Zero Based Research on Text Watermark Algorithm

Article Preview

Abstract:

Previously there was algorithm shortage about making watermark hidden in semantic meaning of text and text formatting, this paper presents a new zero-watermark algorithm based on English text and the algorithm is suitable for Chinese text as well. Firstly, the algorithm determines the textual characteristics through the punctuation mark of texts. Then add the watermark information into the host through coring the information between cryptographic watermark and textual characteristics. The algorithm has a good concealment and strong robustness.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

844-848

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Panli. Research on Information Hiding Techniques Based on Text [D]. Northern Industrial University. 2008.

Google Scholar

[2] C Cruz,R Reyes.Image content authentication system Systems.Knxville,TN,August 10-13,2008:306-309.

Google Scholar

[3] S M Wang, W D Zhao.A novel gray scale Watermarking algorithm in wavelet domain[C].IEEE Internation Conference on Information and Automation, Changsha, China, June 20,2008,(14):470-475.

DOI: 10.1109/icinfa.2008.4608045

Google Scholar

[4] Choo Hyon-Gon,Kim Whoi-Yul.Data-hiding capacity improvement for text Watermarking using space coding method. The Second International Workshop,IWDW2003 . 2003 .

Google Scholar

[5] Kim Young-Won,Moon Kyoun-Ae,Oh Il-Seok.A text watermarking algorithm based on word classification and inter-wordspace statistics. Proceedings ofthe Seventh International Conference on Document Analysis and Recognition,ICDAR 03 . 2003 .

DOI: 10.1109/icdar.2003.1227767

Google Scholar

[6] Chotikakamthorn N.Document image data hiding technique using character spacing width sequence coding. Proceedingsofthe1999International Conference on Image Processing(ICIP) . 1999 .

DOI: 10.1109/icip.1999.822894

Google Scholar

[7] Yang Huijuan,Kot AC.Text document authentication by integrating inter character and word spaces watermarking. Pro-ceedings ofIEEE International Conference on Multimedia and Expo,ICME2004 . 2004 .

DOI: 10.1109/icme.2004.1394360

Google Scholar

[8] Borges P V K,Mayer J.Document watermarking via character luminance modulation. Proceedings ofIEEE InternationalConference on Acoustics,Speech and Signal Processing,ICASSP2006 . 2006 .

DOI: 10.1109/icassp.2006.1660343

Google Scholar

[9] Shirali-Shahreza M H,Shirali-Shahreza M.A new approach to persian/arabic text steganography:computer and informationscience. Proceedings ofthe5th IEEE/ACIS International Conference . 2006 .

DOI: 10.1109/icis-comsar.2006.10

Google Scholar

[10] Stefan Thiemert,Martin Steinebach,Patrick Wolf.A digital watermark for vector-based fonts. Proceedings ofthe8thACM Multimedia and Security Workshop . 2006 .

DOI: 10.1145/1161366.1161387

Google Scholar

[11] Sun X M,Luo G,Huang HJ.Component-based digital watermarking of Chinese texts. Proceedings of the Third Inter-national Conference on Information Security . 2004.

DOI: 10.1145/1046290.1046306

Google Scholar