Word length based zero-watermarking algorithm for tamper detection in text documents

Copyright protection and authentication of digital content has become a major concern in the current digital era. Plain text is the widely used means of information exchange on the Internet and it is essential to verify the authenticity of information in any form of communication. There are very lim...

Full description

Saved in:
Bibliographic Details
Published in:2010 2nd International Conference on Computer Engineering and Technology Vol. 6; pp. V6-378 - V6-382
Main Authors: Jalil, Z, Mirza, A M, Jabeen, H
Format: Conference Proceeding
Language:English
Published: IEEE 01-04-2010
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Copyright protection and authentication of digital content has become a major concern in the current digital era. Plain text is the widely used means of information exchange on the Internet and it is essential to verify the authenticity of information in any form of communication. There are very limited techniques available for plain text watermarking, authentication, and tamper detection. This paper presents a novel zero-watermarking algorithm for tamper detection in plain text documents. The algorithm generates a watermark based on the text contents which can be extracted later using extraction algorithm to identify the status of tampering in the text document. Experimental results demonstrate the effectiveness of the algorithm against random tampering attacks. Watermark pattern matching and watermark distortion rate are used as evaluation parameters on multiple text samples of varying length.
AbstractList Copyright protection and authentication of digital content has become a major concern in the current digital era. Plain text is the widely used means of information exchange on the Internet and it is essential to verify the authenticity of information in any form of communication. There are very limited techniques available for plain text watermarking, authentication, and tamper detection. This paper presents a novel zero-watermarking algorithm for tamper detection in plain text documents. The algorithm generates a watermark based on the text contents which can be extracted later using extraction algorithm to identify the status of tampering in the text document. Experimental results demonstrate the effectiveness of the algorithm against random tampering attacks. Watermark pattern matching and watermark distortion rate are used as evaluation parameters on multiple text samples of varying length.
Author Mirza, A M
Jabeen, H
Jalil, Z
Author_xml – sequence: 1
  givenname: Z
  surname: Jalil
  fullname: Jalil, Z
  email: zunera.jalil@nu.edu.pk
  organization: FAST Nat. Univ. of Comput. & Emerging Sci., Islamabad, Pakistan
– sequence: 2
  givenname: A M
  surname: Mirza
  fullname: Mirza, A M
  email: anwar.m.mirza@nu.edu.pk
  organization: FAST Nat. Univ. of Comput. & Emerging Sci., Islamabad, Pakistan
– sequence: 3
  givenname: H
  surname: Jabeen
  fullname: Jabeen, H
  email: hajira.jabeen@nu.edu.pk
  organization: FAST Nat. Univ. of Comput. & Emerging Sci., Islamabad, Pakistan
BookMark eNo1kMtKxDAYhSMq6Ix9Ad3kBTrm2iRLKaMODLgpuBzS9G8nOk2GNOLl6S04ns3h23wczgJdhBgAoVtKVpQSc7-p63WzYmRmKXRFtTxDCyqYEBUXhp6jwij9z4pfoWKa3sgcIVml6DVqXmPq8AHCkPe4tRN0-AdSLD9thjTa9O7DgO1hiMnn_Yj7mHC24xES7iCDyz4G7APO8JVxF93HCCFPN-iyt4cJilMvUfO4burncvvytKkftqU3JJe9UoZ1rTSctQys6rUzzpGWO2o5VbbStncUBG2lo5r3ShPJDJfSgeOESL5Ed39aDwC7Y_Lz3u_d6Qf-C2YGVDs
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCET.2010.5486185
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1424463491
1424463483
9781424463480
9781424463497
EndPage V6-382
ExternalDocumentID 5486185
Genre orig-research
GroupedDBID 6IE
6IF
6IH
6IK
6IL
6IN
AAJGR
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-f7792db5932b2ea7f8c9cc0b3c1a317a68afc1e41b5c183f780529355cec30053
IEDL.DBID RIE
ISBN 9781424463473
1424463475
IngestDate Wed Jun 26 19:24:03 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-f7792db5932b2ea7f8c9cc0b3c1a317a68afc1e41b5c183f780529355cec30053
ParticipantIDs ieee_primary_5486185
PublicationCentury 2000
PublicationDate 2010-April
PublicationDateYYYYMMDD 2010-04-01
PublicationDate_xml – month: 04
  year: 2010
  text: 2010-April
PublicationDecade 2010
PublicationTitle 2010 2nd International Conference on Computer Engineering and Technology
PublicationTitleAbbrev ICCET
PublicationYear 2010
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000452671
Score 1.5375873
Snippet Copyright protection and authentication of digital content has become a major concern in the current digital era. Plain text is the widely used means of...
SourceID ieee
SourceType Publisher
StartPage V6-378
SubjectTerms algorithm
Authentication
Communications technology
Copyright protection
Data mining
Humans
Information security
Internet
Pattern matching
Rate distortion theory
security
tamper detection
Watermarking
Title Word length based zero-watermarking algorithm for tamper detection in text documents
URI https://ieeexplore.ieee.org/document/5486185
Volume 6
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA5uJ08qm_ibHDwal7ZJk5znxryIYEFvI01e3UBb6ToE_3qTtJ0IXrylObQlD_K-vHzf9xC6jrmUnGpNmKGUsIJFRBdKEAXWRBJSzYNPweJJPLzIu5m3ybnZaWEAIJDP4NYPw12-rczWl8omDl2nLr8M0EAo2Wq1dvUUbw2eiqjXbqUJE7y3dOqek140Q9XkfjqdZS2zq3vrr_YqIbvMD_73X4do_CPTw4-7BHSE9qAcoezZHSex74_SrLDPURZ_QV2RTx024VAax_rttarXzeodO8yKG-2wc40tNIGXVeJ1iT0hBPef3oxRNp9l0wXpWieQtaINKYRQsc25A2d5DFoU0ihjaJ6YSDvAoFOpCxMBi3LuIpIUobGBd1o3YLx_fXKMhmVVwgnCTJo4ynOgymqmdKwEWAFUmoLH2p2fT9HIL8jyozXHWHZrcfb39Dnab6_fPfXlAg2beguXaLCx26sQzm-rEZ2b
link.rule.ids 310,311,782,786,791,792,798,27934,54768
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA46D3pS2cTf5uDRuLRNmuY8NzacQ7Cgt5Gmr26grXQdgn-9SdpOBC_e0hzakgd5X16-73sIXfs8ijhVijBNKWEZ84jKpCASUu1FECrufArGT2L2Et0NrU3OzUYLAwCOfAa3duju8tNCr22prG_QdWjyyzba4czA5FqttamoWHPwUHiteisMmOCtqVPzHLSyGSr7k8FgGNfcrua9vxqsuPwy2v_fnx2g3o9QDz9uUtAh2oK8i-Jnc6DEtkNKtcA2S6X4C8qCfCq3DbviOFZvr0W5rBbv2KBWXCmDnkucQuWYWTle5thSQnD76VUPxaNhPBiTpnkCWUpakUwI6acJN_As8UGJLNJSa5oE2lMGMqgwUpn2gHkJNzEJMtfawHqta9DWwT44Qp28yOEYYRZp30sSoDJVTCpfCkgF0Ehn3FfmBH2CunZB5h-1Pca8WYvTv6ev0O44fpjOp5PZ_Rnaqy_jLRHmHHWqcg0XaHuVri9daL8BLLeg7Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+2nd+International+Conference+on+Computer+Engineering+and+Technology&rft.atitle=Word+length+based+zero-watermarking+algorithm+for+tamper+detection+in+text+documents&rft.au=Jalil%2C+Z&rft.au=Mirza%2C+A+M&rft.au=Jabeen%2C+H&rft.date=2010-04-01&rft.pub=IEEE&rft.isbn=9781424463473&rft.volume=6&rft.spage=V6-378&rft.epage=V6-382&rft_id=info:doi/10.1109%2FICCET.2010.5486185&rft.externalDocID=5486185
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424463473/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424463473/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424463473/sc.gif&client=summon&freeimage=true