2014
DOI: 10.17706/ijcee.2014.v6.857
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Kashida-Based Watermarking Approach for Increased Protection in Arabic Text-Documents Based on Frequency Recurrence of Characters

Abstract: Abstract:With text being the predominant communication medium on the internet, more attention is required to secure and protect text information. In this work, an invisible watermarking technique based on Kashida-marks is proposed. The watermarking key is predefined whereby a Kashida is placed for a bit 1 and omitted for a bit 0. Kashidas are inserted in the text before a specific list of characters until the entire key is embedded. Two variations to the proposed method were developed, based on the frequency-r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(15 citation statements)
references
References 11 publications
0
15
0
Order By: Relevance
“…The proposed work is evaluated and compared with three other methods [12]- [14]. The first method uses the letter points and extensions method [12].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed work is evaluated and compared with three other methods [12]- [14]. The first method uses the letter points and extensions method [12].…”
Section: Discussionmentioning
confidence: 99%
“…Kashida are inserted before a specific list of characters ‫_ا{‬ ‫_و_أ‬ ‫د_ؤ‬ _ ‫}ذ‬ until the end of the key is reached where the kashida is inserted for a bit 1 and omitted for a bit 0. This process is repeated until the end of the document is reached in a round robin fashion [14].…”
Section: K Enhanced Kashidamentioning
confidence: 99%
“…Location means a specific position in the cover text where the algorithm can embed the watermark string (e.g., spaces between words and after special punctuations). Even though a watermarking algorithm provides a large embedding capacity, it is not desirable for copyright protection, if it alters the cover text profoundly [8,21].…”
Section: Text Watermarking Evaluationmentioning
confidence: 99%
“…In other words, watermarking aims to protect intellectual property of digital media against unauthorized copy or access by embedding a watermark (visible or invisible) in the cove media which can remain beside the data, and it can be used whenever there is any query about the originality of media (e.g., the hidden watermark refers to the original owner) [2][3][4][5][6][7][8][9][10]. Over the last two decades, many information hiding techniques have been proposed in terms of text watermarking and text steganography for copyright protection [11][12][13][14], proof of ownership [15][16][17][18][19][20][21][22][23], and copy control and authentication [24][25][26][27][28][29][30][31]. Although the aim of steganography is different, it also can be used for the copyright protection of digital texts like watermarking.…”
Section: Introductionmentioning
confidence: 99%
“…As compared to other method the proposed algorithm showed high ability to increase the hiding capacity. Alginahi et al (2014) uses a predefined key to encode the original text. A kashida is placed after a set of characters considering whether the letter is assumed to have high frequency of recurrence or not.. Al-Nofaie et al (2016) used whitespaces as well as kashidas to hide the secret bits.…”
Section: Introductionmentioning
confidence: 99%