Advertisement

Text Watermarking

  • Mohammad Ali Nematollahi
  • Chalee Vorakulpipat
  • Hamurabi Gamboa Rosales
Chapter
Part of the Springer Topics in Signal Processing book series (STSP, volume 11)

Abstract

Any books, article, newspaper, documents, and website are consisted from plain text. Also, plain text is widely used in Internet medium which can exist in all the components of websites, e-books, e-mails, and SMS.

Keywords

Plain Text Code Algorithm Semantic Approach Watermark Extraction Syntactic Approach 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Topkara, M., et al. 2006. Natural language watermarking: Challenges in building a practical system. In Electronic imaging 2006. International Society for Optics and Photonics.Google Scholar
  2. 2.
    Zhou, X., et al. 2009. Security theory and attack analysis for text watermarking. In E-Business and information system security. International conference on EBISS’09 2009. IEEE.Google Scholar
  3. 3.
    Brassil, J.T., et al. 1995. Electronic marking and identification techniques to discourage document copying. IEEE Journal on Selected Areas in Communications, 13(8): 1495–1504.CrossRefGoogle Scholar
  4. 4.
    Brassil, J., et al. 1995. Hiding information in document images. In Proceedings of conference on information sciences and systems (CISS-95). 1995. Citeseer.Google Scholar
  5. 5.
    Khan, A., and A.M. Mirza. 2007. Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding. Information fusion 8(4): 354–365.CrossRefGoogle Scholar
  6. 6.
    Low, S.H., N.F. Maxemchuk, and A.M. Lapone. 1998. Document identification for copyright protection using centroid detection. IEEE Transactions on Communications 46(3): 372–383.CrossRefGoogle Scholar
  7. 7.
    Low, S.H., and N.F. Maxemchuk. 2000. Capacity of text marking channel. IEEE Signal Processing Letters 7(12): 345–347.CrossRefGoogle Scholar
  8. 8.
    Amano, T., and D. Misaki. 1999. A feature calibration method for watermarking of document images. In Document analysis and recognition. Proceedings of the fifth international conference on ICDAR’99. IEEE.Google Scholar
  9. 9.
    Kim, Y.-W., and I.-S. Oh. 2004. Watermarking text document images using edge direction histograms. Pattern Recognition Letters 25(11): 1243–1251.CrossRefGoogle Scholar
  10. 10.
    Kim, Y.-W., K.-A. Moon, and I.-S. Oh. 2003. A text watermarking algorithm based on word classification and inter-word space statistics. In Null 2003. IEEE.Google Scholar
  11. 11.
    Yang, H., and A.C. Kot. 2004. Text document authentication by integrating inter character and word spaces watermarking. In Multimedia and expo, 2004. IEEE international conference on ICME’04. IEEE.Google Scholar
  12. 12.
    Atallah, M.J., et al. 20014. Natural language watermarking: Design, analysis, and a proof-of-concept implementation. In Information hiding. Berlin. Springer.Google Scholar
  13. 13.
    Atallah, M.J., et al. 2001. Natural language processing for information assurance and security: An overview and implementations. In Proceedings of the 2000 workshop on new security paradigms. ACM.Google Scholar
  14. 14.
    Meral, H.M., et al. 2009. Natural language watermarking via morphosyntactic alterations. Computer Speech & Language 23(1): 107–125.CrossRefGoogle Scholar
  15. 15.
    Kim, M.-Y. 2010. Natural language watermarking for Korean using adverbial displacement. In Multimedia and ubiquitous engineering. International conference on MUE 2008. IEEE.Google Scholar
  16. 16.
    Hoehn, H. 2007. Natural language watermarking. In Seminar series selected topics of IT security, summer term.Google Scholar
  17. 17.
    Kankanhalli, M.S., and K. Hau. 2002. Watermarking of electronic text documents. Electronic Commerce Research 2(1–2): 169–187.CrossRefGoogle Scholar
  18. 18.
    Murphy, B., and C. Vogel. 2007. Statistically-constrained shallow text marking: techniques, evaluation paradigm and results. In Electronic imaging 2007. International Society for Optics and Photonics.Google Scholar
  19. 19.
    Topkara, U., M. Topkara, and M.J. Atallah. 2006. The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. In Proceedings of the 8th workshop on multimedia and security. ACM.Google Scholar
  20. 20.
    Sun, X., and A.J. Asiimwe. 2005. Noun-verb based technique of text watermarking using recursive decent semantic net parsers, In Advances in natural computation, 968–971. Berlin: Springer.Google Scholar
  21. 21.
    Topkara, M.K. 2007. New designs for improving the efficiency and resilience of natural language watermarking: ProQuest.Google Scholar
  22. 22.
    Vybornova, O., and B. Macq. 2007. A method of text watermarking using presuppositions. In Electronic imaging. International Society for Optics and Photonics.Google Scholar
  23. 23.
    Shirali-Shahreza, M. 2008. Text steganography by changing words spelling. In Advanced communication technology. 10th international conference on ICACT 2008. IEEE.Google Scholar
  24. 24.
    Rafat, K.F. 2009. Enhanced text steganography in SMS. In Computer, control and communication. 2nd international conference on IC4. IEEE.Google Scholar
  25. 25.
    Jalil, Z. 2010. Copyright protection of plain text using digital watermarking. National University of Computer and Emerging Sciences, Islamabad, Pakistan.Google Scholar

Copyright information

© Springer Science+Business Media Singapore 2017

Authors and Affiliations

  • Mohammad Ali Nematollahi
    • 1
  • Chalee Vorakulpipat
    • 1
  • Hamurabi Gamboa Rosales
    • 2
  1. 1.National Electronics and Computer Technology Center (NECTEC)PathumthaniThailand
  2. 2.Universidad Autónoma de ZacatecasZacatecasMexico

Personalised recommendations