Skip to main content
Log in

Efficient watermarking technique for protection and authentication of document images

  • 1169: Interdisciplinary Forensics: Government, Academia and Industry Interaction
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a hashing based watermarking technique for the protection and authentication of document image is proposed. Message Digest 5 (MD5) hashing is applied on the cover document image to produce its hash value. This hash value is further translated to Unicode Zero Width Characters (ZWC) by using a lookup table. Watermark is also translated to ZWC prior to embedding in the input image. At the end of each sentence, both of these ZWC are inserted in the cover image. At the receiver end, this watermark is regenerated from its embedded ZWCs and used for the security purposes. The hash value of the cover image is used to detect tampering. The embedded data does not degrade the cover image as invisible Unicode white spaces are used in place of original watermark and hash value. The proposed technique’s effectiveness is demonstrated by comparison to existing state-of-the-art techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Ahvanooey MT, Mazraeh HD, Tabasi SH (2016) An innovative technique for web text watermarking. Inform Sec J: Global Perspect 25:191–196

    Google Scholar 

  2. Ahvanooey MT, Li Q, Shim HJ, Huang Y (2018) A comparative analysis of information hiding techniques for copyright protection of text documents. Secur Commun Netw 2018:1–22

    Article  Google Scholar 

  3. Ahvanooey MT, Li Q, Zhu X, Alazab M, Zhang J (2020) ANiTW: a novel intelligent text watermarking technique for forensic identification of spurious information on social media. Comput Secur 90:1–14

    Google Scholar 

  4. Alotaibi RA, Elrefaei LA (2017) Improved capacity arabic text watermarking methods based on open word space. J King Saud Univ-Comput Inform Sci 30:236–248

    Google Scholar 

  5. Al-maweri NAS, Adnan WAW, Ramli AR, Samsudin K, Rahman SMSAA (2016) Robust digital text watermarking algorithm based on unicode extended characters. Indian J Sci Technol 9:1–14

    Google Scholar 

  6. Bharti P, Pramanik A (2020) Deep learning techniques- R-CNN to Mask R-CNN: a survey, inproceedings of computational intelligence in pattern recognition. Adv Intell Syst Comput 999:657–668

    Google Scholar 

  7. Hakak SI, Kamsin A, Shivakumara P, Gilkar GA, Khan WZ, Imran AM (2019) Exact string matching algorithms: survey, issues, and future research directions. IEEE Access 7:69614–69637

    Article  Google Scholar 

  8. Hurrah NN, Parah SA, Loan NA, Sheikh JA, Elhoseny M, Muhammad K (2018) Dual watermarking framework for privacy protection and content authentication of multimedia. Futur Gener Comput Syst 94:654–673

    Article  Google Scholar 

  9. Khosravi B, Khosravi B, Khosravi B, Nazarkardeh K (2019) A new method for PDF steganography in justified texts. J Inform Secur Applic 45:61–70

    Google Scholar 

  10. Kumar J, Ye P, Doermann D (2020) https://lampsrv02.umiacs.umd.edu/projdb/project.php?id=73, DIQA Dataset, Accessed, January 2020

  11. Laouamer L, Tayan O (2015) A semi-blind robust DCT watermarking approach for sensitive text images. Arab J Sci Eng 40:1097–1109

    Article  Google Scholar 

  12. Mohammad AA (2011) A new digital image watermarking scheme based on Schur decomposition. Multimed Tools Appl 59:851–883

    Article  Google Scholar 

  13. Mohamed AA (2014) An improved algorithm for information hiding based on features of arabic text: a unicode approach. Egyptian Informatics Journal, 1–9

  14. Naqvi N, Abbasi AT, Hussain R, Khan MA, Ahmad B (2018) Multilayer partially homomorphic encryption text steganography: a zero steganography approach. Wirel Pers Commun, 1563–1585

  15. Pandey RC, Singh SS.K., Shukla KK (2016) Passive forensics in image and video using noise features: a review. Digit Investig 19:1–28

    Article  Google Scholar 

  16. Patiburn SA, Iranmanesh V, Teh PL (2017) Text steganography using daily emotions monitoring. Int J Educ Manag Eng 3:1–14

    Google Scholar 

  17. Por LY, Wong K, Chee KO (2012) UniSpaCh: a text-based data hiding method using unicode space characters. J Syst Softw 85:1075–1082

    Article  Google Scholar 

  18. Rivest R (1992) The MD5 message-digest algorithm. RFC, 1321

  19. Rizzo SG, Bertini F, Montesi D (2016) Content-preserving text watermarking through unicode homoglyph substitution. In: Proceedings of international database engineering and applications symposium, pp 97–104

  20. Rizzo SG, Bertini F, Montesi D, Stomeo C (2017) Text watermarking in social media. In: Proceedings of IEEE international conference on advances in social networks analysis and mining, pp 208–211

  21. Rui X, XiaoJun C, Jinqiao S (2013) A multiple watermarking algorithm for texts mixed Chinese and English. Inform Technol Quant Manag 17:844–851

    Google Scholar 

  22. Subramanyam AV, Emmanuel S (2012) Partially compressed-encrypted domain robust JPEG image watermarking. Multimed Tools Appl 71:1311–1331

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Balkar Singh.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, B., Sharma, M.K. Efficient watermarking technique for protection and authentication of document images. Multimed Tools Appl 81, 22985–23005 (2022). https://doi.org/10.1007/s11042-022-12174-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12174-x

Keywords

Navigation