CFP last date
20 May 2024
Reseach Article

Text Watermarking using Combined Image and Text for Authentication and Protection

by Jaseena K.U., Anita John
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 20 - Number 4
Year of Publication: 2011
Authors: Jaseena K.U., Anita John
10.5120/2424-3255

Jaseena K.U., Anita John . Text Watermarking using Combined Image and Text for Authentication and Protection. International Journal of Computer Applications. 20, 4 ( April 2011), 8-13. DOI=10.5120/2424-3255

@article{ 10.5120/2424-3255,
author = { Jaseena K.U., Anita John },
title = { Text Watermarking using Combined Image and Text for Authentication and Protection },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 20 },
number = { 4 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 8-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume20/number4/2424-3255/ },
doi = { 10.5120/2424-3255 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:06:52.696030+05:30
%A Jaseena K.U.
%A Anita John
%T Text Watermarking using Combined Image and Text for Authentication and Protection
%J International Journal of Computer Applications
%@ 0975-8887
%V 20
%N 4
%P 8-13
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital watermarking provides authentication and copyright protection for multimedia contents over the internet. In addition to image, audio, and video, now a day’s text is the most important medium traveling over the internet. Hence it needs to be protected. Text watermarking techniques that have been developed in past protects the text from illegal copying, forgery, and prevents copyright violations. In this paper, we propose a new text watermarking technique that uses combined image and text watermark and encryption to protect the text document. The watermark is logically embedded in the text and the text is encrypted. Later the text is decrypted and then the watermark is extracted to prove authenticity. Experimental results demonstrate the effectiveness of proposed algorithm.

References
  1. Z. Jalil, A. M. Mirza ,“Text Watermarking Using Combined Image-plus- Text Watermark” , IEEE, 2010.
  2. Z. Xiao-hua1,M. Hong-yun,L. Fang, “A New Kind of Efficient Fragile Watermarking Technique“,Acta ElectronicaSinica, 2004.
  3. X.. Zhou,W. Zhao, Z. Wang, L. Pan,”Security Theory and Attack Anlysis for Text watermarking”, IEEE, 2009.
  4. Z. Jalil, A. M. Mirza ,“An Invisible Text Watermarking Algorithm Using Image Watermark” ,Innovations In Computing Science and Software Engineering, 2010.
  5. M. Chandra, S. Pandey, R. Chaudhary, “Digital Watermarking Techniques for Protecting Digital Images”, IEEE, 2010.
  6. Z. Jalil, A. M. Mirza, “A Review of Digital Watermarking Techniques for Text Documents”, IEEE, 2009.
  7. X. Zhou, Z..Wang,W. Zhao,S. wang,”Performance Anlysis and Evaluation of Text watermarking”, IEEE, 2009.
  8. Frank Hartung, Martin Kutter, “Multimedia Watermarking Techniques”, Proceedings of the IEEE, Vol. 87, No. 7, pp. 1085 – 1103, July 1999.
  9. Jiezhao Peng1, Qi Wu, “Research and Implementation of RSA Algorithm in Java”, IEEE, 2008.
  10. Z. Jalil, A. M. Mirza, M. Sabir “Content Based Zero Watermarking Algorithm for Authentication of Text Documents”, International Journal of Computer Science and Information Technology, V 7, 2010.
  11. R. Chandramouli, N.Memon, “Digital Watermarking”.
Index Terms

Computer Science
Information Sciences

Keywords

Watermarking watermark embedding watermark extraction authentication encryption