Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Protection of Web Document using Watermarking: A Cryptographic Approach

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 87 - Number 16
Year of Publication: 2014
Namrata R. Shaha
Aishwarya Vishwakarma
Bhupendra Verma

Namrata R Shaha, Aishwarya Vishwakarma and Bhupendra Verma. Article: Protection of Web Document using Watermarking: A Cryptographic Approach. International Journal of Computer Applications 87(16):6-11, February 2014. Full text available. BibTeX

	author = {Namrata R. Shaha and Aishwarya Vishwakarma and Bhupendra Verma},
	title = {Article: Protection of Web Document using Watermarking: A Cryptographic Approach},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {87},
	number = {16},
	pages = {6-11},
	month = {February},
	note = {Full text available}


Watermarking is theory of protecting the documents from illegal copying, redistribution of the documents and to preventing from copyright violation. The document Watermark created in manner that it's inaccessible to the document viewer in normal circumstances. There are two main issues regarding web document watermarking is imperceptibility and robustness of watermark. In this paper, we proposed web document watermarking by means of cryptographic Unicode. This system consist four processes generation, embedding, detection and extraction. This scheme becomes safer and sound for the reason that it the authentication for generation and extraction process. This system is elastic since it will take user defined string meant for watermark. An experimental result shows that system's work progress and it will accomplish fidelity, robustness, authenticity, and flexibility.


  • Zunera Jalil and Anwar M. Mirza, "A Review of Digital Watermarking Techniques for Text Documents", International Conference on Information and Multimedia Technology 2009.
  • Yanqun Zhang, "Digital Watermarking Technology: A Review", IEEE International Conference on Future Computer and Communication, 2009.
  • N. P. Sheppard et al, "On Multiple Watermarking", ACM Workshop on Multimedia and Security 2001, 1-3.
  • J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman, "Electronic marking and identification techniques to discourage document copying," IEEE L. Select. Areas Commun, vol. 13, pp. 1495-1504, Oct. 1995.
  • Mercan Topkara, Umut Topkara, and Mikhail Atallah, "Words are not enough : Sentence level natural language watermarking," In Proceedings of the 41h ACM international workshop on Contents protection and security, pp. 37-45, Santa Barbara, California, USA, October 2006.
  • S. Katzenbeisser, A. P Petitcolas, "Information Hiding Techniques for steganography and Digital watermarking," Boston, Artech House, 2000.
  • Zhao, Q. and Lu, H. 2005, "A PCA-based watermarking scheme for tamper- proof of web Pages," Pattern Recognition 38 (2005), pp. 1321-1323.
  • C John, "Hiding binary data in HTML documents", [Online], Available: http://www. codeproject. com/csharplsteganodotnet 13 . asp, May, 2007.
  • I-Shi Lee, Wen-Hsiang Tsai, "Secret Communication through Web Pages Using Special Space Codes in HTML Files," International Journal of Applied Science and Engineering. 2008. 6, 2:141-149.
  • C. C. Chang, C. Y. Lin and CS. Tseng, "Secret image hiding and sharing based on the (t, n)-threshold", Fundam. Inf. 76 (4) (2007), pp. 399-411.
  • Daojing Li, Bo Zhang, "DWTC: A Dual Watermarking Scheme Based on Threshold Cryptography for Web Document," International Conference on Computer Application and System Modeling (ICCASM 2010).
  • Nighat Mir, Sayed Afaq Hussain , "Web Page Watermarking: XML files using Synonyms and Acronyms" , World Academy of Science, Engineering and Technology 73 2011
  • http://unicode. org/