Text Watermarking Algorithm based on Human Visual Redundancy

Text digital watermarking, which is an important research direction of information hiding, can be used for copyright protection of text document. This paper proposed a text digital watermarking algorithm based on human visual redundancy. As the human eye is not sensitive to the slight change for text color, watermarks were embedded by changing the low-4 of RGB color components of characters. Experiment shows that the proposed method has good invisibility and robustness to resist deletion, modification attack etc. As long as there are N/8.6 consecutive characters left in the document, the watermarks can still be extracted completely using proposed algorithm.

[1]  Ingemar J. Cox,et al.  The First 50 Years of Electronic Watermarking , 2002, EURASIP J. Adv. Signal Process..

[2]  Sangjin Lee,et al.  A Tool for the Detection of Hidden Data in Microsoft Compound Document File Format , 2008, 2008 International Conference on Information Science and Security (ICISS 2008).

[3]  Xingming Sun,et al.  Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers , 2005, ICNC.

[4]  Wen-Hsiang Tsai,et al.  A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique , 2007, IEEE Transactions on Information Forensics and Security.

[5]  Mikhail J. Atallah,et al.  The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions , 2006, MM&Sec '06.

[6]  Jungyeop Kim Robust Vector Digital Watermarking Using Angles and a Random Table , 2010, Adv. Inf. Sci. Serv. Sci..

[7]  Neha Agrawal,et al.  DCT Domain Message Embedding in Spread-Spectrum Steganography System , 2009, 2009 Data Compression Conference.

[8]  Hong Yan,et al.  Interword distance changes represented by sine waves for watermarking text images , 2001, IEEE Trans. Circuits Syst. Video Technol..

[9]  Sajad Shirali-Shahreza,et al.  Real-time and MPEG-1 layer III compression resistant steganography in speech , 2010, IET Inf. Secur..

[10]  Mikhail J. Atallah,et al.  Information hiding through errors: a confusing approach , 2007, Electronic Imaging.

[11]  Xingming Sun,et al.  A Novel Watermark Embedding and Detection Scheme Based on Zero- Knowledge Proof , 2011 .

[12]  Zhihua Xia,et al.  Invertible Transform-Based Reversible Text Watermarking , 2010 .

[13]  Steven H. Low,et al.  Performance comparison of two text marking methods , 1998, IEEE J. Sel. Areas Commun..

[14]  Mohamed F. Younis,et al.  Chestega: chess steganography methodology , 2009, Secur. Commun. Networks.

[15]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[16]  Bülent Sankur,et al.  Natural language watermarking via morphosyntactic alterations , 2009, Comput. Speech Lang..

[17]  Sergei Nirenburg,et al.  Natural language processing for information assurance and security: an overview and implementations , 2001, NSPW '00.

[18]  Steven H. Low,et al.  Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.

[19]  Claudio Soriente,et al.  Taking advantages of a disadvantage: Digital forensics and steganography using document metadata , 2007, J. Syst. Softw..