Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1046290.1046306acmconferencesArticle/Chapter ViewAbstractPublication PagesinfosecuConference Proceedingsconference-collections
Article

Component-based digital watermarking of Chinese texts

Published: 14 November 2004 Publication History

Abstract

According to the types of the host media, digital watermarking may be classified mainly as image watermarking, video watermarking, audio watermarking, and text watermarking. The principle of the three watermarking research fields are similar in that they make use of the redundant information of their host media and the characteristics of human video system or human audio system. Unfortunately, text has no redundant information. Text watermarking techniques are totally different from them. And text watermarking algorithm is very difficult to satisfy the requirements of transparence and robustness. In this paper, a novel text watermarking algorithm based on the thought of the mathematical expression will be presented. Since watermarking signals are embedded into some Chinese characters that can be divided into left and right components, this algorithm is totally based on the content. Therefore, it breaks through the difficulties of text watermarking. Experiments also show that the component-based text watermarking technique is relatively robust and transparent. It will play an important role in protecting the security of Chinese documents over Internet.

References

[1]
Atallah, M. J., Raskin, V., Hempelmann, C. F., et al. Natural Language Watermarking and Tamperproofing. In Proc. of 5th International Information Hiding Workshop (IHW), The Netherlands, 2002.
[2]
Brassil, J., Low, S., Maxemchuk, N. F., and O'Gorman, L. Electronic Marking and Identification Techniques to Discourage Document Copying. IEEE Journal on Sel. Areas in Commun., 13(8) (1995) 1495--1504.
[3]
Brassil, J., Low, S., and Maxemchuk, N. F. Copyright Protection for the Electronic Distribution of Text Documents. Proceedings of the IEEE, 1999, 87(7).
[4]
Cox, I. J., Miller, M. L. The First 50 Years of Electronic Watermarking. J. of Applied Signal Processing. 2002, 2:126--132.
[5]
Fridrich, J., and Goljan, M. On Estimation of Secret Message Length in LSB Steganography in Spatial Domain. In Proc. of SPIE Symposium on Electronic Imaging, USA, 2004.
[6]
Huang, D., Yan, H. Interword distance changes represented by sine waves for watermarking text images. IEEE Trans. On Circuits and Systems for Video Technology, 2001, 11(12):1237--1245.
[7]
Sun, X. M., Chen, H. W., Yang, L. H., and Tang, Y. Y. Mathematical Representation of a Chinese Character and its Applications. International Journal of Pattern Recognition and Artificial Intelligence. 16(8)(2002), 735--747.
[8]
Tanaka, K., Nakamura, Y., and Matsui, K. Embedding secret information into a dithered multi-level image. In Proc of 1990 IEEE Military Communications Conference, 1990:216--220.

Cited By

View all
  • (2022)A high-capacity text watermarking method based on geometric micro-distortion2022 26th International Conference on Pattern Recognition (ICPR)10.1109/ICPR56361.2022.9956587(1749-1755)Online publication date: 21-Aug-2022
  • (2020)Research on Double Watermarking Algorithm Based on PDF Document Structure2020 International Conference on Culture-oriented Science & Technology (ICCST)10.1109/ICCST50977.2020.00064(298-303)Online publication date: Oct-2020
  • (2020)A Recent Survey on Multimedia and Database WatermarkingMultimedia Tools and Applications10.1007/s11042-020-08881-yOnline publication date: 15-Apr-2020
  • Show More Cited By

Index Terms

  1. Component-based digital watermarking of Chinese texts

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    InfoSecu '04: Proceedings of the 3rd international conference on Information security
    November 2004
    266 pages
    ISBN:1581139551
    DOI:10.1145/1046290
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 November 2004

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. chinese character
    2. component
    3. digital watermarking
    4. mathematical expression
    5. robust
    6. text watermarking

    Qualifiers

    • Article

    Conference

    INFOSECU04
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 03 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)A high-capacity text watermarking method based on geometric micro-distortion2022 26th International Conference on Pattern Recognition (ICPR)10.1109/ICPR56361.2022.9956587(1749-1755)Online publication date: 21-Aug-2022
    • (2020)Research on Double Watermarking Algorithm Based on PDF Document Structure2020 International Conference on Culture-oriented Science & Technology (ICCST)10.1109/ICCST50977.2020.00064(298-303)Online publication date: Oct-2020
    • (2020)A Recent Survey on Multimedia and Database WatermarkingMultimedia Tools and Applications10.1007/s11042-020-08881-yOnline publication date: 15-Apr-2020
    • (2018)A DCT Domain Image Watermarking Method Based on MatlabInternational Journal of Advanced Network, Monitoring and Controls10.21307/ijanmc-2017-0082:2(38-45)Online publication date: 8-Apr-2018
    • (2018)A Huffman compression based text steganography methodMultimedia Tools and Applications10.1007/s11042-012-1223-970:3(2085-2110)Online publication date: 31-Dec-2018
    • (2018)Steganography via running short text messagesMultimedia Tools and Applications10.1007/s11042-009-0432-352:2-3(569-596)Online publication date: 31-Dec-2018
    • (2017)Adaptive Text Steganography by Exploring Statistical and Linguistical Distortion2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)10.1109/DSC.2017.16(145-150)Online publication date: Jun-2017
    • (2017)Stego Keys Performance on Feature Based Coding Method in Text DomainSHS Web of Conferences10.1051/shsconf/2017330003633(00036)Online publication date: 2-Feb-2017
    • (2016)A high capacity email based text steganography scheme using Huffman compression2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN)10.1109/SPIN.2016.7566661(53-56)Online publication date: Feb-2016
    • (2014)An Email based high capacity text steganography scheme using combinatorial compression2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence)10.1109/CONFLUENCE.2014.6949231(336-339)Online publication date: Sep-2014
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media