[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ghilan et al., 2014 - Google Patents

Combined Markov model and zero watermarking techniques to enhance content authentication of english text documents

Ghilan et al., 2014

View PDF
Document ID
9629275673019362685
Author
Ghilan M
Ba-Alwi F
Al-Wesabi F
Publication year
Publication venue
International Journal of Computational Linguistics Research

External Links

Snippet

In the study of content authentication and tamper detection of digital text documents, there are very limited techniques available for content authentication of text documents using digital watermarking techniques. In this paper, we have extended the proposed LNMZW3 …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/22Manipulating or registering by use of codes, e.g. in sequence of text characters
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/27Automatic analysis, e.g. parsing
    • G06F17/2705Parsing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/211Formatting, i.e. changing of presentation of document
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled

Similar Documents

Publication Publication Date Title
Kamaruddin et al. A review of text watermarking: theory, methods, and applications
Satir et al. A compression-based text steganography method
Satir et al. A Huffman compression based text steganography method
Roy et al. A novel approach to format based text steganography
Rizzo et al. Content-preserving text watermarking through unicode homoglyph substitution
Yang et al. Linguistic steganalysis via densely connected LSTM with feature pyramid
Tayan et al. A Hybrid Digital‐Signature and Zero‐Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
Kaur et al. An existential review on text watermarking techniques
Al-Wesabi Proposing high-smart approach for content authentication and tampering detection of Arabic text transmitted via internet
Jalil et al. Content based zero-watermarking algorithm for authentication of text documents
Al-Wesabi A Hybrid Intelligent Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet.
Al-Wesabi A smart English text zero-watermarking approach based on third-level order and word mechanism of Markov model
Samsudin et al. Robust digital text watermarking algorithm based on unicode extended characters
Yang et al. TS-CNN: Text steganalysis from semantic space based on convolutional neural network
Chiang et al. Natural language watermarking using semantic substitution for Chinese text
Ghilan et al. Combined Markov model and zero watermarking techniques to enhance content authentication of english text documents
Al-Wesabi Entropy-Based Watermarking Approach for Sensitive Tamper Detection of Arabic Text.
Ba-Alwi et al. Content authentication of English text via internet using zero watermarking technique and Markov model
Alanazi et al. Involving spaces of unicode standard within irreversible Arabic text steganography for practical implementations
Hilal et al. A hybrid intelligent text watermarking and natural language processing approach for transferring and receiving an authentic english text via internet
Al-Wesabi et al. A Reliable NLP Scheme for English Text Watermarking Based on Contents Interrelationship.
Hanyurwimfura et al. Text format based relational database watermarking for non-numeric data
Kaur et al. To design an algorithm for text watermarking
Jalil et al. A novel text watermarking algorithm using image watermark
Jalil et al. Word length based zero-watermarking algorithm for tamper detection in text documents