2021
DOI: 10.1093/comjnl/bxab087
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Intelligent Text Watermarking and Natural Language Processing Approach for Transferring and Receiving an Authentic English Text Via Internet

Abstract: Due to the rapid increase in the exchange of text information via internet networks, the security and the reliability of digital content have become a major research issue. The main challenges faced by researchers are authentication, integrity verification, and tampering detection of the digital contents. In this paper, a Robust English Text Watermarking and Natural Language Processing Approach (RETWNLPA) is proposed based on word mechanism and first level order of Markov model to improve the accuracy of tampe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…There are two common implementation methods for dependency syntax analysis, namely the combination graph or transfer analysis method. By combining the dependency syntax analysis of graphs, using independent assumptions and establishing a model, the optimal branch solution can be found in the entire dependency tree model [17]. As shown in Eq.…”
Section: B Design Of Key Information Speech Recognition Methodsmentioning
confidence: 99%
“…There are two common implementation methods for dependency syntax analysis, namely the combination graph or transfer analysis method. By combining the dependency syntax analysis of graphs, using independent assumptions and establishing a model, the optimal branch solution can be found in the entire dependency tree model [17]. As shown in Eq.…”
Section: B Design Of Key Information Speech Recognition Methodsmentioning
confidence: 99%
“…in texts, and to classify and standardize them. Common entity recognition methods include rule-based method, statistical method and deep learning method [10]. Rule-based methods usually rely on hand-written rules and dictionaries, which are suitable for entity recognition tasks in specific fields or scenarios.…”
Section: Knowledge Map Constructionmentioning
confidence: 99%
“…This strategy is developed for one font, and it has a low capacity issue. Hilal et al [55] cite a watermarking on the text by taking a word mechanism (RETWNLPA) based on the Natural Language Processing. They emphasize improving the accuracy of sensory text from English in tamper detection.…”
Section: Related Workmentioning
confidence: 99%
“… This cannot work against retyping attacks. Hilal et al [55] To demonstrate a watermarking approach on text (RETWNLPA) for English based on Natural Language Processing to uplift the accuracy of tamper data detection. The proposed technique is helpful in identifying tampering with sensitive English text.…”
Section: Related Workmentioning
confidence: 99%