CFP last date
20 May 2024
Reseach Article

Text Watermarking Algorithm for Word Document

Published on December 2014 by Bharati D. Patil, Shailendra M. Pardeshi, Puja D.saraf
National Conference on Emerging Trends in Information Technology
Foundation of Computer Science USA
NCETIT - Number 2
December 2014
Authors: Bharati D. Patil, Shailendra M. Pardeshi, Puja D.saraf
fcb3aa3f-d9e2-4935-b181-ab8f09ba8630

Bharati D. Patil, Shailendra M. Pardeshi, Puja D.saraf . Text Watermarking Algorithm for Word Document. National Conference on Emerging Trends in Information Technology. NCETIT, 2 (December 2014), 20-22.

@article{
author = { Bharati D. Patil, Shailendra M. Pardeshi, Puja D.saraf },
title = { Text Watermarking Algorithm for Word Document },
journal = { National Conference on Emerging Trends in Information Technology },
issue_date = { December 2014 },
volume = { NCETIT },
number = { 2 },
month = { December },
year = { 2014 },
issn = 0975-8887,
pages = { 20-22 },
numpages = 3,
url = { /proceedings/ncetit/number2/19074-3024/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Emerging Trends in Information Technology
%A Bharati D. Patil
%A Shailendra M. Pardeshi
%A Puja D.saraf
%T Text Watermarking Algorithm for Word Document
%J National Conference on Emerging Trends in Information Technology
%@ 0975-8887
%V NCETIT
%N 2
%P 20-22
%D 2014
%I International Journal of Computer Applications
Abstract

In this paper, a novel method of robust watermarking for word documents for protecting copyright and controlling dissemination is proposed. A word document consists of lots of objects and word objects are arranged in a hierarchical order. Every object has its own properties and functions. Some of the properties are special. They can't be modified via the interface of word application but via programming only and their change will not cause any differences on the page. These special properties are suitable for hiding information. Watermarking which includes both the author and the legal user's information is embedded in these special attributes of Word objects circularly after encryption, grouping and packing into the message. As the experimental results shown, this watermarking scheme performances excellent on robustness. After all kinds of attacks, including adjusting the features, deletion, insertion and replacement, and even massive attack, the watermarking can still be extracted from word document. It has a promising prospect of wide use fields of the copyright protection and text delivery on the internet and it applies to both English and Chinese language.

References
  1. I. j. Cox, M. L. Miller. The First 50 Years of Electronic Watermarking [J]. Journal of Applied Signal Processing. 2002, 2:126-132
  2. K. Tanaka, Y. Nakamura, K. Matsui. Embedding secret information into a dithered multilevel image[J]. Proc of 1990 IEEE Military Communications Conference, 1990:216-220.
  3. Lu, Fang Dingyi. A New Chinese Text Digital Watermarking for Copyright Protecting Word Document [In]. 2009 International Conference on Communications and Mobile computing.
  4. Mohan, s. K. and K. F. Hau, Watermarking of Electronic Text Documents[J]?Electronic Commerce Research,2002,2(1):169-187.
  5. Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
Index Terms

Computer Science
Information Sciences

Keywords

Watermarking Secret Key Watermark Embedding Watermark Extraction.