Content authentication and tampering detection of Arabic text: an approach based on zero-watermarking and natural language processing

被引:0
作者
Anwer Mustafa Hilal
Fahd N. Al-Wesabi
Manar Ahmed Hamza
Mohammed Medani
Khalid Mahmood
Mohammad Mahzari
机构
[1] Prince Sattam Bin Abdulaziz University,Department of Computer and Self Development, Preparatory Year Deanship
[2] King Khalid University,Department of Computer Science, College of Science and Arts at Muhayel
[3] Sana’a University,Faculty of Computer and IT
[4] King Khalid University,Department of Information Systems, College of Science and Arts at Muhayel
[5] Prince Sattam Bin Abdulaziz University,Department of English, College of Science & Humanities
来源
Pattern Analysis and Applications | 2022年 / 25卷
关键词
Alphanumeric mechanism; Hidden Markov model; Zero-watermarking; Text analysis; Content authentication; Tampering detection;
D O I
暂无
中图分类号
学科分类号
摘要
Due to the rapid increase in exchange of text information via internet network, the security and the reliability of the digital content has become a major research issue. The main challenges faced by researchers are content authentication, integrity verification and tampering detection of digital contents. In this paper, these issues are addressed with great emphasis on text information, which is natural language dependent. Hence, a novel intelligent zero-watermarking approach is proposed for content authentication and tampering detection of Arabic text contents. In the proposed approach, both the embedding and extracting of the watermark are logically implemented, which causes no change on the digital text. This is achieved by using fourth-level-order and alphanumeric mechanism of Markov model as a soft computing technique for the analysis of Arabic text to obtain the features of the given text which is considered as the digital watermark. This digital watermark is later used for the detection of any tampering attack on the received Arabic text. An extensive set of experiments using four datasets of varying lengths proves the effectiveness of the proposed approach in terms of robustness, effectiveness and applicability under multiple random locations of insertion, reorder and deletion attacks. Compared with baseline approaches, the proposed approach has improved performance regarding watermark robustness and tampering detection accuracy.
引用
收藏
页码:47 / 62
页数:15
相关论文
共 72 条
[41]  
Rahma AMS(undefined)undefined undefined undefined undefined-undefined
[42]  
Al-maweri NAA(undefined)undefined undefined undefined undefined-undefined
[43]  
Liu Y(undefined)undefined undefined undefined undefined-undefined
[44]  
Zhu Y(undefined)undefined undefined undefined undefined-undefined
[45]  
Xin G(undefined)undefined undefined undefined undefined-undefined
[46]  
Zhu P(undefined)undefined undefined undefined undefined-undefined
[47]  
Xiang G(undefined)undefined undefined undefined undefined-undefined
[48]  
Song W(undefined)undefined undefined undefined undefined-undefined
[49]  
Zulfiqar Ali M(undefined)undefined undefined undefined undefined-undefined
[50]  
Hossain S(undefined)undefined undefined undefined undefined-undefined