We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

An Existential Review on Text Watermarking Techniques

by Manmeet Kaur, Kamna Mahajan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 120 - Number 18
Year of Publication: 2015
Authors: Manmeet Kaur, Kamna Mahajan
10.5120/21330-4300

Manmeet Kaur, Kamna Mahajan . An Existential Review on Text Watermarking Techniques. International Journal of Computer Applications. 120, 18 ( June 2015), 29-32. DOI=10.5120/21330-4300

@article{ 10.5120/21330-4300,
author = { Manmeet Kaur, Kamna Mahajan },
title = { An Existential Review on Text Watermarking Techniques },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 120 },
number = { 18 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 29-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume120/number18/21330-4300/ },
doi = { 10.5120/21330-4300 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:06:35.057845+05:30
%A Manmeet Kaur
%A Kamna Mahajan
%T An Existential Review on Text Watermarking Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 120
%N 18
%P 29-32
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays, with the extensive use of internet all over the world, most of the government, public and private data are increasingly being published on internet. The protection of these online documents is the need of the hour and need to be dealt with urgently. Text watermarking is the technique which helps to protect the authenticity and integrity of text documents by inserting watermarks in the text. Text watermarking is an active area of research from several years. This paper presents a review of various text watermarking techniques described in literature. We also highlight the security issues like copyright protection, tamper detection and data hiding which need to be focussed for ensuring text security.

References
  1. Makarand L. Mali, Nitin N. Patil and J. B. Patil . 2013. Implementation of Text Watermarking Technique Using Natural Language Watermarks. International Conference on Communication Systems and Network Technologies.
  2. Ingemar J. Cox and Matt L. Miller 2002. The First 50 Years of Electronic Watermarking. EURASIP Journal on Apllied Signal Processing. Issue 2, pp. 126-132.
  3. Xinmin Zhou, Weidong Zhao, Sichun Wang and Rui Peng, 2009. A Semi-FragileWatermarking Scheme for Content Authentication of Chinese Text Documents. IEEE.
  4. Zunera Jalil, Anwar M. Mirza and Tahir Iqbal,. 2010. A Zero-Watermarking Algorithm for Text Documents based on Structural Components. IEEE.
  5. Suganya Ranganathan , Ahamed Johnsha Ali, Kathirvel. K & Mohan Kumar. M, 2010. Combined Text Watermarking. International Journal of Computer Science and Information Technologies. Volume 1, No. 5.
  6. Zunera Jalil and Anwar M. Mirza. 2009. A Review of Digital Watermarking Techniques for Text Documents. International Conference on Information and Multimedia Technology.
  7. Zunera Jalil, M. Arfan Jaffar and Anwar M. Mirza. 2011. A Novel Text Watermarking Algorithm Using Image Watermark. International Journal of Innovative Computing, Information and Control . Volume 7, No. 3.
  8. Patil Bharati Devidas and Patil Nitin Namdeo. 2012. Text Watermarking algorithm using structural approach. IEEE.
  9. Mi-Young Kim, Osmar R. Zaiane, and Randy Goebel . Natural Language Watermarking Based on Syntactic Displacement and Morphological Division.
  10. Jaseena K. U. and Anita John. 2011. Text Watermarking using Combined Image and Text for Authentication and Protection. International Journal of Computer Applications. Volume 20– No. 4.
  11. Yingli Zhang and Huaiqing Qin. 2010. A Novel Robust Text Watermarking For Word Document. IEEE.
  12. Zhangjie Fu, Xingming Sun, Jiangang Shu and Lu Zhou,. 2014. Plain Text Zero Knowledge Watermarking Detection Based on Asymmetric Encryption. Advanced Science and Technology Letters. Vol. 48.
  13. Min Du and Quanyou Zhao. 2011. Text Watermarking Algorithm based on Human Visual Redundancy. Advanced in Information Sciences and Service Science. Volume 3, Number 5.
  14. Zhangjie Fu, Xingming Sun, Jiangang Shu, Lu Zhou and Jin Wang 2014. Verifiable Text Watermarking Detection to Improve Security. International Journal of Security and Its Applications . Vol. 8, No. 5.
  15. Leena Goyal, Manoj raman, Prateek Divan and Mukaesh Kumar Vijay2014. A Robust Method for Integrity Protection Of Digital Data in Text Document Watermarking. International Journal for Innovative Research in Science & Technology. Volume 1, Issue 6.
  16. Chee Hon Lew and Chaw Seng Woo. 2013. Design and Implementation of Text based Watermarking combined with Pseudo-Random Number Generator(PRNG) for Cryptography Application. Latest Trends in Applied Computational Science.
  17. Omar Tayan, Yasser M. Alginahi and Muhammed N. Kabir. 2013. An Adaptive Zero-Watermarking Approach for Authentication and Protection of Sensitive Text Documents. International conference on advances in computer and information technology – ACIT. Vol. 1.
  18. Sukhpreet Kaur and Geetanjali Babbar. 2013. A Zero-Watermarking algorithm on multiple occurrences of letters for text tampering detection. International Journal on Computer Science and Engineering. Vol. 5, No. 05.
  19. Sonia Bajaj and Manshi Shukla. 2014. Performance Evaluation of an approach for Secret data transfer using interpolation and LSB substitution with Watermarking. International Journal of Computer Science and Information Technologies. Vol. 5 (5).
  20. Priyanka Verma, Rakhshan Anjum Shaikh and Ketki Deshmukh. 2013. A Novel Approach to Angle based Invisible
Index Terms

Computer Science
Information Sciences

Keywords

Text watermarking Copyright Protection Security Encryption Tampering.