Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30669
Improved Zero Text Watermarking Algorithm against Meaning Preserving Attacks

Authors: Jalil Z., Farooq M., Zafar H., Sabir M., Ashraf E.

Abstract:

Internet is largely composed of textual contents and a huge volume of digital contents gets floated over the Internet daily. The ease of information sharing and re-production has made it difficult to preserve author-s copyright. Digital watermarking came up as a solution for copyright protection of plain text problem after 1993. In this paper, we propose a zero text watermarking algorithm based on occurrence frequency of non-vowel ASCII characters and words for copyright protection of plain text. The embedding algorithm makes use of frequency non-vowel ASCII characters and words to generate a specialized author key. The extraction algorithm uses this key to extract watermark, hence identify the original copyright owner. Experimental results illustrate the effectiveness of the proposed algorithm on text encountering meaning preserving attacks performed by five independent attackers.

Keywords: information security, Digital Watermarking, watermark, copyright protection, Document authentication

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1072012

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1748

References:


[1] A. Khan, A. M. Mirza and A. Majid, Optimizing Perceptual Shaping of a Digital Watermark Using Genetic Programming, Iranian Journal of Electrical and Computer Engineering, vol. 3, pp. 144-150, 2004.
[2] J. T. Brassil, S. Low, N. F. Maxemchuk, and L. O-Gorman, Electronic Marking and Identification Techniques to Discourage Document Copying, IEEE Journal on Selected Areas in Communications, vol. 13, no. 8, pp. 1495-1504, October 1995.
[3] J. T. Brassil, S. Low, and N. F. Maxemchuk, Copyright Protection for the Electronic Distribution of Text Documents, Proceedings of the IEEE, vol. 87, no. 7, pp.1181-1196, July 1999.
[4] N. F. Maxemchuk, S. H. Low, Performance Comparison of Two Text Marking Methods, IEEE Journal of Selected Areas in Communications (JSAC),vol. 16 no. 4 1998. pp. 561-572, May 1998.
[5] N. F. Maxemchuk, "Electronic Document Distribution," AT&T Technical Journal, September 1994, pp. 73-80. 6.
[6] N. F. Maxemchuk and S. Low, Marking Text Documents, Proceedings of the IEEE International Conference on Image Processing, Washington, DC, , pp. 13-16, Oct. 26-29, 1997.
[7] S. H. Low, N. F. Maxemchuk, and A. M. Lapone, Document Identification for Copyright Protection Using Centroid Detection, IEEE Transactions on Communications, vol. 46, no.3, pp 372-381, Mar. 1998.
[8] S. H. Low and N. F. Maxemchuk, Capacity of Text Marking Channel, IEEE Signal Processing Letters, vol. 7, no. 12 , pp. 345 -347, Dec. 2000.
[9] D. Huang and H. Yan, Interword distance changes represented by sine waves for watermarking text images, IEEE Trans. Circuits and Systems for Video Technology, Vol.11, No.12, pp.1237-1245, Dec 2001.
[10] M. J. Atallah, C. McDonough, S. Nirenburg, and V. Raskin, Natural Language Processing for Information Assurance and Security: An Overview and Implementations, Proceedings 9th ACM/SIGSAC New Security Paradigms Workshop, Cork, Ireland, pp. 51-65, September, 2000.
[11] M. J. Atallah, V. Raskin, M. C. Crogan, C. F. Hempelmann, F. Kerschbaum, D. Mohamed, and S.Naik, Natural language watermarking: Design,analysis, and a proof-of-concept implementation, Proceedings of the Fourth Information Hiding Workshop, vol. LNCS 2137, Pittsburgh, PA, 25-27 April 2001.
[12] H. M. Meral et al., Natural language watermarking via morphosyntactic alterations, Computer Speech and Language, 23, 107-125, 2009.
[13] H. M. Meral, E. Sevin├º, E. ├£nkar, B. Sankur, A. S. ├ûzsoy, T. G├╝ngör, Syntactic tools for text watermarking, 19th SPIE Electronic Imaging Conf. 6505: Security, Steganography, and Watermarking of Multimedia Contents, San Jose, Jan. 2007.
[14] M. Atallah, V. Raskin, C. F. Hempelmann, M. Karahan, R. Sion, U. Topkara, and K. E. Triezenberg, Natural Language Watermarking and Tamperproofing, Fifth Information Hiding Workshop, vol. LNCS, 2578, Noordwijkerhout, The Netherlands, Springer-Verlag, October, 2002.
[15] U. Topkara, M. Topkara, M. J. Atallah, The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions, In Proceedings of ACM Multimedia and Security Conference, Geneva, 2006.
[16] X. Sun, A. J. Asiimwe. Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers. Lecture Notes in Computer Science (LNCS) 3612: 958-961, Springer Press, August 2005.
[17] M. Topkara, U. Topraka, and M.J. Atallah, Information hiding through errors: a confusing approach. Proceedings of SPIE Security, Steganography, and watermarking of Multimedia Contents IX., pp. 65050 V-1-65050V-12.
[18] B. Macq and O. Vybornova, A method of text watermarking using presuppositions, in Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, January 2007.
[19] Peng Lu et al., An optimized natural language watermarking algorithm based on TMR, Proceedings of 9th International Conference for Young Computer Scientists, 2009.
[20] Z. Jalil and A. M. Mirza, "An Invisible Text Watermarking Algorithm using Image Watermark", International Conference on Systems, Computing Sciences, and Software Engineering (SCSS 2009), Innovations in Computing Sciences and Software Engineering, published by Springer, ISBN: 978-90-481-9111-6.
[21] Z. Jalil, A. M. Mirza, and T. Iqbal, "A Zero-Watermarking Algorithm for Text Documents using Structural Components", International Conference on Information and Emerging Technologies (ICIET 2010), June 14-16, 2010, Karachi, Pakistan.
[22] Z. Jalil, M. Farooq, M. Arif and A. M. Mirza, "A Zero Text Watermarking Algorithm Using Non-Vowel Alphabets", International Journal of Electrical, Computer, and Systems Engineering (ICCESSE 2010), November 24-26, 2010, Venice, Italy.
[23] DAWN news website article link: http://epaper.dawn.com/ArticleText.aspx?article=01_08_2010_006_006