State-of-the-Art in Techniques of Text Digital Watermarking: Challenges and Limitations

Data protection from malicious attacks and misuse has become a crucial issue. Various types of data, including images, videos, audio and text documents, have given cause for the development of different methods for their protection. Cryptography, digital signatures and steganography are the most well known technologies used to protect data. During the last decade, digital watermarking technology has also been utilized as an alternative to prevent media forgery and tampering or falsification to ensure both copyright and authentication. Much work has been done to protect images, videos and audio but only a few algorithms have been considered for text document protection with digital watermarking. However, our survey observed that available text watermarking algorithms are neither robust nor imperceptible and as such remain unsecured methods of protection. Hence, research to improve the performance of text watermarking algorithms is required. This paper reviews current watermarking algorithms for text documents and categorizes text watermarking methods based on the way the text was treated during the watermarking process. It also discusses merits and demerits of available methods as well as recent proposed methods for evaluating text watermarking systems and the need for further research on digital text watermarking.

[1]  K. U. Jaseena,et al.  Text Watermarking using Combined Image and Text for Authentication and Protection , 2011 .

[2]  Mohammad Ali Doostari,et al.  A New Method to Persian Text Watermarking Using Curvaceous Letters , 2013 .

[3]  Borko Furht,et al.  Survey of Watermarking Techniques and Applications , 2004 .

[4]  Mikhail J. Atallah,et al.  Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation , 2001, Information Hiding.

[5]  KokSheik Wong,et al.  UniSpaCh: A text-based data hiding method using Unicode space characters , 2012, J. Syst. Softw..

[6]  Kenneth L. Levy,et al.  Digital Watermarking Framework Applications, Parameters, and Requirements , 2004 .

[7]  Chee Hon Lew,et al.  Using Combined Pseudo-Random Number Generator with Digital Text-based Watermarking for Cryptography Application , 2012 .

[8]  Roberto Caldelli,et al.  Reversible Watermarking Techniques: An Overview and a Classification , 2010, EURASIP J. Inf. Secur..

[9]  N.B. Puhan,et al.  Erasable Authentication Watermarking in Binary Document Images , 2007, Second International Conference on Innovative Computing, Informatio and Control (ICICIC 2007).

[10]  Xiaowei Liu,et al.  Research on Polymorphism in Digital Text Watermarking , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[11]  Darko Kirovski,et al.  New Trends and Challenges in Digital Watermarking Technology: Applications for Printed Materials , 2006 .

[12]  Martin Steinebach,et al.  Natural language watermarking for german texts , 2013, IH&MMSec '13.

[13]  Anwar M. Mirza,et al.  A NOVEL TEXT WATERMARKING ALGORITHM USING IMAGE WATERMARK , 2010 .

[14]  Weidong Zhao,et al.  Security Theory and Attack Analysis for Text Watermarking , 2009, 2009 International Conference on E-Business and Information System Security.

[15]  Adnan Abdul-Aziz Gutub,et al.  e-Text Watermarking: Utilizing 'Kashida' Extensions in Arabic Language Electronic Writing , 2010 .

[16]  Anwar M. Mirza,et al.  Content based Zero-Watermarking Algorithm for Authentication of Text Documents , 2010, ArXiv.

[17]  Zhihua Xia,et al.  Print-Scan Resilient Watermarking for the Chinese Text Image , 2013 .

[18]  Fazal Wahab,et al.  Key Based Text Watermarking of E-Text Documents in an Object Based Environment Using Z-Axis for Watermark Embedding , 2008 .

[19]  Xinmin Zhou,et al.  Attack Model and Performance Evaluation of Text Digital Watermarking , 2010, J. Comput..

[20]  Hong Yan,et al.  Interword distance changes represented by sine waves for watermarking text images , 2001, IEEE Trans. Circuits Syst. Video Technol..

[21]  Teddy Furon,et al.  A New Measure of Watermarking Security Applied on QIM , 2012, Information Hiding.

[22]  Rajeev Kumar Singh,et al.  A Survey: Digital Image Watermarking Techniques , 2014 .

[23]  Anwar M. Mirza,et al.  An Invisible Text Watermarking Algorithm using Image Watermark , 2009, SCSS.

[24]  Prabhishek Singh,et al.  A Survey of Digital Watermarking Techniques, Applications and Attacks , 2013 .

[25]  Bülent Sankur,et al.  Natural language watermarking via morphosyntactic alterations , 2009, Comput. Speech Lang..

[26]  Anwar M. Mirza,et al.  Word length based zero-watermarking algorithm for tamper detection in text documents , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[27]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[28]  Wen-Tai Hsieh,et al.  Natural Language Watermarking Using Semantic Substitution for Chinese Text , 2003, IWDW.

[29]  J. B. Patil,et al.  Implementation of Text Watermarking Technique Using Natural Language Watermarks , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[30]  Mikhail J. Atallah,et al.  The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions , 2006, MM&Sec '06.

[31]  N. N. Patil,et al.  Implementation of a new technique for web document protection using unicode , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[32]  Yasser M. Alginahi,et al.  An enhanced Kashida-based watermarking approach for Arabic text-documents , 2013, 2013 International Conference on Electronics, Computer and Computation (ICECCO).

[33]  Ton Kalker,et al.  A Cryptographic Method for Secure Watermark Detection , 2006, Information Hiding.

[34]  Subariah Ibrahim,et al.  Printed Document Authentication Using Watermarking Technique , 2010, 2010 Second International Conference on Computational Intelligence, Modelling and Simulation.

[35]  Min Du,et al.  Text Watermarking Algorithm based on Human Visual Redundancy , 2011 .

[36]  Kyung-Ae Moon,et al.  A text watermarking algorithm based on word classification and inter-word space statistics , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..

[37]  M.A. Qadir,et al.  Digital text watermarking: secure content delivery and data hiding in digital documents , 2005, Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology.

[38]  Xu Rui,et al.  A Multiple Watermarking Algorithm for Texts Mixed Chinese and English , 2013 .

[39]  A. Sathesh,et al.  Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding Techniques towards Geometric Attacks , 2010 .

[40]  Lu He,et al.  An active attack on chaotic based text zero-watermarking , 2013, IEEE Conference Anthology.

[41]  Nighat Mir,et al.  Copyright for web content using invisible text watermarking , 2014, Comput. Hum. Behav..

[42]  Benoit M. Macq,et al.  Natural Language Watermarking and Robust Hashing Based on Presuppositional Analysis , 2007, 2007 IEEE International Conference on Information Reuse and Integration.

[43]  Xianghong Tang,et al.  Reversible Text Watermarking Algorithm Using Prediction-error Expansion Method , 2013 .

[44]  Adnan M. Alattar,et al.  Watermarking electronic text documents containing justified paragraphs and irregular line spacing , 2004, IS&T/SPIE Electronic Imaging.

[45]  Sukhpreet Kaur A Zero-Watermarking algorithm on multiple occurrences of letters for text tampering detection , 2013 .

[46]  Alex ChiChung Kot,et al.  Semi-fragile watermarking for text document images authentication , 2005, 2005 IEEE International Symposium on Circuits and Systems.

[47]  Hae Yong Kim,et al.  Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images , 2006, Anais do VI Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2006).

[48]  Yuling Liu,et al.  Cloud Model Based Zero-Watermarking Algorithm for Authentication of Text Document , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[49]  Junzhong Gu,et al.  An Optimized Natural Language Watermarking Algorithm based on TMR , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[50]  Fahd N. Al-Wesabi,et al.  Content Authentication of English Text via Internet using Zero Watermarking Technique and Markov Model , 2014 .

[51]  Mi-Young Kim,et al.  Text watermarking by syntactic analysis , 2008 .

[52]  Zunera Jalil,et al.  Text Watermarking Using Combined Image-plus-Text Watermark , 2010, 2010 Second International Workshop on Education Technology and Computer Science.

[53]  Bonnie Lynn Webber,et al.  Natural Language I , 1989, HLT.

[54]  Tao Guo,et al.  Chinese Text Zero-Watermark Based on Sentence's Entropy , 2010, 2010 International Conference on Multimedia Technology.

[55]  Jinqiao Shi,et al.  A Multiple Watermarking Algorithm for Texts Mixed Chinese and English , 2013, ITQM.

[56]  S. A. Shah,et al.  Utilization of Maximum Data Hiding Capacity in Object-Based Text Document Authentication , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[57]  Xiaoming Xu,et al.  A New Zero-Watermarking Scheme Based on Features Extraction for Authentication of Text , 2011 .

[58]  Chee Hon Lew,et al.  Design and Implementation of Text based Watermarking combined with Pseudo-Random Number Generator ( PRNG ) for Cryptography Application , 2013 .

[59]  Xingming Sun,et al.  A Natural Language Watermarking Based on Chinese Syntax , 2005, ICNC.