text watermarking,text watermarking techniques,survey text watermarking,

15
Text Watermarking Techniques Mehboob Nazim Shehzad, Najam-Ul-Sahar [email protected],[email protected] Department of Computing and Technology Iqra University Islamabad Campus Abstract: Now a day's all the information is available on internet but the problem is that" information is not secure from threats like reuse ,plagiarism etc ".According to our research we have noted that alot of work is done on audio, video, image but less work have been done on text watermarking . Due to the less work on text watermarking the data is not secure and every other person is using the data for their purpose. For overcoming this problem watermark have to be embedded on text. Many researchers have worked on embedding watermark on text through different techniques. We have survey on: 1) Application of text watermarking 2) Possible Attacks on text 3) Issues in Techniques of text watermarking 4) Classifications of text watermarking. Key Words: Text watermarking, Text watermarking Classification, Copyright Protection, fingerprinting, watermark, information Security. 1. Introduction In today's digital world , text is the most widely used medium of communication in the Internet or intranet. Internet and intranet is full of information. Information is based on text. And now a day's text is not secure. For securing text a scheme is used which is known as watermark. Watermark is a process of preventing text from being copied and it also shows that text is authentic. Watermark is embedded on data, so data is in different forms like text, audio's, image, video's. In recent years, many work have been done for Video`s, images, audio`s but the main point is that insufficient works is done on text. So the problem is known that text have not been secured properly. For protecting text from different threats we have to embed watermark in text. The processes which have been used for text is same for image,video,audio and text. Many techniques are used for securing the information. However in recent years various multimedia and text contents are utilized as the user to pay the payment [7], plain text is an urgent choice of user for its practical reality in the digital area.

Upload: mehboob-nazim

Post on 20-Feb-2015

209 views

Category:

Documents


2 download

DESCRIPTION

Text Watermarking,Text watermarking Techniques,Survey text watermarking,

TRANSCRIPT

Page 1: Text Watermarking,Text watermarking Techniques,Survey text watermarking,

Text Watermarking Techniques

Mehboob Nazim Shehzad, Najam-Ul-Sahar

[email protected],[email protected]

Department of Computing and Technology

Iqra University Islamabad Campus

Abstract:

Now a day's all the information is available on internet but the problem is that" information is not secure from threats like reuse ,plagiarism etc ".According to our research we have noted that alot of work is done on audio, video, image but less work have been done on text watermarking . Due to the less work on text watermarking the data is not secure and every other person is using the data for their purpose. For overcoming this problem watermark have to be embedded on text. Many researchers have worked on embedding watermark on text through different techniques. We have survey on: 1) Application of text watermarking 2) Possible Attacks on text 3) Issues in Techniques of text watermarking 4) Classifications of text watermarking.

Key Words: Text watermarking, Text watermarking Classification, Copyright Protection, fingerprinting, watermark, information Security.

1. Introduction

In today's digital world , text is the most widely used medium of communication in the Internet or intranet. Internet and intranet is full of information. Information is based on text. And now a day's text is not secure. For securing text a scheme is used which is known as watermark. Watermark is a process of preventing text from being copied and it also shows that text is authentic. Watermark is embedded on data, so data is in different forms like text, audio's, image, video's. In recent years, many work have been done for Video`s, images, audio`s but the main point is that insufficient works is done on text.

So the problem is known that text have not been secured properly. For protecting text from different threats we have to embed watermark in text. The processes which have been used for text is same for image,video,audio and text. Many techniques are used for securing the information. However in recent years various multimedia and text contents are utilized as the user to pay the payment [7], plain text is an urgent choice of user for its practical reality in the digital area. Legally and illegally, there are more than one data securing

schemes [9] are to be used for default data extracting or data securing. Many others are used for proper authentications [10] and now, for steganography [1].

Text depend upon data securing schemes in the digital area can be divided into algorithm`s or Seagram and open codes [4]. Seagram embeds load, it means the change the formatting and layout the data representation for common use (e.g., one gape word →’1’ and more than 1 space`s character`s → ‘0’) [1].In other space schemes [8] is one of the newts time of text Seagram’s. Therefore other Seagram approaches could be found [1].

Change pictures with our new methods.

Fig (a).

On the other hand, [5] a row divide in two fields of text (say A and B) therefore total

Page 2: Text Watermarking,Text watermarking Techniques,Survey text watermarking,

spaces between words (i.e., the total amount of pixels around two same text words) [1] in two sets is same as it is . Spaces between the words in each field thin or extended so that confident situation`s are content to encoding the information [1].Therefore, |A |>|B| + € is forced to embedded ‘1’, and inversely propositionally, and B is the total number of word spaces in set B and €> 0. In [3] more progress this work by using multistep accent method to complete advanced transporter competence. These differences give increase to many scientific challenges in plain Text watermarking as well as [1].

So that text watermarking techniques should insert private and invisible watermarks in plain text documents which remain complete after varied tamper attacks of placing, removal and changing the formatting. Data can be checked for text privacy and copyright protection.

There are three different types of techniques to use for the security purpose and provide solutions for the threats that can be create by attackers .These techniques are watermarking, cryptography and steganography. In which data may be in any form like audio, video, image and text.

2. Application of Text Watermark

Therefore text data is more flat to be performed that create many issues in copyright process. Now a day's everything works according to law so that copyright rules and laws are very necessary to the worldwide. So that there are many different copyright authentications users for example RIAA, BCPLAW, MPAA, WIPO, ACTA, TRIPS [4, 5, 6, 7, 8, 9, 10, and 11].

For the time being plain text watermarking also can be used for large number of real applications in the world. With the increasing and general use of Internet all over the world for information sharing, text watermarking has gained more importance. The applying different concepts of digital libraries, business,

learning, and government, books, has made plain text watermarking is needed [2]. Legal documents, certificates, web sites, company documents, confidential contents, official SMS, and emails, can be protected by plain text marking algorithms. However text watermarking can be used for a number of purposes, including:

2.1. Authentication

In this case, fragile watermarks can be used to detect any tampering of a Plain text document. If watermark is detected, the plain text document may be genuine; if not, the text has been tampered and cannot be considered [2]. It is very necessary to authenticate text, especially when using for officially authorized purposes. In a sensitive communication e.g. in defence application and in business communication, it is very important to authenticate, check reliability and completeness of the text data.

2.2. Copyright Protection

For the copyright protection, It is very necessary to protect copyrights of web contents, e-books, research papers, journal articles and other documents containing plain text. The content owner can embed a watermark representing copyright information of his data. Copyright protection depends upon ownerships.

i) Single Ownership

In this process a single secure key is for the owner of data and watermark is embedded to be able to be detected with the help of given secure key from the owner.

ii) Combine Ownership

According to the using watermarking schemes [14], all the owners of copyright protections have the same key that may be used for ownership identify.

2.3. Fingerprinting: Many times author or owner have the secure key copy and gave many users for the data securing. For the owner, embedding a secure

Page 3: Text Watermarking,Text watermarking Techniques,Survey text watermarking,

serial key like watermark is a way to detect the breaker or illegal user who break their secure key by copying the protected data and supplying it to a multiples party [2].In comparison of watermarking and fingerprinting, the basic aims of fingerprinting to identify is to attacks that become reason and clearly define the principal to be clearly identify as a attackers. Therefore some work also has been done in fingerprinting approach in the context of many fields of data securing.

2.4. Tamper Detection and Recovery

In fact, weak or not secure watermarking approach, applying the watermark should be fragile to change the setting or modifications so that as to perceive and focus or even retain the modifications. Therefore fragile watermarking approaches is used for interfere detection and recovery the watermark [18].

3. Attacks on Text:

In computer network world is not much excited about text watermarking technologies. The main reason is to disclose watermarking techniques and lack of strength on the way to attacks. So that it is achievable for an attacker to achieve one-sided attacks still if they are not competent to do it finally. So it is necessary to comparison each type of attacks. Watermark common attacks are described as follows:

3.1.1 Types:

First of all common word use in attacks is type. Because there are many types of securing the data and also attackers attack on these types. So that important attacks can be describe in following categories:

3.1.2. Unauthorized attacks:

In this form of attacks many attacker to add new text in other form of type. Some time attacker add more information in original data then these types of attacker break the rule of authentication and illegally add additionally information in the documents. So that copyright protection timestamp is used to identify the owner of the content first. These attacks

can be avoided by using the authority of owner by the author signature or watermarked.

3.1.3Unauthorized Detection

Some time attackers also detect the watermarked with some useable techniques and change the information according to your requirements.

3.1.4. Unauthorized Deletion

According to this types of attack attackers can be delete the watermarked or some information from the original documents. In this case it is very important to block this type of attacker to do this process and use not removable watermarked.

3.1.5. Re-ordering

Other important types of attack are to re order the information and some time replaces the important words with other words or using the synonyms. Due to this process also change the meaning of all information’s.

3.2. Low and High Volume Now the levels of attackers also define here. Two types of level are classified:Low level creates when the attackers unauthorized add or unauthorized Delete some information to and from the attackers. Other then level is define as when the attacker want some part of text using as own data is called high level.

3.3. Brute Force Attack:

In this types of attack, attacker attack on the private secure key by using the all types of words and characters. This attack can be taken much time to break the watermarked key.

4. Text Watermarking Issue`s

Page 4: Text Watermarking,Text watermarking Techniques,Survey text watermarking,

There are many types of issues for the text watermarking now a days but the main problems are discuss here:

Plain text is a simplest way of information’s but in case of security it has many challenges when it use for sending or receiving data on the behalf of copyright protection. In the point of capacity of text watermarking has limited for watermark embedded in text as can be detect in images, video and audio. According to the using of the spacing and changing the background, style and plain text approaches rules are some of necessary features of plain text there are necessary to be define in any plain text watermarking approaches[4].

Many other properties of the algorithms like security, Robustness also are necessary to be satisfied. Any changing on text should be protecting the meaning, grammars rules and the text values. Therefore confidence is more need to show the Plain text in a clear, easier way and also more importantly in technical writings.

Figure (b) Text Watermarking Solutions

5. Classification of Watermarking:

There are two main classifications points of watermarking are:

Oblivious and non oblivious: According to requirements of the copyright protection and owners of original data extract from the default information’s.

i) Oblivious/unaware:

In this process watermarking schemes are not required the original image or data for watermark extraction.

ii) Non-oblivious/awareness:In this case watermarking schemes are

required the original image or data for watermark extraction.

6. Watermarking Techniques

Many techniques of text watermarking have been proposed in the past .These techniques use as Text watermarking image as a text, meaning change, assumption based, Verb and noun and pronoun based, sentence and word short form , misprint error etc. Therefore, we can broadly classify the previous work on digital text watermarking in the following categories; an image based approach, a syntactic approach, and a semantic approach.

6.1. Bit Level Watermarking

According to these techniques some bit level or attributes have unique values. These bit level and values are determined with a secure key known only to the author of the information or data concentrate along its primary key. These bit levels contain the watermark. The watermark can be detected with the help of finding the secure key. If some find the secure key of watermark then attacker or finder the secure key can be easily add or remove data or information’s.

In [6] the solution with the help of user input a location to the text to be copyright protection. A watermark can be apply as a copyright protection with a secure key to protect the applying and a part of text contain to be insert in the results. Watermark applying is making of two parts: According to first step input data make into two parts than the second step encoding method apply on each bit of watermark parts. The algorithms purposed here prove to be flexible to significant types of attacks, including division step selection, linearly data changes and add or remove random selection or alterations. In performing the necessary step changing as rewarding the given “usage” points is one of the enduring challenges. From this process, the algorithm applying the ancient watermarking step and then small points of

Page 5: Text Watermarking,Text watermarking Techniques,Survey text watermarking,

steps for data using with deference to the using points.

A. Spread Spectrum

In which bits (a) of watermark are combine with a Noise of PRN (pseudo Random Noise). Now that generated signal and this noise signal pass through from host signal (s).So that the signal from the PRN likes a secret key.

The host amplitude greater then of watermarked signal amplitude about 1%.For the detection of PRN signal by the math filter and correlation receiver.

B. Line Shift Coding:In this coding scheme shifted the even line up or down by the bit value in payload [7].There are two bit value for shifted the line, if bit is one then line shift to up and 0 bit shift the line down. Remaining odd lines use as a control lines and decoding.

C. Word Shifting:.

In this schemes each line of sentences is divided into words groups. Every group has a enough number of words and characters. In this process even group shifted to right or left as a bit value set in the pay load and remaining odd groups used as measuring and comparing the distances between the groups of word.

D. Feature Coding:

According to this approach changing the text features in a precise way to select the bit value in payload. After embedded the watermarked we can achieved by comparing the original document with watermarked document [8].

Feature coding apply on the text in real life. There are three steps in (a) original data. In (b) Selected the words for applying the feature coding. In last step applying the feature coding on the selected word [8].

E. Character spacing

According to this scheme other purposely, create a spaces between words of text lines to watermark a text data. In this process of encoding scheme a space between words in text document. These spaces between in words of different lines show the features of sine wave and all the information's stored in sine wave.

F. Synonym:In this process of watermarking is change the word where the information hidden in the text document. The advantage of this method is securing the information's in sense of retyping and copy pate system. From this method fully changed the meaning of words.

6.2. Text as Image based Approach:

According to this techniques of digital text watermarking, text document as a image is used to applying the watermark [8]. Plain text is very difficult to watermark because of its ease, securing, and low capacity for watermark applying. Firstly applying in plain text watermarking used to operate text as a text image. Watermark was applying in the layout and background of appearances of the text images.

In [9-11] researcher proposed techniques to watermark plain text by using image as text. In the history of approaches, Brassil was the first method proposed line shift coding algorithm which one changes the document image by every type of pattern like the upward or downward and also alignment changing of the data depending on bit level.

The second one algorithm approach was inter-word shifting. In this process of algorithm can be change the text horizontally to applying the watermarked. This algorithm can be performs in both modes of blind and non blind. The featuring of another third approaches is coding algorithm [3].In this algorithm modifies the features as pixel of words, changing in length of lines and applying the watermark bits level in the plain text.

According to all three techniques block the attacks from the attackers by applying the watermarked with securing key [3].The most using the algorithm like inter-word algorithm solution under the many attacks but it also can be break it.

Page 6: Text Watermarking,Text watermarking Techniques,Survey text watermarking,

Maxemchuk, et al. [13] [14] [15] analysed the show of the above represents the methods. The relationship and other techniques is centroid based [16] these are also optional which operate Text file is a digital signal of time and see in length of word shift and the uses of differences between centroid and next plain text file blocks for determine the as a watermark correspondingly. Low, et al. [16][17] more comparison the competence of the different approaches.

In [17] proposed another algorithm spaces word distance in every sentence of the paragraphs. The distances between the words are as to the wave of sign wave in digital system of an explicit period and occurrence. In quality and the pixel points rank algorithms were also residential which spot the plain text documents by changing the blow quality such as girth [18]. Algorithm which defines the gray range image of text was also residential [19]. One more approached which watermarked plain text document as an image using border track histogram was also purposed [20].

In [23] optional a novel idea depend upon an intellectual programming scheme in the fields of text watermarking which has no big effect on the changing of the syntax of the document and the appearance. So that the providing a format self-determining technique in which information within the text is describe to hide certain information. In [22] purposed a text watermarking scheme point out from an object based situation. Solution of the watermarking also define the new concept of watermarking an object based on text document where each and every text thread is introduced as a break up object having its own set of properties.

6.3. Statistical Watermarking

In [13] author proposed algorithm in hides the watermark information in the mostly ignored 'time' feature of the database. The 'Time'

features exit by defaulting, but in many applications they are not used. For the specific, the 'Date' features in databases are made of two fields: 'Time' and 'Date'. Researcher will work on the 'Time' area which is defined three vales: seconds, hours and mints. Securing the information hide the information of the watermark in the second’s vales should have the low effect on the using in the database. These applications have main advantage of using the time featuring is the large bit value capacity arises for not show the watermark and so that large watermarks can be easily hidden, if these situations required. This process is reverse to the bit values depend techniques where watermark every bits values have limited awaiting locations that can be used to hide these information without being subjected to deletion or devastation.

6.4. Content Watermarking

In [9] authors purposed, new techniques for the certain errors produce for some digital or numeric values or features of databases and also securing the text documents. If someone fined the tuple and same situation other same tuple find in marked then this condition says the same tuple. Then combined the total ratio of match tuple in detection values and also text documents as a relational data bases again selected can be used to confirm the watermark for the copyright protections. Watermarking approaches is not associated with the tuples and secure key. It has sufficient rightness, possibility and strength to prevent to copyright protections.

In [10] researcher proposed, a novel watermarking algorithm for scholar assets rights (SAR) protection for relational data and the text documents. This approach of mechanism is get to choose a best possible applying scheme for each documents files according to its data description based on also define or general several fundamental schemes main aim at making warp of the watermarked data to be smallest. In sense of error correcting and the other many techniques are applying to improve the watermarking of robustness.

Page 7: Text Watermarking,Text watermarking Techniques,Survey text watermarking,

6.5. Cluster Watermarking

In [8] researcher proposed a cluster watermarking. In this process clustering code used for the watermarking and for the detection the watermark with the help of result of clustering. In this we can more secure information of the watermark. In this paper a new methodology introduce like odd and even. From this techniques modifying the original data and more securing.

6.6 Text Steganography

There are many approaches are define for

the text steganography. In which popular

approaches are classifies like generate

the random words, changing the look of

original words (reverse words),tags,and

modifying the data attribute.

6.7. Other Approaches

There are many other approaches also introduce many techniques for the copyright protection including:

In [6] author solve the main problem of ownership and unauthorized data copy for the text documents and also relational data bases. There are main three approaches are used to prevent, determine, and tracing back data out from the documentations. here are many process like business scenarios are used as the expressive use case, but the main point is to secure the information with same techniques when these information sharing with each other parties and other one.

In [14] author purposed, an algorithm joint ownership copyright protections. According to this techniques divide the original data in two parts and the securing with a key individually. There are two main points that decide the number of parts wants to be recovering the original data. In [16] a theoretical skeleton for relational database based on covert contribution technology is projected. The main covert is out of order into several parts and is unseen on your own in a relational

database. The method using of LaGrange, interpolating, polynomial techniques to recover the original data with securing key. In [17] new techniques introduce, a fragile watermarking scheme to confirm the veracity of a plain text documents and recuperate the right database is proposed. There are all tuples in a plain text documentations are first divided into parts with using a covert key. Then watermarking applying in division parts and then verifies the watermark.

In [16] author main focus to improve the localization correctness of fragile folder watermark. A novel fragile watermarking scheme is planned for relational databases by summarizing the order and parts information between plain text documents. If the combining row securing signature with quality signature in interfere localization, tampered part can be points at the segment level. In this scheme no extra space required and also not required any space to the plain text original data.7. Types of Watermarking Techniques

There are two main types of data securing from the hackers and attackers. First one is Public and other one is Private so that much work done on this techniques.The description of work done in each techniques and approaches of text watermarking is as follows:

There are many other existing watermarking techniques [18] are private, it means that they are depend on some private variables like the secure key. For this process only the selected peoples who have the secure key from the owner are competent to confirm the watermark and show their ownership of the text in case of any unlawful redeployment etc. Therefore, in private watermarking techniques experience from description of the private variables to alter people once the watermark is confirmed in being there of the public. In the access of private parameters, attackers can without difficulty overthrow watermark finding any by removing watermarks from the confined data or by calculation a false watermark to the not watermarked data.

Page 8: Text Watermarking,Text watermarking Techniques,Survey text watermarking,

In other case of public watermarking techniques [8] any user can confirm the applying watermark as many times as need lacking having any earlier information about any of the private parameters to certify that they are using accurate data coming from the original part. Such as, when a user uses aware information such as marking rates and currency exchange, so that it is very important for us to certify that the data are correct and coming from the original part.

8. CONCLUSION

In this paper we conclude the existing state of the drawing of unlike watermarking techniques for Text data. In this field of copyright protection work done is very limited and explicit. Plain text watermarking algorithms used as digital text as an image is not robust against replica. There are many Attacks and also have limited application on the data. We describe all types of application and Attack and main classify all the

techniques based on image based, content based, cluster Watermarking. Finally, we observe that the previous algorithms of the approaches are computationally pricey and non robust. Plain text facing huge insertion, deletion and reordering attacks need to be protect from the attacker, and competent text watermarking algorithms are required to the protect the security.

References:

x

[1] KokSheik Wong, Kok Onn Chee Lip Yee Por, "UniSpaCh: A text-based data hiding method using Unicode space characters," The Journal of Systems and Software, pp. 1-8, December 2011.

x

[2] Zunera Jalil, "Copyright Protection of Plain Text," FAST National University of Computer and Emerging Sciences, Islamabad, A thesis submitted in partial fulfillment of the requirements for the degree

of Doctor of 2010.

[3] X. Zhou, W. Zhao, Z. Wang, and L. Pan, “Security

theory and attack analysis for text watermarking”, in Proceedings of International Conference on E-Business and Information System Security,(EBISS 2009), May 2009, pp. 1-6.

[4] M. Topkara, G. Riccardi, D. Hakkani-Tur, and M.

J. Atallah, “Natural language watermarking: Challenges in building a practical system”, Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, Jan. 2006.

[5] J. T. Brassil, S. Low, N. F. Maxemchuk, and L. O.

Gorman, Electronic Marking and Identification Techniques to Discourage Document Copying, IEEE Journal on Selected Areas in Communications, vol. 13, no. 8, pp. 1495-1504, 1995.

[6] J. T. Brassil, S. Low, N. F. Maxemchuk, L. O.

Gorman, “Hiding information in document images”, in Proceedings of the 29th Annual Conference on Information Sciences and Systems, Johns Hopkins University, 1995, pp 482-489.

[7] N. F. Maxemchuk and S. Low, “Marking text

documents,” in Proceedings of the IEEE International Conference on Image Processing, Washington, DC, Oct. 1997, pp. 13-16.

[9] A. Khan and Anwar M. Mirza, Genetic

Perceptual Shaping: Utilizing Cover Image and Conceivable Attack Information Using Genetic Programming, Information Fusion, vol. 8, no. 4, pp. 354-365, 2007.

[10] A. Khan, Intelligent Perceptual Shaping of a

digital Watermark, PhD Thesis, Faculty of Computer Science and Engineering, GIK Institute, Pakistan, 2006.

[11] J. T. Brassil, S. Low, N. F. Maxemchuk, and L. O.

Gorman, Electronic Marking and Identification Techniques to Discourage Document Copying, IEEE Journal on Selected Areas in Communications, vol. 13, no. 8, pp. 1495-1504, 1995.

[12] J. T. Brassil, S. Low, and N. F. Maxemchuk,

“Copyright protection for the electronic distribution of text documents”, in Proceedings of the IEEE, vol. 87, no. 7, 1999, pp.1181-1196.

[13] N. F. Maxemchuk and S. Low, “Marking text

documents,” in Proceedings of the IEEE International

[8] M.Anwar Mirza ,Zunera Jalil, "A Review of Digital Watermarking Techniques for Text Documents," in International Conference on Information and Multimedia Technology, Islamabad,2009, pp. 1-5.

Page 9: Text Watermarking,Text watermarking Techniques,Survey text watermarking,

Conference on Image Processing, Washington, DC, Oct. 1997, pp. 13-16.

[14] N. F. Maxemchuk, S. H. Low, Performance

Comparison of Two Text Marking Methods, IEEE Journal of Selected Areas in Communications (JSAC),

vol. 16, no. 4, pp. 561-572, 1998.

[15] N. F. Maxemchuk, Electronic Document

Distribution, AT&T Technical Journal, vol. 6, Sept.

1994, pp. 73-80.

[16] S. H. Low, N. F. Maxemchuk, and A. M.

Lapone, "Document identification for copyright protection using centroid detection," IEEE Transactions on Communications, vol. 46, no.3, March 1998, pp 372-381.

[17] S. H. Low and N. F. Maxemchuk, “Capacity of text

marking channel,” IEEE Signal Processing Letters, vol. 7, no. 12, pp. 345 -347, Dec. 2000.

[18] T. Amano and D. Misaki, "A feature

calibration method for watermarking of document images," Proceedings of the Fifth International Conference on Document Analysis and Recognition (ICDAR), 1999, pp.91-94.

[19] A. Bhattacharjya and H. Ancin, “Data embedding

in text for a copier system”,Proceedings of the 1999 International Conference on Image Processing (ICIP), vol. 2, 1999, pp. 245-249.

[20] Y. Kim, K. Moon, and S. Oh, “Watermarking text

document images using edge direction histograms”, Pattern Recognition Letters, Elsevier. vol. 25, pp. 1243-1251, 2004.

[21] Y. Kim, K. Moon, and I. Oh, “A text watermarking

algorithm based on word classification and inter-word space statistics”, in Proceedings of the Seventh International Conference on Document Analysis and Recognition (ICDAR), vol. 2, Aug. 2003, pp. 775-779.

[22] M. Abdullah and F. Wahab, “Key based text

watermarking of e-text documents in an object based environment using z-axis for watermark embedding”, World Academy of Science, Engineering and Technology, vol. 46, 2008, pp. 199-202.

[23] M. A. Qadir and I. Ahmad, “Digital text

watermarking: secure content delivery and data hiding in digital documents”, IEEE Aerospace and Electronic Systems Magazine, vol. 21, no. 11, 2006, pp. 18-21.

[24] X. Zhou, W. Dong, Z. Wang, and G. Wei, Zero-

watermarking algorithm for content authentication of

Chinese text documents, Journal of Computers, vol. 20, no. 1, 2009.

x

[25] Shantanu Pal,Agostino Cortesi,Raju Halder, "Watermarking Techniques for Relational Databases:Survey, Classification and Comparison," Journal of Universal Computer Science, vol. 16, no. 3164-3190, pp. 1-27, December 2010.

[26] Shingo INOUE, Kyoko MAKINO, Ichiro MURASE , Osamu TAKIZAWA, Tsutomu MATSUMOTO, Hiroshi NAKAGWA “A Proposal on Information Hiding Methods using XML”, Mitsubishi Research Institute, Inc., Communication Research Laboratory, Yokohama National University and The University of Tokyo x

[27] Mohammad LahcenBenSaad and Sun

XingMing “Techniques with Statistics for web Page Watermarking”, World Academy of Science, Engineering and Technology 11, 2005

[28] Qijun Zhao, Hondtao Lu, “PCA-based web

page watermarking”, Elsevier Science Inc., Vol. 4, 2007

[29] Shingo, Kyoko, Ichiro, Osamu, “A Proposal on

Information Hiding Methods using XML”, Mitsubishi Research Institute, Communication Research Laboratory, Yokohama National University and The University of Tokyo

[30]http://en.wikipedia.org/wiki/Digital_watermarking

[31] H. Low, N. F. Maxemchuk, J. T. Brassil and L.

O'Gorman: Copyright Protection for Electronic Distribution of Text Documents, Vol. 87, no. 9, IEEE, 1999

[32] Young-Won Kim, Kyung-Ae Moon and II-Seok

Oh: A Text Watermarking Algorithm based on Word Classification and Onter-word Space Statistics, IEEE (ICDAR), 2003

[33] Aasma, Sumbul, Asadullah: Steganography:

A New Horizon for Safe Communication through XML, JATIT, 2008

[34] Ala`a H., Mazin S., Mohammad A. Al Hamami:

A Proposed Method to Hide inside HTML Web Page File

[35] J. T. Brassil, S. Low, N. F. Maxemchuk, and L.

O. Gorman, “Electronic Marking and Identification Techniques to Discourage Document Copying”, IEEE Journal on Selected Areas in Communications, vol. 13, no. 8, 1995

Page 10: Text Watermarking,Text watermarking Techniques,Survey text watermarking,

[36] J. T. Brassil, S. Low, N. F. Maxemchuk, L. O.

Gorman, “Hiding information in document images”, in Proceedings of the 29th Annual Conference on Information Sciences and Systems, Johns Hopkins University, 1995

[37] J. T. Brassil, S. Low, and N. F. Maxemchuk,

“Copyright protection for the electronic distribution of text documents”, in Proceedings of the IEEE, vol. 87, no. 7, 1999

[38]. M. J. Atallah, C. McDonough, S. Nirenburg,

and V. Raskin, “Natural language processing for information assurance and security: an overview and implementation”, in Proceedings of 9th ACM/SIGSAC New Security Paradigms Workshop, Cork, Ireland, 2000

[39] M. J. Atallah, et al., “Natural language

watermarking: design, analysis, and a proof-of-concept implementation”, in Proceedings of the Fourth Information Hiding Workshop, LNCS vol. 2137, 2001

[40] U. Topkara, M. Topkara, and M. J. Atallah,

“The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions”, in Proceedings of ACM Multimedia and Security Conference, Geneva, Switzerland, September 2006

[41] M. Topkara, U. Topraka, and M. J. Atallah,

“Information hiding through errors: a confusing approach”, in Proceedings of SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents IX. 6505, 2007

[42] M. Topkara, “New Designs for Improving the

Efficiency and Resilience of Natural Language Watermarking”, PhD Thesis, Purdue University, West Lafayette, Indiana, 2007

[43] Cedric Lam, Janet Wong and Grace Wong, “Protecting copyright online”, April 2010

[44] “Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)”.

[45] “Anti-Counterfeiting Trade Agreement”, April 2004

[46] “The World Intellectual Property Organization”, 2010

[47] “European copyright law”, June 2001

[48] Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay and Tai-hoon Kim, “Text Steganography: A Novel Approach”, International

Journal of Advanced Science and Technology, Vol. 3, February, 2009.

[49]Wael Al-Alwani, Abdulelah Bin Mahfooz, and Adnan Abdul-Aziz Gutub, “A Novel Arabic Text Steganography Method Using Extensions”, KFUPM, March 4, 2007.

[50] KaushalSolanki, AnindyaSarkar, and B. S. Manjunath, “YASS: Yet Another Steganographic Scheme that Resists Blind Steganalysis” University of Californi.