Ghilan et al., 2014 - Google Patents
Combined Markov model and zero watermarking techniques to enhance content authentication of english text documentsGhilan et al., 2014
View PDF- Document ID
- 9629275673019362685
- Author
- Ghilan M
- Ba-Alwi F
- Al-Wesabi F
- Publication year
- Publication venue
- International Journal of Computational Linguistics Research
External Links
Snippet
In the study of content authentication and tamper detection of digital text documents, there are very limited techniques available for content authentication of text documents using digital watermarking techniques. In this paper, we have extended the proposed LNMZW3 …
- 238000000034 method 0 title abstract description 52
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
- G06F17/2705—Parsing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/211—Formatting, i.e. changing of presentation of document
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kamaruddin et al. | A review of text watermarking: theory, methods, and applications | |
Satir et al. | A compression-based text steganography method | |
Satir et al. | A Huffman compression based text steganography method | |
Roy et al. | A novel approach to format based text steganography | |
Rizzo et al. | Content-preserving text watermarking through unicode homoglyph substitution | |
Yang et al. | Linguistic steganalysis via densely connected LSTM with feature pyramid | |
Tayan et al. | A Hybrid Digital‐Signature and Zero‐Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents | |
Kaur et al. | An existential review on text watermarking techniques | |
Al-Wesabi | Proposing high-smart approach for content authentication and tampering detection of Arabic text transmitted via internet | |
Jalil et al. | Content based zero-watermarking algorithm for authentication of text documents | |
Al-Wesabi | A Hybrid Intelligent Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet. | |
Al-Wesabi | A smart English text zero-watermarking approach based on third-level order and word mechanism of Markov model | |
Samsudin et al. | Robust digital text watermarking algorithm based on unicode extended characters | |
Yang et al. | TS-CNN: Text steganalysis from semantic space based on convolutional neural network | |
Chiang et al. | Natural language watermarking using semantic substitution for Chinese text | |
Ghilan et al. | Combined Markov model and zero watermarking techniques to enhance content authentication of english text documents | |
Al-Wesabi | Entropy-Based Watermarking Approach for Sensitive Tamper Detection of Arabic Text. | |
Ba-Alwi et al. | Content authentication of English text via internet using zero watermarking technique and Markov model | |
Alanazi et al. | Involving spaces of unicode standard within irreversible Arabic text steganography for practical implementations | |
Hilal et al. | A hybrid intelligent text watermarking and natural language processing approach for transferring and receiving an authentic english text via internet | |
Al-Wesabi et al. | A Reliable NLP Scheme for English Text Watermarking Based on Contents Interrelationship. | |
Hanyurwimfura et al. | Text format based relational database watermarking for non-numeric data | |
Kaur et al. | To design an algorithm for text watermarking | |
Jalil et al. | A novel text watermarking algorithm using image watermark | |
Jalil et al. | Word length based zero-watermarking algorithm for tamper detection in text documents |