2016
DOI: 10.3844/jcssp.2016.62.80
|View full text |Cite
|
Sign up to set email alerts
|

State-of-the-Art in Techniques of Text Digital Watermarking: Challenges and Limitations

Abstract: Data protection from malicious attacks and misuse has become a crucial issue. Various types of data, including images, videos, audio and text documents, have given cause for the development of different methods for their protection. Cryptography, digital signatures and steganography are the most well known technologies used to protect data. During the last decade, digital watermarking technology has also been utilized as an alternative to prevent media forgery and tampering or falsification to ensure both copy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
21
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(21 citation statements)
references
References 49 publications
0
21
0
Order By: Relevance
“…In the second stage, the watermark string is converted to a binary string, which is modified by a hash function according to an optional key, and then an invisible watermark string is generated for embedding it into special locations in the cover text. Finally, it is inserted into special locations where the watermark string will not be affected by attacks [2,4,6,7].…”
Section: Text Watermarking Architecture As Shown Inmentioning
confidence: 99%
See 4 more Smart Citations
“…In the second stage, the watermark string is converted to a binary string, which is modified by a hash function according to an optional key, and then an invisible watermark string is generated for embedding it into special locations in the cover text. Finally, it is inserted into special locations where the watermark string will not be affected by attacks [2,4,6,7].…”
Section: Text Watermarking Architecture As Shown Inmentioning
confidence: 99%
“…Two different terms are used for this phase, that is, extraction and detection. Although authors often regarded both as similar functions in some literature, we can distinguish them in this way: whereas the extraction discovers the watermark string from the watermarked document and authenticates its integrity, the watermark detection verifies the existence of the watermark string from the watermarked text [4,6,7,48]. [11, 28-32, 52, 53].…”
Section: Text Watermarking Architecture As Shown Inmentioning
confidence: 99%
See 3 more Smart Citations