Word length based zero-watermarking algorithm for tamper detection in text documents
Copyright protection and authentication of digital content has become a major concern in the current digital era. Plain text is the widely used means of information exchange on the Internet and it is essential to verify the authenticity of information in any form of communication. There are very lim...
Saved in:
Published in: | 2010 2nd International Conference on Computer Engineering and Technology Vol. 6; pp. V6-378 - V6-382 |
---|---|
Main Authors: | , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
01-04-2010
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | Copyright protection and authentication of digital content has become a major concern in the current digital era. Plain text is the widely used means of information exchange on the Internet and it is essential to verify the authenticity of information in any form of communication. There are very limited techniques available for plain text watermarking, authentication, and tamper detection. This paper presents a novel zero-watermarking algorithm for tamper detection in plain text documents. The algorithm generates a watermark based on the text contents which can be extracted later using extraction algorithm to identify the status of tampering in the text document. Experimental results demonstrate the effectiveness of the algorithm against random tampering attacks. Watermark pattern matching and watermark distortion rate are used as evaluation parameters on multiple text samples of varying length. |
---|---|
AbstractList | Copyright protection and authentication of digital content has become a major concern in the current digital era. Plain text is the widely used means of information exchange on the Internet and it is essential to verify the authenticity of information in any form of communication. There are very limited techniques available for plain text watermarking, authentication, and tamper detection. This paper presents a novel zero-watermarking algorithm for tamper detection in plain text documents. The algorithm generates a watermark based on the text contents which can be extracted later using extraction algorithm to identify the status of tampering in the text document. Experimental results demonstrate the effectiveness of the algorithm against random tampering attacks. Watermark pattern matching and watermark distortion rate are used as evaluation parameters on multiple text samples of varying length. |
Author | Mirza, A M Jabeen, H Jalil, Z |
Author_xml | – sequence: 1 givenname: Z surname: Jalil fullname: Jalil, Z email: zunera.jalil@nu.edu.pk organization: FAST Nat. Univ. of Comput. & Emerging Sci., Islamabad, Pakistan – sequence: 2 givenname: A M surname: Mirza fullname: Mirza, A M email: anwar.m.mirza@nu.edu.pk organization: FAST Nat. Univ. of Comput. & Emerging Sci., Islamabad, Pakistan – sequence: 3 givenname: H surname: Jabeen fullname: Jabeen, H email: hajira.jabeen@nu.edu.pk organization: FAST Nat. Univ. of Comput. & Emerging Sci., Islamabad, Pakistan |
BookMark | eNo1kMtKxDAYhSMq6Ix9Ad3kBTrm2iRLKaMODLgpuBzS9G8nOk2GNOLl6S04ns3h23wczgJdhBgAoVtKVpQSc7-p63WzYmRmKXRFtTxDCyqYEBUXhp6jwij9z4pfoWKa3sgcIVml6DVqXmPq8AHCkPe4tRN0-AdSLD9thjTa9O7DgO1hiMnn_Yj7mHC24xES7iCDyz4G7APO8JVxF93HCCFPN-iyt4cJilMvUfO4burncvvytKkftqU3JJe9UoZ1rTSctQys6rUzzpGWO2o5VbbStncUBG2lo5r3ShPJDJfSgeOESL5Ed39aDwC7Y_Lz3u_d6Qf-C2YGVDs |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICCET.2010.5486185 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 1424463491 1424463483 9781424463480 9781424463497 |
EndPage | V6-382 |
ExternalDocumentID | 5486185 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IH 6IK 6IL 6IN AAJGR ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
ID | FETCH-LOGICAL-i90t-f7792db5932b2ea7f8c9cc0b3c1a317a68afc1e41b5c183f780529355cec30053 |
IEDL.DBID | RIE |
ISBN | 9781424463473 1424463475 |
IngestDate | Wed Jun 26 19:24:03 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-f7792db5932b2ea7f8c9cc0b3c1a317a68afc1e41b5c183f780529355cec30053 |
ParticipantIDs | ieee_primary_5486185 |
PublicationCentury | 2000 |
PublicationDate | 2010-April |
PublicationDateYYYYMMDD | 2010-04-01 |
PublicationDate_xml | – month: 04 year: 2010 text: 2010-April |
PublicationDecade | 2010 |
PublicationTitle | 2010 2nd International Conference on Computer Engineering and Technology |
PublicationTitleAbbrev | ICCET |
PublicationYear | 2010 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000452671 |
Score | 1.5375873 |
Snippet | Copyright protection and authentication of digital content has become a major concern in the current digital era. Plain text is the widely used means of... |
SourceID | ieee |
SourceType | Publisher |
StartPage | V6-378 |
SubjectTerms | algorithm Authentication Communications technology Copyright protection Data mining Humans Information security Internet Pattern matching Rate distortion theory security tamper detection Watermarking |
Title | Word length based zero-watermarking algorithm for tamper detection in text documents |
URI | https://ieeexplore.ieee.org/document/5486185 |
Volume | 6 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA5uJ08qm_ibHDwal7ZJk5znxryIYEFvI01e3UBb6ToE_3qTtJ0IXrylObQlD_K-vHzf9xC6jrmUnGpNmKGUsIJFRBdKEAXWRBJSzYNPweJJPLzIu5m3ybnZaWEAIJDP4NYPw12-rczWl8omDl2nLr8M0EAo2Wq1dvUUbw2eiqjXbqUJE7y3dOqek140Q9XkfjqdZS2zq3vrr_YqIbvMD_73X4do_CPTw4-7BHSE9qAcoezZHSex74_SrLDPURZ_QV2RTx024VAax_rttarXzeodO8yKG-2wc40tNIGXVeJ1iT0hBPef3oxRNp9l0wXpWieQtaINKYRQsc25A2d5DFoU0ihjaJ6YSDvAoFOpCxMBi3LuIpIUobGBd1o3YLx_fXKMhmVVwgnCTJo4ynOgymqmdKwEWAFUmoLH2p2fT9HIL8jyozXHWHZrcfb39Dnab6_fPfXlAg2beguXaLCx26sQzm-rEZ2b |
link.rule.ids | 310,311,782,786,791,792,798,27934,54768 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA46D3pS2cTf5uDRuLRNmuY8NzacQ7Cgt5Gmr26grXQdgn-9SdpOBC_e0hzakgd5X16-73sIXfs8ijhVijBNKWEZ84jKpCASUu1FECrufArGT2L2Et0NrU3OzUYLAwCOfAa3duju8tNCr22prG_QdWjyyzba4czA5FqttamoWHPwUHiteisMmOCtqVPzHLSyGSr7k8FgGNfcrua9vxqsuPwy2v_fnx2g3o9QDz9uUtAh2oK8i-Jnc6DEtkNKtcA2S6X4C8qCfCq3DbviOFZvr0W5rBbv2KBWXCmDnkucQuWYWTle5thSQnD76VUPxaNhPBiTpnkCWUpakUwI6acJN_As8UGJLNJSa5oE2lMGMqgwUpn2gHkJNzEJMtfawHqta9DWwT44Qp28yOEYYRZp30sSoDJVTCpfCkgF0Ehn3FfmBH2CunZB5h-1Pca8WYvTv6ev0O44fpjOp5PZ_Rnaqy_jLRHmHHWqcg0XaHuVri9daL8BLLeg7Q |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+2nd+International+Conference+on+Computer+Engineering+and+Technology&rft.atitle=Word+length+based+zero-watermarking+algorithm+for+tamper+detection+in+text+documents&rft.au=Jalil%2C+Z&rft.au=Mirza%2C+A+M&rft.au=Jabeen%2C+H&rft.date=2010-04-01&rft.pub=IEEE&rft.isbn=9781424463473&rft.volume=6&rft.spage=V6-378&rft.epage=V6-382&rft_id=info:doi/10.1109%2FICCET.2010.5486185&rft.externalDocID=5486185 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424463473/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424463473/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424463473/sc.gif&client=summon&freeimage=true |