2018
DOI: 10.1155/2018/5325040
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

Abstract: With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, and so on is just the plain text. Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
52
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 47 publications
(52 citation statements)
references
References 44 publications
0
52
0
Order By: Relevance
“…In this work, the measurement has been achieved by hiding the secret message in the cover text words through alerting the color of the words which are selected from multiple layers chosen randomly. The distortion robustness values of the proposed approach are calculated using the equation (7) and from Table 3, our proposed approach is more robust than UniSpaCh with a small difference than AITSteg. But AITSteg approach considered that the whole message will be embedded at one location at the beginning of the cover content, so that the first character of the message will be hidden in first the location, the next character of the message will be hidden in the following location and so on.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In this work, the measurement has been achieved by hiding the secret message in the cover text words through alerting the color of the words which are selected from multiple layers chosen randomly. The distortion robustness values of the proposed approach are calculated using the equation (7) and from Table 3, our proposed approach is more robust than UniSpaCh with a small difference than AITSteg. But AITSteg approach considered that the whole message will be embedded at one location at the beginning of the cover content, so that the first character of the message will be hidden in first the location, the next character of the message will be hidden in the following location and so on.…”
Section: Resultsmentioning
confidence: 99%
“…The researchers consider many criteria in designing algorithms for text steganography, and the most common criteria for recently proposed approaches concern with hiding capacity, invisibility, robustness; however, an appropriate algorithm must provide an optimal trade-off between these evaluation criteria in line with the appliance needs of approach. [7,19,20,21].…”
Section: Evaluation Criteria Of Text Steganographymentioning
confidence: 99%
See 1 more Smart Citation
“…This is due to the fact that multimedia files offer larger insertion spaces and induce the least suspicion due to their wide distributions. Hiding confidential data in images with fuzzy edge identification is presented in Kumar et al Lately, various kinds of documents are used for message hiding, including Word, PDF files, and HTML documents . An efficient information hiding in compressed video is proposed in Cao et al, whereas a robust covert channel transmission incorporated in operating systems is implemented in Lin et al Hiding secret data using edge identification is proposed in Kumar et al and Lee et al Meanwhile, covert information sharing is also potentially open to abuse by criminals and terrorists.…”
Section: Related Workmentioning
confidence: 99%
“…The following attacks are commonly considered in assessing the robustness of text watermarking methods. the watermarked text [61], with the goal of altering the watermark. We randomly insert the 10% of additional words, following a common attack size considered high [62].…”
Section: Robustnessmentioning
confidence: 99%