Open Access Open Access  Restricted Access Subscription or Fee Access

Integrity Protection of Text Document Data from Unauthorized Modifications

Leena Goyal, Mukesh Vijay, Prateek Diwan

Abstract


Digital watermarking provides authentication, validation and copyright protection for multimedia contents over the internet. Text is the most widely used means of communication in addition to image, audio and video. So it needs to be protected. Text watermarking techniques that have been developed in the past protects the text from illegal copying, imitation, and prevents copyright violations. In this paper, we have proposed an algorithm that ensures the integrity and confidentiality of the document. In this technique, watermark is created on the basis of the contents of the document and embeds it without changing the contents of the document and also encrypts the text to provide confidentiality. To authenticate and prove the integrity of the document the watermark can be easily extracted and verified for tampering.

Keywords: confidentiality, integrity, encryption, shuffling, substitution


Full Text:

PDF

References


Brassil JT, Low S, Maxemchuk NF, et al. Electronic Marking and Identification Techniques to Discourage DocumentCopying. IEEE Journal on Selected Areas in Communications. 1995; 13(8): 1495–1504p.

Maxemchuk NF. Electronic Document Distribution. AT&T Technical Journal. Sep 1994; 73–80p.

Maxemchuk NF, Low S. Marking Text Documents. Proceedings of the IEEE International Conference on Image Processing; 1997 Oct 26–29; Washington, DC. 13–16p.

Low SH, Maxemchuk NF, Lapone AM. Document Identification for Copyright Protection Using Centroid Detection. IEEE Transactions on Communications. 1998; 46 (3): 372–81p.

Huang D, Yan H. Interword distance changes represented by sine waves for Watermarking text images. IEEE Trans Circuits and Systems for Video Technology. 2001; 11 (12): 1237–45p.

Young-Won Kim, Kyung-Ae Moon, Il-Seok Oh. A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics. Proceedings of the Seventh International Conference on Document Analysis and Recognition; 2003 Aug 3–6; Edinburgh, UK. USA: IEEE; 2003. 775–79p.

Jalil Z, Mirza AM. Text Watermarking Using Combined Image-plus- Text Watermark. Second International Workshop on Education Technology and Computer Science (ETCS); 2010 Mar 6–7; Wuhan. USA: IEEE; 2010. 11–14p.

Jalil Z, Mirza AM. An Invisible Text Watermarking Algorithm Using Image Watermark. In: Sobh T, Elleithy K, Eds. Innovations in Computing Science and Software Engineering. Netherlands: Springer; 2010. 147–52p.

Jaseena KU, John A. Text Watermarking using Combined Image and Text for Authentication and Protection. IJCA. 2011; 20 (4):8–13p.

Xingming S, Alex JA. Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers. Proceedings of ICNC (3). Netherlands: Springer Press; 2005. 958–61p

Topkara U, Topkara M, Atallah MJ. The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions. Proceedings of ACM Multimedia and Security Conference; 2006 Sep 26–27; Geneva, Switzerland.

Jadhav S, Mohite V. A Data Hiding Techniques Based on Length of English Text Using DES and Attacks. Int J Res Comp Sci. 2012; 2 (4): 23–9p.

Lin CH, Chou JS, Chen YW. Integrity Protection of Document Assets by Computing Skeletons. Proceedings of the Second International Conference on Innovative Computing, Information and Control (ICICIC '07); 2007 Sep 5–7; Kumamoto.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/