Skip to main content
Log in

Enhancing fragility of zero-based text watermarking utilizing effective characters list

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Text is an important medium used for sharing information worldwide. For a text document, digital watermarking is an efficient way for copyright protection, authentication, tamper proofing, to name but a few. In this paper, a zero-based watermarking approach is proposed for document authentication and tamper detection. To enhance the fragility of watermark, the proposed text watermarking approach can be comfortably utilized – based on the Effective Characters List (ECL) for watermark generation. The ECL method is generated for English text zero-watermarking by maintaining the contents of the original document and constructing the watermark by formulating the smooth transition between the selected characters in the documents. The evaluation of the proposed watermarking approach is based on three famous watermarking attacks including deletion, insertion, and reordering with an accuracy of 80.76%, 80.36%, and 88.1%, respectively. For a fair evaluation, a comparison is put forth with a recent zero-based watermarking method - clearly showing that the proposed method outperforms existing with greater accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Abdulrahman AK, Ozturk S (2019) A novel hybrid DCT and DWT based robust watermarking algorithm for color images. Multimed Tools Appl 78(12):17027–17049

    Article  Google Scholar 

  2. Ahmad AM et al (2014) Data hiding based on improved exploiting modification direction method and Huffman coding. J Intell Syst 23(4):451–459

    Google Scholar 

  3. Alkawaz MH et al (2016) Concise analysis of current text automation and watermarking approaches. Sec Commun Netw 9(18):6365–6378

    Article  Google Scholar 

  4. Al-maweri NAS et al. (2016) Robust digital text watermarking algorithm based on Unicode extended characters. Indian J Sci Technol 9(48)

  5. Alotaibi RA, Elrefaei LA (2018) Improved capacity Arabic text watermarking methods based on open word space. J King Saud Univ-Comput Inform Sci 30(2):236–248

    Google Scholar 

  6. Alotaibi RA, Elrefaei LA (2018) Text-image watermarking based on integer wavelet transform (IWT) and discrete cosine transform (DCT). Applied Computing and Informatics

  7. Al-Wesabi FN, Alshakaf AZ, Vasantrao KU (2012) A zero text watermarking algorithm based on the probabilistic weights for content authentication of text documents. In Proceedings on National Conference on Recent Trends in Computing NCRTC. Citeseer

  8. Ba-Alwi FM, Ghilan MM, Al-Wesabi FN (2014) Content authentication of English text via internet using zero watermarking technique and Markov model. Int J Appl Inform Syst (IJAIS) 7(1):25–36

    Google Scholar 

  9. Bashardoost M, Rahim MSM, Saba T, Rehman A (2017) Replacement attack: a new zero text watermarking attack, 3D Res , vol. 8(8). doi:https://doi.org/10.1007/s13319-017-0118-y

  10. Bashardoost M et al (2017) Replacement attack: a new zero text watermarking attack. 3D Res 8(1):8

    Article  Google Scholar 

  11. Blackwell D (1953) Equivalent comparisons of experiments. Ann Math Stat: 265–272

    Article  MathSciNet  Google Scholar 

  12. Cao F et al (2017) Hierarchical recovery for tampered images based on watermark self-embedding. Displays 46:52–60

    Article  Google Scholar 

  13. Di Martino F, Sessa S (2019) Fragile watermarking tamper detection via bilinear fuzzy relation equations. J Ambient Intell Humaniz Comput 10(5):2041–2061

    Article  Google Scholar 

  14. Feng B et al. (2019) A novel semi-fragile digital watermarking scheme for scrambled image authentication and restoration. Mobile Networks and Applications: 1–13

  15. Ghilan MM, Ba-Alwi FM, Al-Wesabi FN (2014) Combined Markov model and zero watermarking techniques to enhance content authentication of english text documents. Int J Comput Ling Res 5(1):26–42

    Google Scholar 

  16. Gutub AA-A, Al-Alwani W, Mahfoodh AB (2010) Improved method of Arabic text steganography using the extension ‘Kashida’character. Bahria Univ J Inform Commun Technol 3(1):68–72

    Google Scholar 

  17. Hemida O et al. (2018) A restorable fragile watermarking scheme with superior localization for both natural and text images. Multimed Tools Appl: 1–31

  18. Husain A (2015) Printed document forgery detection using text reordering and mixing of matrices in zero watermarking, Universiti Teknologi Malaysia

  19. Jalil Z et al (2010) Improved zero text watermarking algorithm against meaning preserving attacks. World Acad Sci Eng Technol 46:592–596

    Google Scholar 

  20. Kamaruddin NS et al (2018) A review of text watermarking: theory, methods, and applications. IEEE Access 6:8011–8028

    Article  Google Scholar 

  21. Krishna GJ, Vadlamani R, Bhattu SN (2018) Key generation for plain text in stream cipher via bi-objective evolutionary computing. Appl Soft Comput

  22. Patel HA, Divecha NH (2018) A feature-based semi-fragile watermarking algorithm for digital color image authentication using hybrid transform, Advances in computer and computational sciences, Springer: 455–465

  23. Pramoun T, Amornraksa T (2009) Improved image watermarking using pixel averaging and unbiased retrieval. In 2009 9th International Symposium on Communications and Information Technology. IEEE

  24. Qin C et al (2018) Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE MultiMedia 25(3):36–48

    Article  Google Scholar 

  25. Saxena S et al. (2019) Robust digital image watermarking Scheme based on discrete fractional fourier transform. In AIP Conference Proceedings. AIP Publishing

  26. Singh M, Saxena A (2017) Image watermarking using discrete cosine transform [DCT] and genetic algorithm [GA]

  27. Sinha S et al (2018) Authentication and tamper detection in tele-medicine using zero watermarking. Procedia Comput Sci 132:557–562

    Article  Google Scholar 

  28. Taleby Ahvanooey M et al. (2018) A comparative analysis of information hiding techniques for copyright protection of text documents. Security and Communication Networks 2018

  29. Tan L et al. (2018) Print-scan invariant text image watermarking for hardcopy document authentication. Multimed Tools Appl: 1–23

  30. Tayan O, Alginahi YM, Kabir MN (2013) An adaptive zero-watermarking approach for text documents protection. In International Conference on Advances in Computer and Information Technology

  31. Tayan O, Kabir MN, Alginahi YM (2014) A hybrid digital-signature and zero-watermarking approach for authentication and protection of sensitive electronic documents. Sci World J 2014

  32. Walke A et al (2018) Enhanced password processing scheme using visual cryptography and steganography. Int J Recent Innovation Trends Comput Commun 6(4):35–37

    Google Scholar 

  33. Wang C et al (2019) Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci 470:109–120

    Article  Google Scholar 

  34. Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863–4882

    Article  Google Scholar 

  35. Zheng W et al. (2018) Robust and high capacity watermarking for image based on DWT-SVD and CNN. In 2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA), IEEE

  36. Zhenjiu X et al (2017) Zero-watermarking based on boost normed singular value decomposition and cellular neural network. J Image Graph 3:002

    Google Scholar 

Download references

Acknowledgements

“This work is the output of the collaboration of Department of Computer Science, Liverpool John Moores University, Liverpool, UK , University Industry Research Laboratory (UIRL), Universiti Teknologi Malaysia UTM, Skudai, Johor, Malaysia This work was also collaborated, supported by Artificial Intelligence and Data Analytics (AIDA) Lab Prince Sultan University Riyadh Saudi Arabia. Authors are thankful for the support”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amjad Rehman.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Saba, T., Bashardoost, M., Kolivand, H. et al. Enhancing fragility of zero-based text watermarking utilizing effective characters list. Multimed Tools Appl 79, 341–354 (2020). https://doi.org/10.1007/s11042-019-08084-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08084-0

Keywords

Navigation