The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation (UKSim) 2016
DOI: 10.1109/uksim.2016.34
|View full text |Cite
|
Sign up to set email alerts
|

Utilizing Word Space with Pointed and Un-pointed Letters for Arabic Text Watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…In the Unicode, there are special zero-width characters (ZWC) which are employed to provide specific entities such as Zero Width Joiner (ZWJ), e.g., ZWJ joins two supportable characters together in particular languages, POP directional, and Zero Width Non-Joiner (ZWNJ), etc. Practically, the ZWC characters do not have traces, widths or written symbol in digital texts [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 11 , 15 , 18 , 25 , 26 , 27 , 28 , 33 , 34 , 41 , 42 , 43 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 86 , 87 , 88 , 89 , 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 ,…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…In the Unicode, there are special zero-width characters (ZWC) which are employed to provide specific entities such as Zero Width Joiner (ZWJ), e.g., ZWJ joins two supportable characters together in particular languages, POP directional, and Zero Width Non-Joiner (ZWNJ), etc. Practically, the ZWC characters do not have traces, widths or written symbol in digital texts [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 11 , 15 , 18 , 25 , 26 , 27 , 28 , 33 , 34 , 41 , 42 , 43 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 86 , 87 , 88 , 89 , 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 ,…”
Section: Literature Reviewmentioning
confidence: 99%
“…to access sensitive information during data transmission. Therefore, demand is growing for intelligence and multimedia security studies that involve not only encryption, but also covert communication whose essence lies in concealing data [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 ]. Recently, information hiding or data hiding in digital texts, known as text hiding, has drawn considerable attention due to its extensive usage, and potential applications in the cybersecurity and network communication industries [ 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 ...…”
Section: Introductionmentioning
confidence: 99%
“…Alotaibi and Elrefaei (2016) designed a new watermarking technique to conceal secret information in Arabic text Table 8: Two grouping of Arabic letters [43].…”
Section: Symbolmentioning
confidence: 99%
“…If {0, pointed}, no pseudospace is embedded. This method provides high invisibility; however, it has relatively low capacity (one bit per pseudospace) and also is vulnerable to tampering and retyping attacks [43].…”
Section: Pointed Lettersmentioning
confidence: 99%
See 1 more Smart Citation