Improved capacity Arabic text watermarking methods based on open word space

被引:46
作者
Alotaibi, Reem A. [1 ,3 ]
Elrefaei, Lamiaa A. [1 ,2 ,4 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Comp Sci Dept, Jeddah, Saudi Arabia
[2] Benha Univ, Elect Engn Dept, Fac Engn Shoubra, Cairo, Egypt
[3] Taif Univ, Fac Comp & Informat Technol, Comp Sci Dept, At Taif, Saudi Arabia
[4] King Abdulaziz Univ, Female Campus,Room S109,Bldg 61,POB 80221, Jeddah 21589, Saudi Arabia
关键词
Arabic text watermarking; Capacity; Robustness; Imperceptibility;
D O I
10.1016/j.jksuci.2016.12.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital watermarking is used to protect text copyright and to detect unauthorized use. In this paper, two invisible blind watermarking methods for Arabic text are proposed. Since the pseudo-space is very small space used to force the connected characters to be isolated, it is added to the word space to hide binary bit "0" or "1". In the first proposed method, the pseudo-space is inserted before and after normal word space based on dotting feature in Arabic text. The second proposed method inserts the pseudo-space and other three small or zero width spaces to increase the capacity, where the presence of them indicates bit "1" and the absence indicates bit "0". The comparative results obtained by testing the proposed methods with some of existing watermarking methods using variable size text samples with different watermark lengths. The experiments show that the proposed methods have the highest capacity and higher imperceptibility than other watermarking techniques from the literature. The robustness of the proposed methods is tested under most of possible text attacks. They are robust against electronic text attacks such as: copying and pasting, text formatting and text tampering for tampering ratio up to 84%. (C) 2017 The Authors. Production and hosting by Elsevier B.V. on behalf of King Saud University.
引用
收藏
页码:236 / 248
页数:13
相关论文
共 16 条
[1]  
Aabed MA, 2007, ICSPC: 2007 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, P756
[2]  
Adnan G., 2010, Bahria University Journal of Information Communication Technology, V3, P68
[3]  
Alginahi Yasser M., 2014, International Journal of Computer and Electrical Engineering, V6, P381, DOI 10.7763/ijcee.2014.v6.857
[4]  
Alginahi YM, 2013, 2013 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), P301, DOI 10.1109/ICECCO.2013.6718288
[5]  
Alotaibi R.A., 2015, INT J ARTITICIAL INT, V6, P01, DOI 10.5121/ijaia.2015.6401
[6]   Utilizing Word Space with Pointed and Un-pointed Letters for Arabic Text Watermarking [J].
Alotaibi, Reem A. ;
Elrefaei, Lamiaa A. .
2016 UKSIM-AMSS 18TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 2016, :111-116
[7]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[8]  
Bennett Krista, 2004, Linguistic steganography: survey, analysis, and robustness concerns for hiding information in text
[9]  
Bensaad M. L., 2011, 2011 International Conference on Innovations in Information Technology (IIT), P433, DOI 10.1109/INNOVATIONS.2011.5893864
[10]  
Cox I, 2007, Digital watermarking and steganography