Comparative Analysis on Text Watermarking Techniques: Literature Review

Authors

  • Ahmed Abdulameer Naji Department of Computer of Information System, University of Al-Qadisiyah, Al-Diwaniya, Iraq
  • Salwa Shakir Baawi Department of Computer of Information System, University of Al-Qadisiyah, Al-Diwaniya, Iraq

Keywords:

information security, watermarking, text watermarking, data hiding, categories.

Abstract

One of the common vast practices used for text authentication and ownership verification nowadays is through an information-hiding technique known as watermarking, which dates back to the 1990s. This paper investigates digital watermarking and its techniques that primarily focus on text watermarking. At the same time, it also tries to give a distinctive taxonomy in dealing with watermarking based on each technique. Two types of watermarking taxonomy were discussed, that includes of the type technique and attack. Techniques of text watermarking can then be further separated into three categories: embedding, approaches, and extraction. The approaches of text watermarking can be split into four categories: structure or format-based methods, text-image-based, zero-text watermarking, and linguistics ways. Ways belonging to each category were studied, and comparisons between each way are introduced by highlighting the findings. This paper also confirmed that there are principal requirements that require to be further explored and taken into account in the design of future watermarking systems, which are imperceptibility, capacity, security, and robustness.

Downloads

Download data is not yet available.

References

J. Chen, F. Yang, H. Ma, and Q. Lu, “Text watermarking algorithm based on semantic role labeling,” 2016 3rd Int. Conf. Digit. Inf. Process. Data Mining, Wirel. Commun. DIPDMWC 2016, pp. 117–120, 2016.

A. L. I. A. R. Alkhafaji, N. Nur, A. Sjarif, and M. A. Shahidan, “Digital Text Watermarking Techniques Classification and Open Research Challenges : A Review,” J. Technol. Reports Kansai Univ., vol. 62, no. 05, pp. 2203–2220, 2020.

N. A. A. S. Al-Maweri, R. Ali, W. A. Wan Adnan, A. R. Ramli, and S. M. S. A. Abdul Rahman, “State-of-the-art in techniques of text digital watermarking: Challenges and Limitations,” J. Comput. Sci., vol. 12, no. 2, pp. 62–80, 2016, doi: 10.3844/jcssp.2016.62.80.

A. K. Singh, M. Dave, and A. Mohan, “Wavelet Based Image Watermarking: Futuristic Concepts in Information Security,” Proc. Natl. Acad. Sci. India Sect. A - Phys. Sci., vol. 84, no. 3, pp. 345–359, 2014, doi: 10.1007/s40010-014-0140-x.

A. A. Mohamed, “An improved algorithm for information hiding based on features of Arabic text: A Unicode approach,” Egypt. Informatics J., vol. 15, no. 2, pp. 79–87, 2014.

N. S. Kamaruddin, A. Kamsin, L. Y. Por, and H. Rahman, “A Review of Text Watermarking: Theory, Methods, and Applications,” IEEE Access, vol. 6, pp. 8011–8028, 2018.

S. Kumar, B. K. Singh, and M. Yadav, “A Recent Survey on Multimedia and Database Watermarking,” Multimed. Tools Appl., vol. 79, no. 27–28, pp. 20149–20197, 2020.

M. M. Iqbal, U. Khadam, K. J. Han, J. Han, and S. Jabbar, “A robust digital watermarking algorithm for text document copyright protection based on feature coding,” 2019 15th Int. Wirel. Commun. Mob. Comput. Conf. IWCMC 2019, pp. 1940–1945, 2019.

M. Taleby Ahvanooey, Q. Li, X. Zhu, M. Alazab, and J. Zhang, “ANiTW: A Novel Intelligent Text Watermarking technique for forensic identification of spurious information on social media,” Comput. Secur., vol. 90, pp. 1–14, 2020, doi: 10.1016/j.cose.2019.101702.

M. Agarwal, “Text steganographic approaches: a comparison,” Int. J. Netw. Secur. Its Appl., vol. 5, no. 1, pp. 91–106, 2013.

A. Taha, A. S. Hammad, and M. M. Selim, “A high capacity algorithm for information hiding in Arabic text,” J. King Saud Univ. - Comput. Inf. Sci., 2018, doi: 10.1016/j.jksuci.2018.07.007.

N. Alanazi, E. Khan, and A. Gutub, “Inclusion of Unicode Standard seamless characters to expand Arabic text steganography for secure individual uses,” J. King Saud Univ. - Comput. Inf. Sci., no. xxxx, 2020, doi: 10.1016/j.jksuci.2020.04.011.

R. A. Alotaibi and L. A. Elrefaei, “Improved capacity Arabic text watermarking methods based on open word space,” J. King Saud Univ. - Comput. Inf. Sci., vol. 30, pp. 236–248, 2018.

R. A. Alotaibi and L. A. Elrefaei, “Arabic text watermarking: A review,” Int. J. Artif. Intell. Appl., vol. 6, no. 4, pp. 1–16, 2015.

S. G. Rizzo, F. Bertini, and D. Montesi, “Content-preserving text watermarking through unicode homoglyph substitution,” ACM Int. Conf. Proceeding Ser., vol. 11-13-July, pp. 97–104, 2016, doi: 10.1145/2938503.2938510.

A. Afify, A. Emran, and A. yahya, “A Tamper Proofing Text Watermarking Shift Algorithm for Copyright Protection,” Arab J. Nucl. Sci. Appl., vol. 52, no. 3, pp. 126–133, 2019, doi: 10.21608/ajnsa.2019.6694.1156.

S. G. Rizzo, F. Bertini, and D. Montesi, “Fine-grain watermarking for intellectual property protection,” Eurasip J. Inf. Secur., vol. 2019, no. 1, 2019, doi: 10.1186/s13635-019-0094-2.

A. A. R. Alkhafaji et al., “Payload Capacity Scheme for Quran Text Watermarking Based on Vowels with Kashida,” Comput. Mater. Contin., vol. 67, no. 3, pp. 3865–3885, 2021, doi: 10.32604/cmc.2021.015803.

H. Yazdani, V. Yazdani, and M. A. Doostari, “A New Method to Persian Text Watermarking Using Curvaceous Letters,” J. Basic. Appl. Sci. Res, vol. 3, no. 4, pp. 125–131, 2013, [Online]. Available: www.textroad.com

N. A. Salem Al-maweri, W. A. Wan Adnan, A. R. Ramli, K. Samsudin, and S. M. S. Ahmad Abdul Rahman, “Robust Digital Text Watermarking Algorithm based on Unicode Extended Characters,” Indian J. Sci. Technol., vol. 9, no. 48, pp. 1–14, 2016, doi: 10.17485/ijst/2016/v9i48/87787.

K. Huang, X. Tian, H. Yu, M. Yu, and A. Yin, “A high capacity watermarking technique for the printed document,” Electron., vol. 8, no. 12, 2019, doi: 10.3390/electronics8121403.

R. A. Alotaibi and L. A. Elrefaei, “Text-image watermarking based on integer wavelet transform (IWT) and discrete cosine transform (DCT),” Appl. Comput. Informatics, vol. 15, no. 2, pp. 191–202, 2019, doi: 10.1016/j.aci.2018.06.003.

T. Saba, M. Bashardoost, H. Kolivand, M. S. M. Rahim, A. Rehman, and M. A. Khan, “Enhancing fragility of zero-based text watermarking utilizing effective characters list,” Multimed. Tools Appl., vol. 79, no. 1–2, pp. 341–354, 2020, doi: 10.1007/s11042-019-08084-0.

P. Zhu, G. Xiang, W. Song, A. Li, Y. Zhang, and R. Tao, “A text zero-watermarking algorithm based on Chinese phonetic alphabets,” Wuhan Univ. J. Nat. Sci., vol. 21, no. 4, pp. 277–282, 2016, doi: 10.1007/s11859-016-1171-8.

U. Khadim, M. Munwar Iqbal, and M. Awais Azam, “A Secure Digital Text Watermarking Algorithm for Portable Document Format (PDF),” Mehran Univ. Res. J. Eng. Technol., vol. 41, no. 1, pp. 100–110, 2022, doi: 10.22581/muet1982.2201.10.

A. M. Hilal, F. N. Al-Wesabi, A. Abdelmaboud, M. A. Hamza, M. Mahzari, and A. Q. A. Hassan, “A Hybrid Intelligent Text Watermarking and Natural Language Processing Approach for Transferring and Receiving an Authentic English Text Via Internet,” Comput. J., vol. 65, no. 2, pp. 423–435, 2022.

P. Kaur and P. Bhambri, “To Design an Algorithm for Text Watermarking,” SIJ Trans. Comput. Sci. Eng. its Appl., vol. 03, no. 03, pp. 01–06, 2015.

L. Xiang, Y. Li, W. Hao, P. Yang, and X. Shen, “Reversible natural language watermarking using synonym substitution and arithmetic coding,” Comput. Mater. Contin., vol. 55, no. 3, pp. 541–559, 2018, doi: 10.3970/cmc.2018.03510.

M. L. P. Gort, M. Olliaro, and A. Cortesi, “Semantic-driven watermarking of relational textual databases,” Expert Syst. Appl., vol. 00, no. 2020, p. 114013, 2021, doi: 10.1016/j.eswa.2020.114013. [1] J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, (1892), pp.68-73.

Downloads

Published

2023-11-25

How to Cite

Abdulameer Naji , A., & Shakir Baawi , S. (2023). Comparative Analysis on Text Watermarking Techniques: Literature Review. Journal of Al-Qadisiyah for Computer Science and Mathematics, 14(4), Comp Page 111–120. Retrieved from https://jqcsm.qu.edu.iq/index.php/journalcm/article/view/1303

Issue

Section

Computer Articles