Professional Documents
Culture Documents
Abstract:
Now a day's all the information is available on internet but the problem is that" information is not
secure from threats like reuse ,plagiarism etc ".According to our research we have noted that alot
of work is done on audio, video, image but less work have been done on text watermarking . Due
to the less work on text watermarking the data is not secure and every other person is using the
data for their purpose. For overcoming this problem watermark have to be embedded on text. Many
researchers have worked on embedding watermark on text through different techniques. We have
survey on: 1) Application of text watermarking 2) Possible Attacks on text 3) Issues in Techniques
of text watermarking 4) Classifications of text watermarking.
Key Words: Text watermarking, Text watermarking Classification, Copyright Protection, fingerprinting, watermark,
information Security.
1. Introduction
In today's digital world , text is the most
widely used medium of communication in the
Internet or intranet. Internet and intranet is full
of information. Information is based on text.
And now a day's text is not secure. For
securing text a scheme is used which is known
as watermark. Watermark is a process of
preventing text from being copied and it also
shows that text is authentic. Watermark is
embedded on data, so data is in different
forms like text, audio's, image, video's. In
recent years, many work have been done for
Video`s, images, audio`s but the main point is
that insufficient works is done on text.
So the problem is known that text have not
been secured properly. For protecting text
from different threats we have to embed
watermark in text. The processes which have
been used for text is same for
image,video,audio and text.
Fig (a).
On the other hand, [5] a row divide in two
fields of text (say A and B) therefore total
spaces between words (i.e., the total amount
2.1. Authentication
In this case, fragile watermarks can be used to
detect any tampering of a Plain text document.
If watermark is detected, the plain text
document may be genuine; if not, the text has
been tampered and cannot be considered [2].
It is very necessary to authenticate text,
especially when using for officially authorized
purposes. In a sensitive communication e.g.
in defence application and in business
communication, it is very important to
authenticate,
check
reliability
and
completeness of the text data.
Single Ownership
Combine Ownership
2.3. Fingerprinting:
Many times author or owner have the secure
key copy and gave many users for the data
securing. For the owner, embedding a secure
serial key like watermark is a way to detect the
breaker or illegal user who break their secure
3. Attacks on Text:
In computer network world
is not much
excited about text watermarking technologies.
The main reason is to disclose watermarking
techniques and lack of strength on the way to
attacks. So that it is achievable for an attacker
to achieve one-sided attacks still if they are not
competent to do it finally. So it is necessary to
comparison each type of attacks. Watermark
common attacks are described as follows:
3.1.1 Types:
First of all common word use in attacks is
type. Because there are many types of securing
the data and also attackers attack on these
types. So that important attacks can be
describe in following categories:
3.1.3Unauthorized Detection
Some time attackers also detect the
watermarked with some useable techniques
and change the information according to your
requirements.
3.1.5. Re-ordering
Other important types of attack are to re
order the information and some time
replaces the important words with other
words or using the synonyms. Due to this
process also change the meaning of all
informations.
3.2. Low and High Volume
Now the levels of attackers also define
here. Two types of level are classified:
Low level creates when the attackers
unauthorized add or unauthorized Delete
some information to and from the
attackers. Other then level is define as
when the attacker want some part of text
using as own data is called high level.
3.3. Brute Force Attack:
In this types of attack, attacker attack on
the private secure key by using the all
types of words and characters. This attack
can be taken much time to break the
watermarked key.
4. Text Watermarking Issue`s
There are many types of issues for the text
watermarking now a days but the main
problems are discuss here:
Plain text is a simplest way of informations
but in case of security it has many challenges
5. Classification
of
Watermarking:
There are two main classifications points of
watermarking are:
Oblivious/unaware:
6. Watermarking Techniques
Many techniques of text watermarking have
been proposed in the past .These techniques
use as Text watermarking image as a text,
meaning change, assumption based, Verb and
noun and pronoun based, sentence and word
short form , misprint error etc. Therefore, we
can broadly classify the previous work on
digital text watermarking in the following
categories; an image based approach, a
syntactic approach, and a semantic approach.
6.1. Bit Level Watermarking
A. Spread Spectrum
In which bits (a) of watermark are
combine with a Noise of PRN (pseudo
Random Noise). Now that generated
signal and this noise signal pass through
from host signal (s).So that the signal from
the PRN likes a secret key.
The host amplitude greater then of
watermarked signal amplitude about
1%.For the detection of PRN signal by the
math filter and correlation receiver.
B. Line Shift Coding:
In this coding scheme shifted the even line
up or down by the bit value in payload
[7].There are two bit value for shifted the
line, if bit is one then line shift to up and 0
bit shift the line down. Remaining odd
lines use as a control lines and decoding.
C. Word Shifting:.
In this schemes each line of sentences is
divided into words groups. Every group
has a enough number of words and
characters. In this process even group
shifted to right or left as a bit value set in
the pay load and remaining odd groups
used as measuring and comparing the
distances between the groups of word.
D. Feature Coding:
According to this approach changing the
text features in a precise way to select the
bit value in payload. After embedded the
watermarked we can achieved by
comparing the original document with
watermarked document [8].
Feature coding apply on the text in real
life. There are three steps in (a) original
data. In (b) Selected the words for
applying the feature coding. In last step
applying the feature coding on the selected
word [8].
E. Character spacing
F.
In
this
process
of
watermarking is change the
like
generate
the
original
words),tags,and
words
(reverse
modifying
the
data attribute.
6.7. Other Approaches
8. CONCLUSION
[27]
[28]
[29]
[30]http://en.wikipedia.org/wiki/Digital_watermarking
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
2004
[46]
The
World
Organization, 2010
[47]
Intellectual
Property
[48]
[49]Wael
[50]