“…e glyph recognition method is also presented to restore the information that is embedded in the encrypted document. A new approach is proposed for Arabic text using pseudospace in [75]. e connected letters are isolated with pseudospace to hide watermark bits, which are used to hide watermark bits.…”
Section: Existing Techniques Of Text Watermarkingmentioning
In our daily life, Internet-of-Things (IoT) is everywhere and used in many more beneficial functionalities. It is used in our homes, hospitals, fire prevention, and reporting and controlling the environmental changes. Data security is the crucial requirement for IoT since the number of recent technologies in different domains is increasing day by day. Various attempts have been made to cater the user’s demands for more security and privacy. However, a huge risk of security and privacy issues can arise among all those benefits. Digital document security and copyright protection are also important issues in IoT because they are distributed, reproduced, and disclosed with extensive use of communication technologies. The content of books, research papers, newspapers, legal documents, and web pages are based on plain text, and the ownership verification and authentication of such documents are essential. In the current domain of the Internet of Things, limited techniques are available for ownership verification and copyright protection. In the said perspective, this study includes the discussion about the approaches of text watermarking, IoT security challenges, IoT device limitations, and future research directions in the area of text watermarking.
“…e glyph recognition method is also presented to restore the information that is embedded in the encrypted document. A new approach is proposed for Arabic text using pseudospace in [75]. e connected letters are isolated with pseudospace to hide watermark bits, which are used to hide watermark bits.…”
Section: Existing Techniques Of Text Watermarkingmentioning
In our daily life, Internet-of-Things (IoT) is everywhere and used in many more beneficial functionalities. It is used in our homes, hospitals, fire prevention, and reporting and controlling the environmental changes. Data security is the crucial requirement for IoT since the number of recent technologies in different domains is increasing day by day. Various attempts have been made to cater the user’s demands for more security and privacy. However, a huge risk of security and privacy issues can arise among all those benefits. Digital document security and copyright protection are also important issues in IoT because they are distributed, reproduced, and disclosed with extensive use of communication technologies. The content of books, research papers, newspapers, legal documents, and web pages are based on plain text, and the ownership verification and authentication of such documents are essential. In the current domain of the Internet of Things, limited techniques are available for ownership verification and copyright protection. In the said perspective, this study includes the discussion about the approaches of text watermarking, IoT security challenges, IoT device limitations, and future research directions in the area of text watermarking.
“…Alotaibi and Elrefaei (2016) proposed two open space based watermarking algorithms in Arabic texts [19]. In the first method, the dotting feature presented in [43] is utilized to improve the capacity of the previous work.…”
Section: Pointed Lettersmentioning
confidence: 99%
“…For example, if an attacker alters or deletes a part of the text (include normal spaces) then it causes to fail the whole watermark string by extraction algorithm because of the normal space without other spaces referring to four bits "0000" in the watermark bits. Moreover, the authors claimed that their methods have high imperceptibility but they used two spaces with the deferent length which makes more gaps between words in the watermarked text [19]. Rizzo et al (2016) presented a text watermarking technique which is able to embed a password based watermark in the Latin-based texts.…”
Section: Pointed Lettersmentioning
confidence: 99%
“…In other words, watermarking aims to protect intellectual property of digital media against unauthorized copy or access by embedding a watermark (visible or invisible) in the cove media which can remain beside the data, and it can be used whenever there is any query about the originality of media (e.g., the hidden watermark refers to the original owner) [2][3][4][5][6][7][8][9][10]. Over the last two decades, many information hiding techniques have been proposed in terms of text watermarking and text steganography for copyright protection [11][12][13][14], proof of ownership [15][16][17][18][19][20][21][22][23], and copy control and authentication [24][25][26][27][28][29][30][31]. Although the aim of steganography is different, it also can be used for the copyright protection of digital texts like watermarking.…”
With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, and so on is just the plain text. Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy. During the last decade, digital watermarking and steganography techniques have been used as alternatives to prevent tampering, distortion, and media forgery and also to protect both copyright and authentication. This paper presents a comparative analysis of information hiding techniques, especially on those ones which are focused on modifying the structure and content of digital texts. Herein, various text watermarking and text steganography techniques characteristics are highlighted along with their applications. In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques. Finally, some guidelines and directions are suggested for future works.
“…Figure 1 shows an example for hiding a message using kashida-based approach. But the most disadvantages of kashida-based strategy is the opportunity to notice the kashida insertion and the capability of this strategy is also variable and depending on the ability of the letter to be extended with kashida [10].…”
Text documents are widely used, however, the text steganography is more difficult than other media because of a little redundant information. This paper presents a text steganography methodology appropriate for Arabic Unicode texts that do not use a normal sequential inserting process to overcome the security issues of the current approaches that are sensitive to steg-analysis. The Arabic Unicode text is kept within main unshaped letters, and the proposed method is used text file as cover text to hide a bit in each letter by reshaping the letters according to its position (beginning, middle, end of the word, or standalone), this hiding process is accomplished through multi-embedding layer where each layer contains all words with the same Tag detected using the POS tagger, and the embedding layers are selected randomly using the stego key to improve the security issues. The experimental result shows that the purposed method satisfied the hiding capacity requirements, improve security, and imperceptibility is better than currently developed approaches.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.