    Hartung, F
    Kutter, M
    [J]. PROCEEDINGS OF THE IEEE, 1999, 87 (07) : 1079 - 1107
  • [27] Iterative adaptive subdivision surface approach to reduce memory consumption in rendering process (IteAS)
    Husain, N. A.
    Rahim, M. S. M.
    Khan, A. R.
    Al-Rodhaan, Mznah
    Al-Dhelaan, Abdullah
    Saba, T.
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2015, 28 (01) : 337 - 344
  • [28] Automated nuclei segmentation of malignant using level sets
    Husham, Ahmed
    Alkawaz, Mohammed Hazim
    Saba, Tanzila
    Rehman, Amjad
    Alghamdi, Jarallah Saleh
    [J]. MICROSCOPY RESEARCH AND TECHNIQUE, 2016, 79 (10) : 993 - 997
  • [29] Fused features mining for depth-based hand gesture recognition to classify blind human communication
    Jadooki, Saba
    Mohamad, Dzulkifli
    Saba, Tanzila
    Almazyad, Abdulaziz S.
    Rehman, Amjad
    [J]. NEURAL COMPUTING & APPLICATIONS, 2017, 28 (11) : 3285 - 3294
  • [30] A Review of Digital Watermarking Techniques for Text Documents
    Jalil, Zunera
    Mirza, Anwar M.
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY, PROCEEDINGS, 2009, : 230 - 234