Academia.eduAcademia.edu

Outline

Fingerprint Scheme For Digital Text

2013, International Journal of Multimedia and Image Processing

https://doi.org/10.20533/IJMIP.2042.4647.2013.0021

Abstract

Digital content copyright protection is a key concern in the current environment where intellectual property is constantly threatened. In this paper, a novel solution is proposed to guarantee authenticity and integrity of a text document by protecting digital text. The key application of the proposal is the algorithm that protects text against alteration and tampering under "Cut & Paste" attacks. This approach provides a promising solution to current digital security challenges, through providing a starting point towards secured sharing and usage of digital content. The paper also examines key protection techniques, their uses and their drawbacks. Some of the key techniques discussed include forms of cryptography, steganography, watermarking and 2D barcodes.

Key takeaways
sparkles

AI

  1. The proposed Text Fingerprint algorithm enhances digital text integrity against 'Cut & Paste' attacks.
  2. Digital watermarking and steganography techniques are insufficient for robust text protection.
  3. The algorithm creates a two-dimensional matrix linking character positions and occurrences in text.
  4. Embedding the Text Fingerprint in a QR Code enhances document integrity and authenticity verification.
  5. Natural Language Processing techniques facilitate watermarking through syntactic and semantic transformations.

References (20)

  1. References
  2. "Hiding Information in Document Images," J. Brassil, S. Low, N. Maxemchuk, L. O'Gorman, Proceedings of the 29th Annual Conference on Information Sciences and Systems, Johns Hopkins University, March 1995, pp 482
  3. J. T. Brassil, S. Low, N. F. Maxemchuk, and L. O'Gorman,"Electronic Marking and Identification Techniques to Discourage Document Copying," IEEE Journal on Selected Areas in Communications, vol. 13, no. 8, October 1995, pp. 1495.
  4. J. T. Brassil, S. Low, and N. F. Maxemchuk, "Copyright Protection for the Electronic Distribution of Text Documents," Proceedings of the IEEE, vol. 87, no. 7, July 1999, pp.1181.
  5. Wang Yun-Cai ; Niu Ju-Fen, "Research on digital content copyright protection system", 2009 IEEE International Conference on Network Infrastructure and Digital Content, November 2009, pp-1050.
  6. Jinjie Gu , Yuzhu Cheng, "Research on security protection mechanisms of digital content", 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), July 2010, pp-155
  7. Fred Piper, Sean Murphy, "Cryptography". Oxford University Press Inc., 2002, pp 75-106.
  8. Qadir, M.A. , Ahmad, I. "Digital text watermarking: secure content delivery and data hiding in digital documents" 39th Annual 2005 International Carnahan Conference on Security Technology, 2005. CCST '05, February 2006, pp. 101.
  9. H.Singh, P. K.Singh, K.Saroha, "A Survey on Text Based Steganography", Proceedings of the 3rd National Conference; INDIACom- 2009 Computing For Nation Development, February 2009
  10. Ganeshkumar, V. , Koggalage, R.L.W, "A language independent algorithm to send secret messages using steganography", 2010 International Conference on Advances in ICT for Emerging Regions (ICTer), October 2010, pp-15.
  11. I.J. Cox, M.L. Miller, J.A. Bloom, J. Fridrich, T. Kalker. "Digital Watermarking and steganography", Morgan Kaufmann publishers, Seattle, Washington, USA, 2008.
  12. Z. Jalil and A. M. Mirza, "A Review of Digital Watermarking Techniques for Text Documents," 2009 International Conference on Information and Multimedia Technology (ICIMT 2009), IEEE Computer Society, December 2009, pp. 230, doi:10.1109/ICIMT.2009.11
  13. Y.Won Kim, K.Ae Moon, I.Seok Oh, "A text watermarking algorithm based on word classification and inter-word space statistics" 2003 International Conference on Document Analysis and Recognition, IEEE Computer Society, September 2003, pp. 775.
  14. Jalil, Z. ; Mirza, A.M. ; Jabeen, H, "Word length based zero- watermarking algorithm for tamper detection in text documents", 2010 2nd International Conference on Computer Engineering and Technology (ICCET), April 2010, pp-382.
  15. D. Huang and H. Yan, "Inter-word distance changes represented by sine waves for watermarking text images," IEEE Trans. Circuits and Systems for Video Technology, Vol.11, No.12, pp.1237, December 2001.
  16. Micic, A. ; Radenkovic, D. ; Nikolic, S. "Autentification of Text Documents Using Digital Watermarking " 7th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services,05. September. 2005, pp503.
  17. M. J. Atallah, V. Raskin, M. C. Crogan, C. F. Hempelmann, F.Kerschbaum, D.Mohamed, and S.Naik, "Natural language watermarking: Design, analysis, and a proof-of-concept implementation", Proceedings of the Fourth Information Hiding Workshop, vol. LNCS 2137, 25-27 April 2001, Pittsburgh, PA.
  18. Hassan M. Meral et al., "Natural language watermarking via morphosyntactic alterations", Computer Speech and Language, 23,107-125, 2009.
  19. M. Atallah, V. Raskin, C. F. Hempelmann, M. Karahan, R. Sion, U.Topkara, and K. E. Triezenberg, "Natural Language Watermarking and Tamperproofing", Fifth Information Hiding Workshop, vol.LNCS, 2578, October, 2002, Noordwijkerhout, The Netherlands,Springer-Verlag.
  20. M. Shirali-Shahreza, "Text Steganography by Changing Words Spelling", In Proceedings of the 10th International Conference on Advanced Communication Technology (ICACT 2008), Phoenix Park, Korea, 2008.