CFP last date
22 April 2024
Reseach Article

Protection of Web Document using Watermarking: A Cryptographic Approach

by Namrata R. Shaha, Aishwarya Vishwakarma, Bhupendra Verma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 87 - Number 16
Year of Publication: 2014
Authors: Namrata R. Shaha, Aishwarya Vishwakarma, Bhupendra Verma
10.5120/15290-3859

Namrata R. Shaha, Aishwarya Vishwakarma, Bhupendra Verma . Protection of Web Document using Watermarking: A Cryptographic Approach. International Journal of Computer Applications. 87, 16 ( February 2014), 6-11. DOI=10.5120/15290-3859

@article{ 10.5120/15290-3859,
author = { Namrata R. Shaha, Aishwarya Vishwakarma, Bhupendra Verma },
title = { Protection of Web Document using Watermarking: A Cryptographic Approach },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 87 },
number = { 16 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume87/number16/15290-3859/ },
doi = { 10.5120/15290-3859 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:06:03.779475+05:30
%A Namrata R. Shaha
%A Aishwarya Vishwakarma
%A Bhupendra Verma
%T Protection of Web Document using Watermarking: A Cryptographic Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 87
%N 16
%P 6-11
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Watermarking is theory of protecting the documents from illegal copying, redistribution of the documents and to preventing from copyright violation. The document Watermark created in manner that it's inaccessible to the document viewer in normal circumstances. There are two main issues regarding web document watermarking is imperceptibility and robustness of watermark. In this paper, we proposed web document watermarking by means of cryptographic Unicode. This system consist four processes generation, embedding, detection and extraction. This scheme becomes safer and sound for the reason that it the authentication for generation and extraction process. This system is elastic since it will take user defined string meant for watermark. An experimental result shows that system's work progress and it will accomplish fidelity, robustness, authenticity, and flexibility.

References
  1. Zunera Jalil and Anwar M. Mirza, "A Review of Digital Watermarking Techniques for Text Documents", International Conference on Information and Multimedia Technology 2009.
  2. Yanqun Zhang, "Digital Watermarking Technology: A Review", IEEE International Conference on Future Computer and Communication, 2009.
  3. N. P. Sheppard et al, "On Multiple Watermarking", ACM Workshop on Multimedia and Security 2001, 1-3.
  4. J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman, "Electronic marking and identification techniques to discourage document copying," IEEE L. Select. Areas Commun, vol. 13, pp. 1495-1504, Oct. 1995.
  5. Mercan Topkara, Umut Topkara, and Mikhail Atallah, "Words are not enough : Sentence level natural language watermarking," In Proceedings of the 41h ACM international workshop on Contents protection and security, pp. 37-45, Santa Barbara, California, USA, October 2006.
  6. S. Katzenbeisser, A. P Petitcolas, "Information Hiding Techniques for steganography and Digital watermarking," Boston, Artech House, 2000.
  7. Zhao, Q. and Lu, H. 2005, "A PCA-based watermarking scheme for tamper- proof of web Pages," Pattern Recognition 38 (2005), pp. 1321-1323.
  8. C John, "Hiding binary data in HTML documents", [Online], Available: http://www. codeproject. com/csharplsteganodotnet 13 . asp, May, 2007.
  9. I-Shi Lee, Wen-Hsiang Tsai, "Secret Communication through Web Pages Using Special Space Codes in HTML Files," International Journal of Applied Science and Engineering. 2008. 6, 2:141-149.
  10. C. C. Chang, C. Y. Lin and CS. Tseng, "Secret image hiding and sharing based on the (t, n)-threshold", Fundam. Inf. 76 (4) (2007), pp. 399-411.
  11. Daojing Li, Bo Zhang, "DWTC: A Dual Watermarking Scheme Based on Threshold Cryptography for Web Document," International Conference on Computer Application and System Modeling (ICCASM 2010).
  12. Nighat Mir, Sayed Afaq Hussain , "Web Page Watermarking: XML files using Synonyms and Acronyms" , World Academy of Science, Engineering and Technology 73 2011
  13. http://unicode. org/
Index Terms

Computer Science
Information Sciences

Keywords

Authentication imperceptibility robust watermark web document Unicode.