CFP last date
15 January 2025
Reseach Article

Content Authentication of English Text via Internet using Zero Watermarking Technique and Markov Model

by Fadl M. Ba-alwi, Mokhtar M. Ghilan, Fahd N. Al-wesabi
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 1
Year of Publication: 2014
Authors: Fadl M. Ba-alwi, Mokhtar M. Ghilan, Fahd N. Al-wesabi
10.5120/ijais14-451128

Fadl M. Ba-alwi, Mokhtar M. Ghilan, Fahd N. Al-wesabi . Content Authentication of English Text via Internet using Zero Watermarking Technique and Markov Model. International Journal of Applied Information Systems. 7, 1 ( April 2014), 25-36. DOI=10.5120/ijais14-451128

@article{ 10.5120/ijais14-451128,
author = { Fadl M. Ba-alwi, Mokhtar M. Ghilan, Fahd N. Al-wesabi },
title = { Content Authentication of English Text via Internet using Zero Watermarking Technique and Markov Model },
journal = { International Journal of Applied Information Systems },
issue_date = { April 2014 },
volume = { 7 },
number = { 1 },
month = { April },
year = { 2014 },
issn = { 2249-0868 },
pages = { 25-36 },
numpages = {9},
url = { https://www.ijais.org/archives/volume7/number1/613-1128/ },
doi = { 10.5120/ijais14-451128 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T18:54:30.335444+05:30
%A Fadl M. Ba-alwi
%A Mokhtar M. Ghilan
%A Fahd N. Al-wesabi
%T Content Authentication of English Text via Internet using Zero Watermarking Technique and Markov Model
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 7
%N 1
%P 25-36
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the study of content authentication and tamper detection of digital text documents, there are very limited techniques available for content authentication of text documents using digital watermarking techniques. A novel intelligent text zero watermarking approach based on probabilistic patterns has been proposed in this paper for content authentication and tamper detection of English text documents. In the proposed approach, Markov model of order THREE and letter-based was constructed and abbreviated as LNMZW3 for text analysis and utilizes the interrelationship between contents of given text to generate the watermark. However, we can extract this watermark later using extraction and detection algorithms to identify the status of text document such as authentic, or tampered. The proposed approach was implemented using PHP Programming language with Net Beans IDE 7. 0. Furthermore, the effectiveness and feasibility of our LNMZW3 approach has proved and compared with other recent approaches with experiments using five datasets of varying lengths and different volumes of attacks. Results show that the proposed approach is always detects tampering attacks occurred randomly on text even when the tampering volume is low, mid or high. Comparative results with the recent approaches shows that the our LNMZW3 approach provides added value under random insertion and deletion attacks in terms of performance, watermark robustness and watermark security. However, it is provide worst enhancement under reorder attacks.

References
  1. JaliI, A. Hamza, S. Shahidm M. Arif, A. Mirza, 2010. A Zero Text Watermarking Algorithm based on Non-Vowel ASCII Characters. International Conference on Educational and Information Technology (ICET 2010). IEEE.
  2. Suhail M. A. , 2008. Digital Watermarking for Protection of Intellectual Property. A Book Published by University of Bradford. UK.
  3. L. Robert, C. Science, C. Government Arts, 2009. A Study on Digital Watermarking Techniques. International Journal of Recent Trends in Engineering. Vol. 1. No. 2. pp. 223-225.
  4. X. Zhou, S. Wang, S. Xiong, 2009. Security Theory and Attack Analysis for Text Watermarking. International Conference on E-Business and Information System Security. IEEE, pp. 1-6.
  5. T. Brassil, S Low, and N. F. Maxemchuk, 1999. Copyright Protection for the Electronic Distribution of Text Documents. Proceedings of the IEEE. vol. 87. no. 7. pp. 1181-1196.
  6. M. Atallah, V. Raskin, M. C. Crogan, C. F. Hempelmann, F. Kerschbaum, D. Mohamed, and S. Naik, 2001. Natural language watermarking: Design, analysis, and implementation. Proceedings of the a Fourth Hiding Workshop. vol. LNCS 2137. pp. 25-27.
  7. N. F. Maxemchuk and S Low, 1997. Marking Text Documents. Proceedings of the IEEE International Conference on Image Processing. Washington. pp. 13- 16.
  8. D. Huang, and H. Yan, 2001. Interword distance changes represented by sine waves for watermarking text images. IEEE Trans. Circuits and Systems for Video Technology. Vol. 11. No. 12. pp. 1237 - 1245.
  9. N. Maxemchuk, and S. Low, 1998. Performance Comparison of Two Text Marking Methods. IEEE Journal of Selected Areas in Communications (JSAC). vol. 16. no. 4. pp. 561-572.
  10. S. Low, and N. Maxemchuk, 2000, Capacity of Text Marking Channel. IEEE Signal Processing Letters. vol. 7. no. 12. pp. 345 -347.
  11. M. Kim, 2008. Text Watermarking by Syntactic Analysis. 12th WSEAS International Conference on Computers. Heraklion. Greece.
  12. H. Meral, B. Sankur, A. Sumru, T. Güngör, and E. Sevinç, 2009. Natural language watermarking via morphosyntactic alterations. Computer Speech and Language. pp. 107-125.
  13. Z. Jalil, and A. Mirza, 2009. A Review of Digital Watermarking Techniques for Text Documents. International Conference on Information and Multimedia Technology. pp. 230-234 . IEEE.
  14. M. AtaIIah, C. McDonough, S. Nirenburg, and V. Raskin, 2000. Natural Language Processing for Information Assurance and Security: An Overview and Implementations. Proceedings 9th ACM/SIGSAC New Security Paradigms Workshop. pp. 5 1-65.
  15. H. Meral, E. Sevinc, E. Unkar, B. Sankur, A. Ozsoy, and T. Gungor, 2007. Syntactic tools for text watermarking. In Proc. of the SPIE International Conference on Security. Steganography. and Watermarking of Multimedia Contents. pp. 65050X-65050X-12.
  16. O. Vybornova, and B. Macq. , 2007. Natural Language Watermarking and Robust Hashing Based on Presuppositional Analysis. IEEE International Conference on Information Reuse and Integration, IEEE,.
  17. M. tallah, V. Raskin, and C. Hempelmann, 2002. language watermarking and tamperproofing. Proc. of al. . Natural 5th International Information Hiding Workshop. Noordwijkerhout. Netherlands. pp. 196-212.
  18. U. Topkara, M. Topkara, and M. J. Atallah, 2006. The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions. In Proceedings of ACM Multimedia and Security Conference. Geneva.
  19. Z Jalil, A. Mirza, and H. Jabeen, 2010, Word Length Based Zero-Watermarking Algorithm for Tamper Detection in Text Documents. 2nd International Conference on Computer Engineering and Technology. pp. 378-382. IEEE.
  20. Z Jalil, A. Mirza, and M. Sabir, 2010. Content based Zero-Watermarking Algorithm for Authentication of Text Documents. (IJCSIS) International Journal of Computer Science and Information Security. Vol. 7. No. 2.
  21. Z. Jalil , A. Mirza, and T. Iqbal, 2010. A Zero-Watermarking Algorithm for Text Documents based on Structural Components. pp. 1-5. IEEE.
  22. M. Yingjie, G. Liming, W. Xianlong, and G. Tao, 2011. Chinese Text Zero-Watermark Based on Space Model. In Proceedings of I3rd International Workshop on Intelligent Systems and Applications, pp. 1-5, IEEE.
  23. S. Ranganathan, A. Johnsha, K. Kathirvel, and M. Kumar, 2010. Combined Text Watermarking. International Journal of Computer Science and Information Technologies. Vol. 1 (5). pp. 414-416.
  24. Fahd N. Al-Wesabi, Adnan Alsakaf, and Kulkarni U. Vasantrao, 2012. A Zero Text Watermarking Algorithm based on the Probabilistic weights for Content Authentication of Text Documents. in Proc. On International Journal of Computer Applications(IJCA). U. S. A. pp. 388 – 393.
  25. Fahd N. Al-Wesabi, Adnan Alsakaf, and Kulkarni U. Vasantrao, 2013. A Zero Text Watermarking Algorithm Based on the Probabilistic Patterns for Content Authentication of Text Documents. International Journal of Computer Engineering & Technology (IJCET). India. Vol. 4. Issue 1. pp. 284 – 300.
  26. Fahd N. Al-Wesabi, Adnan Alsakaf, and Kulkarni U. Vasantrao, 2012. English Text Zero-Watermark Based on Markov Model of Letter Level Order Two. Journal of Intelligent Computing. UK. Vol. 3. Issue. 4. pp. 137-155.
Index Terms

Computer Science
Information Sciences

Keywords

Markov Model Content Authentication Tampering Detection.