Combined Markov Model and Zero Watermarking Techniques to Enhance Content Authentication of English Text Documents

In this paper, we have extended the proposed LNMZW3 algorithm presented in [27] for content authentication and tamper detection of English text documents and abbreviated as ADV-LNMZW3. In the enhanced algorithm , third order and letterbased of Markov model has uses in this paper as soft computing tools in order to English text analyse in order to find the inter-relationships and utilize theses features to generate and detect a watermark in order to identify the status of text document such as authentic, or tampered.

[1]  S.H. Low,et al.  Capacity of text marking channel , 2000, IEEE Signal Processing Letters.

[2]  Anwar M. Mirza,et al.  Word length based zero-watermarking algorithm for tamper detection in text documents , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[3]  Mohamed Abdulla Suhail,et al.  Digital Watermarking for Protection of Intellectual Property , 2005 .

[4]  Benoit M. Macq,et al.  Natural Language Watermarking and Robust Hashing Based on Presuppositional Analysis , 2007, 2007 IEEE International Conference on Information Reuse and Integration.

[5]  Mikhail J. Atallah,et al.  The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions , 2006, MM&Sec '06.

[6]  Steven H. Low,et al.  Marking text documents , 1997, Proceedings of International Conference on Image Processing.

[7]  Sergei Nirenburg,et al.  Natural language processing for information assurance and security: an overview and implementations , 2001, NSPW '00.

[8]  Mi-Young Kim,et al.  Text watermarking by syntactic analysis , 2008 .

[9]  Anwar M. Mirza,et al.  A zero text watermarking algorithm based on non-vowel ASCII characters , 2010, 2010 International Conference on Educational and Information Technology.

[10]  Bülent Sankur,et al.  Natural language watermarking via morphosyntactic alterations , 2009, Comput. Speech Lang..

[11]  T. Shanmugapriya,et al.  A Study on Digital Watermarking Techniques , 2009 .

[12]  Anwar M. Mirza,et al.  Content based Zero-Watermarking Algorithm for Authentication of Text Documents , 2010, ArXiv.

[13]  Hong Yan,et al.  Interword distance changes represented by sine waves for watermarking text images , 2001, IEEE Trans. Circuits Syst. Video Technol..

[14]  Steven H. Low,et al.  Performance comparison of two text marking methods , 1998, IEEE J. Sel. Areas Commun..

[15]  Mikhail J. Atallah,et al.  Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation , 2001, Information Hiding.

[16]  Bülent Sankur,et al.  Syntactic tools for text watermarking , 2007, Electronic Imaging.

[17]  Suganya Ranganathan,et al.  Combined Text Watermarking , 2010 .

[18]  Tao Guo,et al.  Chinese Text Zero-Watermark Based on Space Model , 2011, 2011 3rd International Workshop on Intelligent Systems and Applications.

[19]  Zunera Jalil,et al.  A Review of Digital Watermarking Techniques for Text Documents , 2009, 2009 International Conference on Information and Multimedia Technology.

[20]  Weidong Zhao,et al.  Security Theory and Attack Analysis for Text Watermarking , 2009, 2009 International Conference on E-Business and Information System Security.

[21]  Anwar M. Mirza,et al.  A zero-watermarking algorithm for text documents based on structural components , 2010, 2010 International Conference on Information and Emerging Technologies.

[22]  Steven H. Low,et al.  Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.

[23]  Kulkarni U. Vasantrao,et al.  A Zero Text Watermarking Algorithm based on the Probabilistic weights for Content Authentication of Text Documents , 2012 .