You are on page 1of 10

Text Watermarking Techniques

Mehboob Nazim Shehzad, Najam-Ul-Sahar


mehboobfraz85@gmail.com,info.mehboob@gmail.com

Department of Computing and Technology


Iqra University Islamabad Campus

Abstract:
Now a day's all the information is available on internet but the problem is that" information is not
secure from threats like reuse ,plagiarism etc ".According to our research we have noted that alot
of work is done on audio, video, image but less work have been done on text watermarking . Due
to the less work on text watermarking the data is not secure and every other person is using the
data for their purpose. For overcoming this problem watermark have to be embedded on text. Many
researchers have worked on embedding watermark on text through different techniques. We have
survey on: 1) Application of text watermarking 2) Possible Attacks on text 3) Issues in Techniques
of text watermarking 4) Classifications of text watermarking.
Key Words: Text watermarking, Text watermarking Classification, Copyright Protection, fingerprinting, watermark,
information Security.

1. Introduction
In today's digital world , text is the most
widely used medium of communication in the
Internet or intranet. Internet and intranet is full
of information. Information is based on text.
And now a day's text is not secure. For
securing text a scheme is used which is known
as watermark. Watermark is a process of
preventing text from being copied and it also
shows that text is authentic. Watermark is
embedded on data, so data is in different
forms like text, audio's, image, video's. In
recent years, many work have been done for
Video`s, images, audio`s but the main point is
that insufficient works is done on text.
So the problem is known that text have not
been secured properly. For protecting text
from different threats we have to embed
watermark in text. The processes which have
been used for text is same for
image,video,audio and text.

extracting or data securing. Many others are


used for proper authentications [10] and now,
for steganography [1].
Text depend upon data securing schemes in
the digital area
can
be divided into
algorithm`s or Seagram and open codes [4].
Seagram embeds load, it means the change
the formatting and layout the data
representation for common use (e.g., one
gape word 1 and more than 1 space`s
character`s
0) [1].In other space
schemes [8] is one of the newts time of
text
Seagrams. Therefore other Seagram
approaches could be found [1].
Change pictures with our new methods.

Many techniques are used for securing the


information. However in recent years
various multimedia and text contents are
utilized as the user to pay the payment [7],
plain text is an urgent choice of user for its
practical reality in the digital area. Legally and
illegally, there are more than one data securing
schemes [9] are to be used for default data

Fig (a).
On the other hand, [5] a row divide in two
fields of text (say A and B) therefore total
spaces between words (i.e., the total amount

of pixels around two same text words) [1]


in two sets is same as it is . Spaces
between the words in each field thin or
extended so that confident situation`s are
content to encoding the information
[1].Therefore, |A |>|B| + is
forced to
embedded 1, and inversely propositionally,
and B is the total number of word spaces in
set B and > 0. In [3] more progress this
work by using multistep accent method to
complete advanced transporter competence.
These differences give increase to many
scientific
challenges
in
plain
Text
watermarking as well as [1].
So that text watermarking techniques should
insert private and invisible watermarks in plain
text documents which remain complete after
varied tamper attacks of placing, removal and
changing the formatting. Data can be checked
for text privacy and copyright protection.
There are three different types of techniques to
use for the security purpose and provide
solutions for the threats that can be create by
attackers .These techniques are watermarking,
cryptography and steganography. In which
data may be in any form like audio, video,
image and text.

2. Application of Text Watermark


Therefore text data is more flat to be
performed that create many issues in copyright
process. Now a day's everything works
according to law so that copyright rules and
laws are very necessary to the worldwide. So
that there are many different copyright
authentications users for example RIAA,
BCPLAW, MPAA, WIPO, ACTA, TRIPS [4,
5, 6, 7, 8, 9, 10, and 11].
For the time being plain text watermarking
also can be used for large number of real
applications in the world. With the increasing
and general use of Internet all over the world
for information sharing, text watermarking has
gained more importance.
The applying
different concepts of digital libraries, business,
learning, and government, books, has made
plain text watermarking is needed [2]. Legal

documents, certificates, web sites, company


documents, confidential contents, official
SMS, and emails, can be protected by plain
text marking algorithms. However text
watermarking can be used for a number of
purposes, including:

2.1. Authentication
In this case, fragile watermarks can be used to
detect any tampering of a Plain text document.
If watermark is detected, the plain text
document may be genuine; if not, the text has
been tampered and cannot be considered [2].
It is very necessary to authenticate text,
especially when using for officially authorized
purposes. In a sensitive communication e.g.
in defence application and in business
communication, it is very important to
authenticate,
check
reliability
and
completeness of the text data.

2.2. Copyright Protection


For the copyright protection, It is very
necessary to protect copyrights of web
contents, e-books, research papers, journal
articles and other documents containing plain
text. The content owner can embed a
watermark representing copyright information
of his data. Copyright protection depends upon
ownerships.
i)

Single Ownership

In this process a single secure key is for the


owner of data and watermark is embedded to
be able to be detected with the help of given
secure key from the owner.
ii)

Combine Ownership

According to the using watermarking schemes


[14], all the owners of copyright protections
have the same key that may be used for
ownership identify.

2.3. Fingerprinting:
Many times author or owner have the secure
key copy and gave many users for the data
securing. For the owner, embedding a secure
serial key like watermark is a way to detect the
breaker or illegal user who break their secure

key by copying the protected data and


supplying it to a multiples party [2].In
comparison
of
watermarking
and
fingerprinting, the basic aims of fingerprinting
to identify is to attacks that become reason and
clearly define the principal to be clearly
identify as a attackers. Therefore some work
also has been done in fingerprinting approach
in the context of many fields of data securing.

2.4. Tamper Detection and Recovery


In fact, weak or not secure watermarking
approach, applying the watermark should be
fragile to change the setting or modifications
so that as to perceive and focus or even retain
the
modifications.
Therefore
fragile
watermarking approaches is used for interfere
detection and recovery the watermark [18].

3. Attacks on Text:
In computer network world
is not much
excited about text watermarking technologies.
The main reason is to disclose watermarking
techniques and lack of strength on the way to
attacks. So that it is achievable for an attacker
to achieve one-sided attacks still if they are not
competent to do it finally. So it is necessary to
comparison each type of attacks. Watermark
common attacks are described as follows:

3.1.1 Types:
First of all common word use in attacks is
type. Because there are many types of securing
the data and also attackers attack on these
types. So that important attacks can be
describe in following categories:

3.1.2. Unauthorized attacks:


In this form of attacks many attacker to
add new text in other form of type. Some
time attacker add more information in
original data then these types of attacker
break the rule of authentication and
illegally add additionally information in
the documents. So that copyright
protection timestamp is used to identify the
owner of the content first. These attacks
can be avoided by using the authority of
owner by the author signature or
watermarked.

3.1.3Unauthorized Detection
Some time attackers also detect the
watermarked with some useable techniques
and change the information according to your
requirements.

3.1.4. Unauthorized Deletion


According to this types of attack attackers can
be delete the watermarked or some
information from the original documents. In
this case it is very important to block this type
of attacker to do this process and use not
removable watermarked.

3.1.5. Re-ordering
Other important types of attack are to re
order the information and some time
replaces the important words with other
words or using the synonyms. Due to this
process also change the meaning of all
informations.
3.2. Low and High Volume
Now the levels of attackers also define
here. Two types of level are classified:
Low level creates when the attackers
unauthorized add or unauthorized Delete
some information to and from the
attackers. Other then level is define as
when the attacker want some part of text
using as own data is called high level.
3.3. Brute Force Attack:
In this types of attack, attacker attack on
the private secure key by using the all
types of words and characters. This attack
can be taken much time to break the
watermarked key.
4. Text Watermarking Issue`s
There are many types of issues for the text
watermarking now a days but the main
problems are discuss here:
Plain text is a simplest way of informations
but in case of security it has many challenges

when it use for sending or receiving data on


the behalf of copyright protection. In the point
of capacity of text watermarking has limited
for watermark embedded in text as can be
detect in images, video and audio. According
to the using of the spacing and changing the
background, style and plain text approaches
rules are some of necessary features of plain
text there are necessary to be define in any
plain text watermarking approaches[4].
Many other properties of the algorithms like
security, Robustness also are necessary to be
satisfied. Any changing on text should be
protecting the meaning, grammars rules and
the text values. Therefore confidence is more
need to show the Plain text in a clear, easier
way and also more importantly in technical
writings.

Figure (b) Text Watermarking Solutions

5. Classification

of

Watermarking:
There are two main classifications points of
watermarking are:

Oblivious and non oblivious:

According to requirements of the copyright


protection and owners of original data extract
from the default informations.
i)

Oblivious/unaware:

In this process watermarking schemes are


not required the original image or data for
watermark extraction.
ii)
Non-oblivious/awareness:
In this case watermarking schemes are
required the original image or data for
watermark extraction.

6. Watermarking Techniques
Many techniques of text watermarking have
been proposed in the past .These techniques
use as Text watermarking image as a text,
meaning change, assumption based, Verb and
noun and pronoun based, sentence and word
short form , misprint error etc. Therefore, we
can broadly classify the previous work on
digital text watermarking in the following
categories; an image based approach, a
syntactic approach, and a semantic approach.
6.1. Bit Level Watermarking

According to these techniques some


bit level or attributes have unique
values. These bit level and values
are determined with a secure key
known only to the author of the
information or data concentrate
along its primary key. These bit
levels contain the watermark. The
watermark can be detected with the
help of finding the secure key. If
some find the secure key of
watermark then attacker or finder
the secure key can be easily add or
remove data or informations.
In [6] the solution with the help of
user input a location to the text to be
copyright protection. A watermark
can be apply as a copyright
protection with a secure key to
protect the applying and a part of
text contain to be insert in the
results.
Watermark
applying
is
making of two parts: According to
first step input data make into two
parts than the second step encoding
method apply on each bit of
watermark parts. The algorithms
purposed here prove to be flexible to
significant types of attacks, including
division step selection, linearly data
changes and add or remove random
selection
or
alterations.
In
performing
the
necessary
step
changing as rewarding the given
usage points is one of the enduring
challenges. From this process, the
algorithm applying the ancient
watermarking step and then small
points of steps for data using with
deference to the using points.

A. Spread Spectrum
In which bits (a) of watermark are
combine with a Noise of PRN (pseudo
Random Noise). Now that generated
signal and this noise signal pass through
from host signal (s).So that the signal from
the PRN likes a secret key.
The host amplitude greater then of
watermarked signal amplitude about
1%.For the detection of PRN signal by the
math filter and correlation receiver.
B. Line Shift Coding:
In this coding scheme shifted the even line
up or down by the bit value in payload
[7].There are two bit value for shifted the
line, if bit is one then line shift to up and 0
bit shift the line down. Remaining odd
lines use as a control lines and decoding.
C. Word Shifting:.
In this schemes each line of sentences is
divided into words groups. Every group
has a enough number of words and
characters. In this process even group
shifted to right or left as a bit value set in
the pay load and remaining odd groups
used as measuring and comparing the
distances between the groups of word.
D. Feature Coding:
According to this approach changing the
text features in a precise way to select the
bit value in payload. After embedded the
watermarked we can achieved by
comparing the original document with
watermarked document [8].
Feature coding apply on the text in real
life. There are three steps in (a) original
data. In (b) Selected the words for
applying the feature coding. In last step
applying the feature coding on the selected
word [8].
E. Character spacing

F.

According to this scheme other purposely,


create a spaces between words of text lines
to watermark a text data. In this process of
encoding scheme a space between words
in text document. These spaces between in
words of different lines show the features
of sine wave and all the information's
stored in sine wave.
Synonym:

In
this
process
of
watermarking is change the

word where the information


hidden
in
the
text
document. The advantage
of this method is securing
the information's in sense of
retyping and copy pate
system. From this method
fully changed the meaning
of words.
6.2. Text as Image based Approach:

According to this techniques of digital text


watermarking, text document as a image is
used to applying the watermark [8]. Plain
text is very difficult to watermark because
of its ease, securing, and low capacity for
watermark applying. Firstly applying in plain
text watermarking used to operate text as a text
image. Watermark was applying in the layout
and background of appearances of the text
images.
In [9-11] researcher proposed techniques to
watermark plain text by using image as text. In
the history of approaches, Brassil was the first
method proposed line shift coding algorithm
which one changes the document image by
every type of pattern like the upward or
downward and also alignment changing of the
data depending on bit level.

The second one algorithm approach


was inter-word shifting. In this
process of algorithm can be change
the text horizontally to applying the
watermarked. This algorithm can be
performs in both modes of blind and
non blind. The featuring of another
third approaches is coding algorithm
[3].In this algorithm modifies the
features as pixel of words, changing
in length of lines and applying the
watermark bits level in the plain text.
According to all three techniques
block the attacks from the attackers
by applying the watermarked with
securing key [3].The most using the
algorithm like inter-word algorithm
solution under the many attacks but
it also can be break it.

Maxemchuk, et al. [13] [14] [15]


analysed the show of the above
represents the methods.
The
relationship and other techniques is
centroid based [16] these are also
optional which operate Text file is
a digital signal of time and see in
length of word shift and the uses
of differences between
centroid
and next plain text file blocks for
determine
the
as a watermark
correspondingly. Low, et al. [16][17]
more comparison the competence of
the different approaches.
In [17] proposed another algorithm
spaces word distance in every
sentence of the paragraphs. The
distances between the words are as
to the wave of sign wave in digital
system of an explicit period and
occurrence. In quality and the pixel
points rank algorithms were also
residential
which
spot the plain
text documents by changing the
blow quality such as girth [18].
Algorithm which defines the gray
range image of text was also
residential
[19].
One
more
approached which watermarked plain
text document as an image using
border track histogram was also
purposed [20].
In [23] optional
a
novel
idea
depend upon
an
intellectual
programming scheme in the fields
of text watermarking which has no
big effect on the changing of the
syntax of the document and the
appearance. So that the providing a
format self-determining technique in
which information within the text is
describe to hide certain information.
In [22]
purposed a text
watermarking scheme point out from
an object based situation. Solution of
the watermarking also define the
new concept of watermarking an
object based on text document
where each and every text thread
is introduced as a break up object
having its own set of properties.

6.3. Statistical Watermarking

In [13] author proposed algorithm in


hides the watermark information in
the mostly ignored 'time' feature of
the database. The 'Time' features
exit by defaulting, but in many
applications they are not used. For
the specific, the 'Date' features in
databases are made of two fields:
'Time' and 'Date'. Researcher will
work on the 'Time' area which is
defined three vales: seconds, hours
and mints. Securing the information
hide
the
information
of
the
watermark in the seconds vales
should have the low effect on the
using in the database. These
applications have main advantage of
using the time featuring is the large
bit value capacity arises for not show
the watermark and so that large
watermarks can be easily hidden, if
these
situations
required.
This
process is reverse to the bit values
depend techniques where watermark
every bits values have limited
awaiting locations that can be used
to hide these information without
being subjected to deletion or
devastation.
6.4. Content Watermarking

In [9] authors purposed, new


techniques for the certain errors
produce for some digital or numeric
values or features of databases and
also securing the text documents. If
someone fined the tuple and same
situation other same tuple find in
marked then this condition says the
same tuple. Then combined the total
ratio of match tuple in detection
values and also text documents as a
relational data bases again selected
can be used to confirm the
watermark
for
the
copyright
protections.
Watermarking
approaches is not associated with
the tuples and secure key. It has
sufficient rightness, possibility and
strength to prevent to copyright
protections.

In [10] researcher proposed, a novel


watermarking algorithm for scholar
assets rights (SAR) protection for
relational
data
and
the
text
documents.
This
approach
of
mechanism is get to choose a best
possible applying scheme for each
documents files according to its data
description based on also define or
general
several
fundamental
schemes main aim at making warp of
the watermarked data to be smallest.
In sense of error correcting and the
other many techniques are applying
to improve the watermarking of
robustness.
6.5. Cluster Watermarking

In [8] researcher proposed a cluster


watermarking.
In
this
process
clustering
code
used
for
the
watermarking and for the detection
the watermark with the help of result
of clustering. In this we can more
secure information of the watermark.
In this paper a new methodology
introduce like odd and even. From
this
techniques
modifying
the
original data and more securing.
6.6 Text Steganography

There are many approaches are


define for the text steganography.
In which popular approaches are
classifies

like

generate

the

random words, changing the look


of

original

words),tags,and

words

(reverse

modifying

the

data attribute.
6.7. Other Approaches

There are many other approaches


also introduce many techniques for
the copyright protection including:
In [6] author solve the main problem
of ownership and unauthorized data
copy for the text documents and also
relational data bases. There are main

three approaches are used to


prevent, determine, and tracing back
data out from the documentations.
here are many process like business
scenarios are used as the expressive
use case, but the main point is to
secure the information with same
techniques when these information
sharing with each other parties and
other one.
In
[14]
author
purposed,
an
algorithm joint ownership copyright
protections.
According
to
this
techniques divide the original data in
two parts and the securing with a
key individually. There are two main
points that decide the number of
parts wants to be recovering the
original data. In [16] a theoretical
skeleton for relational database
based
on
covert
contribution
technology is projected. The main
covert is out of order into several
parts and is unseen on your own in a
relational database. The method
using of LaGrange, interpolating,
polynomial techniques to recover the
original data with securing key. In
[17] new techniques introduce, a
fragile watermarking scheme to
confirm the veracity of a plain text
documents and recuperate the right
database is proposed. There are all
tuples in a plain text documentations
are first divided into parts with using
a covert key. Then watermarking
applying in division parts and then
verifies the watermark.
In [16] author main focus to improve
the localization correctness of fragile
folder watermark. A novel fragile
watermarking scheme is planned for
relational databases by summarizing
the order and parts information
between plain text documents. If the
combining row securing signature
with quality signature in interfere
localization, tampered part can be
points at the segment level. In this
scheme no extra space required and
also not required any space to the
plain text original data.

7. Types of Watermarking Techniques

There are two main types of data


securing from the hackers and
attackers. First one is Public and
other one is Private so that much
work done on this techniques.The
description of work done in each
techniques and approaches of text
watermarking is as follows:
There are many other existing
watermarking techniques [18] are
private, it means that they are
depend on some private variables
like the secure key. For this process
only the selected peoples who have
the secure key from the owner are
competent to confirm the watermark
and show their ownership of the text
in case of any unlawful redeployment
etc.
Therefore,
in
private
watermarking techniques experience
from description of the private
variables to alter people once the
watermark is confirmed in being
there of the public. In the access of
private parameters, attackers can
without
difficulty
overthrow
watermark finding any by removing
watermarks from the confined data
or by calculation a false watermark
to the not watermarked data.
In other case of public watermarking
techniques [8] any user can confirm
the applying watermark as many
times as need lacking having any
earlier information about any of the
private parameters to certify that
they are using accurate data coming
from the original part. Such as, when
a user uses aware information such
as marking rates and currency
exchange, so that it is very important
for us to certify that the data are
correct and coming from the original
part.

image is not robust against replica.


There are many Attacks and also
have limited application on the data.
We describe all types of application
and Attack and main classify all the
techniques based on image based,
content based, cluster Watermarking.
Finally, we observe that the previous
algorithms of the approaches are
computationally pricey and non
robust. Plain text facing huge
insertion, deletion and reordering
attacks need to be protect from the
attacker,
and
competent
text
watermarking
algorithms
are
required to the protect the security.
References:
[1 KokSheik Wong, Kok Onn Chee Lip Yee Por,
] "UniSpaCh: A text-based data hiding method using

Unicode space characters," The Journal of Systems


and Software, pp. 1-8, December 2011.

[2 Zunera Jalil, "Copyright Protection of Plain Text,"


] FAST National University of Computer and Emerging
Sciences, Islamabad, A thesis submitted in partial
fulfillment of the requirements for the degree of
Doctor of 2010.

[3] X. Zhou, W. Zhao, Z. Wang, and L. Pan, Security


theory and attack analysis for text watermarking, in
Proceedings of International Conference on EBusiness and Information System Security,(EBISS 2009),
May 2009, pp. 1-6.

[4] M. Topkara, G. Riccardi, D. Hakkani-Tur, and


M. J. Atallah, Natural language watermarking:
Challenges in building a practical system,
Proceedings of the SPIE International Conference on
Security, Steganography, and Watermarking of
Multimedia Contents, San Jose, CA, Jan. 2006.

[5] J. T. Brassil, S. Low, N. F. Maxemchuk, and L. O.


Gorman, Electronic Marking and Identification
Techniques to Discourage Document Copying, IEEE
Journal on Selected Areas in Communications, vol. 13,
no. 8, pp. 1495-1504, 1995.

8. CONCLUSION

[6] J. T. Brassil, S. Low, N. F. Maxemchuk, L. O.

In this paper we conclude the


existing state of the drawing of
unlike watermarking techniques for
Text data. In this field of copyright
protection work done is very limited
and explicit. Plain text watermarking
algorithms used as digital text as an

[7] N. F. Maxemchuk and S. Low, Marking text

Gorman, Hiding information in document images, in


Proceedings of the 29th Annual Conference on
Information Sciences and Systems, Johns Hopkins
University, 1995, pp 482-489.

documents, in Proceedings of the IEEE International


Conference on Image Processing, Washington, DC,
Oct. 1997, pp. 13-16.

[8 M.Anwar Mirza ,Zunera Jalil, "A Review of Digital


] Watermarking Techniques for Text Documents," in
International Conference on Information and
Multimedia Technology, Islamabad,2009, pp. 1-5.

[9] A. Khan and Anwar M. Mirza, Genetic


Perceptual Shaping: Utilizing Cover Image and
Conceivable Attack Information Using Genetic
Programming, Information Fusion, vol. 8, no. 4, pp.
354-365, 2007.
[10] A. Khan, Intelligent Perceptual Shaping of a
digital Watermark, PhD Thesis, Faculty of Computer
Science and Engineering, GIK Institute, Pakistan, 2006.

[19] A. Bhattacharjya and H. Ancin, Data


embedding in text for a copier system,Proceedings of
the 1999 International Conference on Image Processing
(ICIP), vol. 2, 1999, pp. 245-249.

[20] Y. Kim, K. Moon, and S. Oh, Watermarking text


document images using edge direction histograms,
Pattern Recognition Letters, Elsevier. vol. 25, pp. 12431251, 2004.
[21] Y. Kim, K. Moon, and I. Oh, A text
watermarking algorithm based on word classification
and inter-word space statistics, in Proceedings of
the Seventh International Conference on Document
Analysis and Recognition (ICDAR), vol. 2, Aug. 2003,
pp. 775-779.

Gorman, Electronic Marking and Identification


Techniques to Discourage Document Copying, IEEE
Journal on Selected Areas in Communications, vol. 13,
no. 8, pp. 1495-1504, 1995.

[22] M. Abdullah and F. Wahab, Key based text


watermarking of e-text documents in an object based
environment using z-axis for watermark embedding,
World Academy of Science, Engineering and Technology,
vol. 46, 2008, pp. 199-202.

[12] J. T. Brassil, S. Low, and N. F. Maxemchuk,

[23] M. A. Qadir and I. Ahmad, Digital text

Copyright protection for the electronic distribution of


text documents, in Proceedings of the IEEE, vol. 87, no.
7, 1999, pp.1181-1196.

watermarking: secure content delivery and data hiding


in digital documents, IEEE Aerospace and Electronic
Systems Magazine, vol. 21, no. 11, 2006, pp. 18-21.

[13] N. F. Maxemchuk and S. Low, Marking text

[24] X. Zhou, W. Dong, Z. Wang, and G. Wei,

documents, in Proceedings of the IEEE International


Conference on Image Processing, Washington, DC,
Oct. 1997, pp. 13-16.

Zero-watermarking algorithm for content


authentication of Chinese text
documents, Journal of
Computers, vol. 20, no. 1, 2009.

[14] N. F. Maxemchuk, S. H. Low, Performance

[25 Shantanu Pal,Agostino Cortesi,Raju Halder,


] "Watermarking Techniques for Relational

[11] J. T. Brassil, S. Low, N. F. Maxemchuk, and L. O.

Comparison of Two Text Marking Methods, IEEE


Journal of Selected Areas in Communications (JSAC),
vol. 16, no. 4, pp. 561-572, 1998.

[15] N. F. Maxemchuk, Electronic Document


Distribution, AT&T Technical Journal, vol. 6, Sept.
1994, pp. 73-80.

[16] S. H. Low, N. F. Maxemchuk, and A. M.


Lapone, "Document identification for copyright
protection using centroid detection," IEEE
Transactions on Communications, vol. 46, no.3, March
1998, pp 372-381.

[17] S. H. Low and N. F. Maxemchuk, Capacity of


text marking channel, IEEE Signal Processing Letters,
vol. 7, no. 12, pp. 345 -347, Dec. 2000.

[18] T. Amano and D. Misaki, "A feature


calibration method for watermarking of document
images," Proceedings of the Fifth International
Conference on Document Analysis and Recognition
(ICDAR), 1999, pp.91-94.

Databases:Survey, Classification and Comparison,"


Journal of Universal Computer Science, vol. 16, no.
3164-3190, pp. 1-27, December 2010.

[26] Shingo INOUE, Kyoko MAKINO, Ichiro


MURASE , Osamu TAKIZAWA, Tsutomu MATSUMOTO,
Hiroshi NAKAGWA A Proposal on Information Hiding
Methods using XML, Mitsubishi Research Institute,
Inc., Communication Research Laboratory, Yokohama
National University and The University of Tokyo x

[27]

Mohammad LahcenBenSaad and Sun


XingMing Techniques with Statistics for web Page
Watermarking, World Academy of Science, Engineering
and Technology 11, 2005

[28]

Qijun Zhao, Hondtao Lu, PCA-based web


page watermarking, Elsevier Science Inc., Vol. 4, 2007

[29]

Shingo, Kyoko, Ichiro, Osamu, A Proposal on


Information Hiding Methods using XML, Mitsubishi
Research Institute, Communication Research
Laboratory, Yokohama National University and The
University of Tokyo

[30]http://en.wikipedia.org/wiki/Digital_watermarking
[31]

H. Low, N. F. Maxemchuk, J. T. Brassil and L.


O'Gorman: Copyright Protection for Electronic
Distribution of Text Documents, Vol. 87, no. 9, IEEE,
1999

[32]

Young-Won Kim, Kyung-Ae Moon and II-Seok


Oh: A Text Watermarking Algorithm based on Word
Classification and Onter-word Space Statistics, IEEE
(ICDAR), 2003

[33]

Aasma, Sumbul, Asadullah: Steganography:


A New Horizon for Safe Communication through XML,
JATIT, 2008

[34]

Ala`a H., Mazin S., Mohammad A. Al Hamami:


A Proposed Method to Hide inside HTML Web Page File

[35]

J. T. Brassil, S. Low, N. F. Maxemchuk, and L.


O. Gorman, Electronic Marking and Identification
Techniques to Discourage Document Copying, IEEE
Journal on Selected Areas in Communications, vol. 13,
no. 8, 1995

[36]

J. T. Brassil, S. Low, N. F. Maxemchuk, L. O.


Gorman, Hiding information in document images, in
Proceedings of the 29th Annual Conference on
Information Sciences and Systems, Johns Hopkins
University, 1995

[37]

J. T. Brassil, S. Low, and N. F. Maxemchuk,


Copyright protection for the electronic distribution of
text documents, in Proceedings of the IEEE, vol. 87, no.
7, 1999

[38]. M. J. Atallah, C. McDonough, S. Nirenburg,


and V. Raskin, Natural language processing for
information assurance and security: an overview and
implementation, in Proceedings of 9th ACM/SIGSAC
New Security Paradigms Workshop, Cork, Ireland, 2000

[39]

M. J. Atallah, et al., Natural language


watermarking: design, analysis, and a proof-of-concept
implementation, in Proceedings of the Fourth
Information Hiding Workshop, LNCS vol. 2137, 2001

[40]

U. Topkara, M. Topkara, and M. J. Atallah,


The hiding virtues of ambiguity: quantifiably resilient
watermarking of natural language text through synonym
substitutions, in Proceedings of ACM Multimedia and
Security Conference, Geneva, Switzerland, September
2006

[41]

M. Topkara, U. Topraka, and M. J. Atallah,


Information hiding through errors: a confusing
approach, in Proceedings of SPIE International
Conference on Security, Steganography, and
Watermarking of Multimedia Contents IX. 6505, 2007

[42]

M. Topkara, New Designs for Improving the


Efficiency and Resilience of Natural Language
Watermarking, PhD Thesis, Purdue University, West
Lafayette, Indiana, 2007

[43]

Cedric Lam, Janet Wong and Grace Wong,


Protecting copyright online, April 2010

[44]

Agreement on Trade-Related Aspects of


Intellectual Property Rights (TRIPS).

[45]

Anti-Counterfeiting Trade Agreement, April

2004

[46]

The
World
Organization, 2010

[47]

Intellectual

Property

European copyright law, June 2001

[48]

Debnath Bhattacharyya, Poulami Das, Samir


Kumar Bandyopadhyay and Tai-hoon Kim, Text
Steganography: A Novel Approach, International
Journal of Advanced Science and Technology, Vol. 3,
February, 2009.

[49]Wael

Al-Alwani, Abdulelah Bin Mahfooz, and


Adnan Abdul-Aziz Gutub, A Novel Arabic Text
Steganography Method Using Extensions, KFUPM,
March 4, 2007.

[50]

KaushalSolanki, AnindyaSarkar, and B. S.


Manjunath, YASS: Yet Another Steganographic Scheme
that Resists Blind Steganalysis University of Californi.

You might also like