2018
DOI: 10.1109/access.2018.2796585
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Text Watermarking: Theory, Methods, and Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
59
0
2

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 92 publications
(61 citation statements)
references
References 66 publications
0
59
0
2
Order By: Relevance
“…Researchers have significant challenges that information growth rate is higher, which requires an appropriate technique for watermarking. It is crucial to maintain data integrity while ensuring the confidentiality and availability of information [27]. However, with the practical development of the watermarking application, security issues of watermarking have emerged and achieved significant progress in this field [28].…”
Section: Digital Watermarkingmentioning
confidence: 99%
“…Researchers have significant challenges that information growth rate is higher, which requires an appropriate technique for watermarking. It is crucial to maintain data integrity while ensuring the confidentiality and availability of information [27]. However, with the practical development of the watermarking application, security issues of watermarking have emerged and achieved significant progress in this field [28].…”
Section: Digital Watermarkingmentioning
confidence: 99%
“…Apart from whitespaces, homoglyphs ad invisible characters, some image based where lines or words are slightly shifted without altering the text content [52,53] have been also considered as structural methods [54].…”
Section: Structural Methodsmentioning
confidence: 99%
“…We evaluate the robustness of our approach together with a set of recent structural watermarking techniques for comparison. No exact means are available to measure the general robustness of text watermarks [54]; however, it is possible to measure the robustness against different attacks. The following attacks are commonly considered in assessing the robustness of text watermarking methods.…”
Section: Robustnessmentioning
confidence: 99%
“…The different types of DWM attacks are divided into four categories which are illustrated below in Fig. 6 [22];  Removal Attacks: The primary goal of the removal attacks is complete removal of the unique watermark signal without trying to break the watermark algorithm security. This category contains quantization, denoising, collusion, and re-modulation attacks.…”
Section: E Classifications Of Different Types Of Digital Watermarkinmentioning
confidence: 99%