A zero watermarking approach for content authentication and tampering detection of Arabic text based on fourth level order and word mechanism of Markov model

Abstract Text information is a natural language dependent. Therefore, improving security and reliability of text information exchanged via Internet network has become one of the most challenges faced by researchers. Content authentication, integrity verification and tampering detection of digital contents have become a major concern in the communication and information exchange area via the Internet. In this paper, an intelligent text Zero-Watermarking approach called ZWAFWMMM (Zero-Watermarking Approach based on Fourth level order of Word Mechanism of Markov Model) has been proposed for content authentication and tampering detection of Arabic text contents. In ZWAFWMMM, watermark embedding and tampering detection were performed logically in which no need to alter the original text document to embed a watermark. Fourth-level order of word mechanism based on hidden Markov model has been integrated with digital zero-watermarking techniques to improve performance, accuracy, capacity and robustness of the previous literature proposed by researchers. Moreover, Fourth-Level order of Markov model is used as a soft computing technique for analysing Arabic text and extracting the interrelationship features from the context of a text, and then utilizing the extracted features as a watermark information to be validated later with attacked Arabic text to detect any tampering that may occur in the text. ZWAFWMMM has been implemented by using PHP with VS code IDE. Robustness, effectiveness, and applicability of ZWAFWMMM are proved with several scenarios of simulations and experiments using four datasets of different lengths under multiple random locations of insertion, reorder and deletion attacks of experimental datasets. The experiment results show that ZWAFWMMM is more sensitive for all kinds of tampering attacks with a high-level accuracy in tampering detection.

[1]  Asadullah Shah,et al.  A Novel Text Steganography Technique to Arabic Language Using Reverse Fat5Th5Ta , 2015 .

[2]  Ersin Elbasi,et al.  Hybrid Non-Blind Watermarking Based on DWT and SVD , 2014 .

[3]  Yuexin Zhang,et al.  A text zero-watermarking algorithm based on Chinese phonetic alphabets , 2016, Wuhan University Journal of Natural Sciences.

[4]  Chi-Man Pun,et al.  Reversible data-hiding in encrypted images by redundant space transfer , 2018, Inf. Sci..

[5]  M. Shamim Hossain,et al.  New Zero-Watermarking Algorithm Using Hurst Exponent for Protection of Privacy in Telemedicine , 2018, IEEE Access.

[6]  Lip Yee Por,et al.  A Review of Text Watermarking: Theory, Methods, and Applications , 2018, IEEE Access.

[7]  Khier Benmahammed,et al.  Blind image watermarking technique based on differential embedding in DWT and DCT domains , 2015, EURASIP Journal on Advances in Signal Processing.

[8]  Mohamed Elhoseny,et al.  Dual watermarking framework for privacy protection and content authentication of multimedia , 2019, Future Gener. Comput. Syst..

[9]  Hanaa Mohsin Ahmed,et al.  Comparison of Eight Proposed Security Methods using Linguistic Steganography Text , 2016 .

[10]  Lamiaa A. Elrefaei,et al.  Arabic Text Watermarking: A Review , 2015, ArXiv.

[11]  Yuling Liu,et al.  A zero-watermarking algorithm based on merging features of sentences for Chinese text , 2015 .

[12]  K E Balachandrudu,et al.  Text Watermarking Using Combined Image & Text , 2014 .

[13]  Tanveer A. Zia,et al.  A zero-watermarking algorithm for privacy protection in biomedical signals , 2017, Future Gener. Comput. Syst..

[14]  Mansoor Ahmed,et al.  Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks , 2017, Future Gener. Comput. Syst..

[15]  Yen-Shou Lai,et al.  A zero-watermark scheme with geometrical invariants using SVM and PSO against geometrical attacks for image protection , 2013, J. Syst. Softw..

[16]  Elisa Bertino,et al.  On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques , 2016, IEEE Access.

[17]  Mohd Yamani Idna Idris,et al.  Approaches for preserving content integrity of sensitive online Arabic content: A survey and research challenges , 2019, Inf. Process. Manag..

[18]  Asha Rani,et al.  A Zero-Watermarking Scheme using Discrete Wavelet Transform☆ , 2015 .

[19]  Manpreet Kaur,et al.  Encryption based LSB Steganography Technique for Digital Images and Text Data , 2016 .

[20]  O. Tayan,et al.  A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents , 2014, TheScientificWorldJournal.

[21]  Amjad Rehman,et al.  Replacement Attack: A New Zero Text Watermarking Attack , 2017 .

[22]  Javaid A. Sheikh,et al.  StegNmark: A Joint Stego-Watermark Approach for Early Tamper Detection , 2017 .

[23]  Sana Ullah,et al.  Chaos-based robust method of zero-watermarking for medical signals , 2018, Future Gener. Comput. Syst..

[24]  Muhammad Nomani Kabir,et al.  An enhanced Kashida-based watermarking approach for increased protection in Arabic text-documents based on frequency recurrence of characters , 2014 .

[25]  Javaid A. Sheikh,et al.  Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication , 2020, Future Gener. Comput. Syst..

[26]  Lamiaa A. Elrefaei,et al.  Improved capacity Arabic text watermarking methods based on open word space , 2017, J. King Saud Univ. Comput. Inf. Sci..

[27]  Wan Azizun Wan Adnan,et al.  Robust Digital Text Watermarking Algorithm based on Unicode Extended Characters , 2016 .

[28]  Farida Ridzuan,et al.  Text Steganography using Extensions Kashida based on the Moon and Sun Letters Concept , 2017 .

[29]  Swaminathan Pitchai Iyer,et al.  Hybrid transform based reversible watermarking technique for medical images in telemedicine applications , 2017 .

[30]  Kulkarni U. Vasantrao,et al.  A Zero Text Watermarking Algorithm based on the Probabilistic weights for Content Authentication of Text Documents , 2012 .