Securing Arabic Contents Algorithm for Smart Detecting of Illegal Tampering Attacks
The most common digital media exchanged via the Internet is in text form. The Arabic language is considered one of the most sensitive languages of content modification due to the presence of diacritics that can cause a change in the meaning. In this paper, an intelligent scheme is proposed for impro...
Gespeichert in:
Veröffentlicht in: | Computers, materials & continua materials & continua, 2022, Vol.70 (2), p.2879-2894 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2894 |
---|---|
container_issue | 2 |
container_start_page | 2879 |
container_title | Computers, materials & continua |
container_volume | 70 |
creator | Al Duhayyim, Mesfer Abdullah Alohali, Manal N. Al-Wesabi, Fahd Mustafa Hilal, Anwer Medani, Mohammad Ahmed Hamza, Manar |
description | The most common digital media exchanged via the Internet is in text form. The Arabic language is considered one of the most sensitive languages of content modification due to the presence of diacritics that can cause a change in the meaning. In this paper, an intelligent scheme is proposed for improving the reliability and security of the text exchanged via the Internet. The core mechanism of the proposed scheme depends on integrating the hidden Markov model and zero text watermarking techniques. The watermark key will be generated by utilizing the extracted features of the text analysis process using the third order and word level of the Markov model. The Embedding and detection processes of the proposed scheme will be performed logically without the effect of the original text. The proposed scheme is implemented using PHP with VS code IDE. The simulation results, using varying sizes of standard datasets, show that the proposed scheme can obtain high reliability and provide better accuracy of the common illegal tampering attacks. Comparison results with other baseline techniques show the added value of the proposed scheme. |
doi_str_mv | 10.32604/cmc.2022.019594 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2578265124</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2578265124</sourcerecordid><originalsourceid>FETCH-LOGICAL-c266t-ffd4518b75b263290f1c233215ffd9051bac4c9906dc22c7e1043d596cec75fb3</originalsourceid><addsrcrecordid>eNpNkLtOAzEQRS0EEiHQU1qi3mCPHxuXUXhKkSgSass7scOGfQTbKfh7NiwF1Vxpju5oDiG3nM0EaCbvscUZMIAZ40YZeUYmXEldAIA-_5cvyVVKe8aEFoZNyHrt8RjrbkcX0VU10mXfZd_lRBfNro91_mhp6CNdty5m-uCzx3yi-0Bfm8bvXEM3rj34sSJnh5_pmlwE1yR_8zen5P3pcbN8KVZvz6_LxapA0DoXIWyl4vOqVBVoAYYFjiAEcDVsDFO8cijRGKa3CICl50yKrTIaPZYqVGJK7sbeQ-y_jj5lu--PsRtOWlDlHLTiIAeKjRTGPqXogz3Eevjm23Jmf9XZQZ09qbOjOvED3MxhbQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2578265124</pqid></control><display><type>article</type><title>Securing Arabic Contents Algorithm for Smart Detecting of Illegal Tampering Attacks</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Al Duhayyim, Mesfer ; Abdullah Alohali, Manal ; N. Al-Wesabi, Fahd ; Mustafa Hilal, Anwer ; Medani, Mohammad ; Ahmed Hamza, Manar</creator><creatorcontrib>Al Duhayyim, Mesfer ; Abdullah Alohali, Manal ; N. Al-Wesabi, Fahd ; Mustafa Hilal, Anwer ; Medani, Mohammad ; Ahmed Hamza, Manar</creatorcontrib><description>The most common digital media exchanged via the Internet is in text form. The Arabic language is considered one of the most sensitive languages of content modification due to the presence of diacritics that can cause a change in the meaning. In this paper, an intelligent scheme is proposed for improving the reliability and security of the text exchanged via the Internet. The core mechanism of the proposed scheme depends on integrating the hidden Markov model and zero text watermarking techniques. The watermark key will be generated by utilizing the extracted features of the text analysis process using the third order and word level of the Markov model. The Embedding and detection processes of the proposed scheme will be performed logically without the effect of the original text. The proposed scheme is implemented using PHP with VS code IDE. The simulation results, using varying sizes of standard datasets, show that the proposed scheme can obtain high reliability and provide better accuracy of the common illegal tampering attacks. Comparison results with other baseline techniques show the added value of the proposed scheme.</description><identifier>ISSN: 1546-2226</identifier><identifier>ISSN: 1546-2218</identifier><identifier>EISSN: 1546-2226</identifier><identifier>DOI: 10.32604/cmc.2022.019594</identifier><language>eng</language><publisher>Henderson: Tech Science Press</publisher><subject>Algorithms ; Arabic language ; Authenticity ; Digital broadcasting ; Digital media ; Feature extraction ; Internet ; Markov chains ; Methods ; Natural language ; Performance evaluation ; Reliability ; Semantics ; Text analysis ; Watermarking</subject><ispartof>Computers, materials & continua, 2022, Vol.70 (2), p.2879-2894</ispartof><rights>2022. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c266t-ffd4518b75b263290f1c233215ffd9051bac4c9906dc22c7e1043d596cec75fb3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,4010,27900,27901,27902</link.rule.ids></links><search><creatorcontrib>Al Duhayyim, Mesfer</creatorcontrib><creatorcontrib>Abdullah Alohali, Manal</creatorcontrib><creatorcontrib>N. Al-Wesabi, Fahd</creatorcontrib><creatorcontrib>Mustafa Hilal, Anwer</creatorcontrib><creatorcontrib>Medani, Mohammad</creatorcontrib><creatorcontrib>Ahmed Hamza, Manar</creatorcontrib><title>Securing Arabic Contents Algorithm for Smart Detecting of Illegal Tampering Attacks</title><title>Computers, materials & continua</title><description>The most common digital media exchanged via the Internet is in text form. The Arabic language is considered one of the most sensitive languages of content modification due to the presence of diacritics that can cause a change in the meaning. In this paper, an intelligent scheme is proposed for improving the reliability and security of the text exchanged via the Internet. The core mechanism of the proposed scheme depends on integrating the hidden Markov model and zero text watermarking techniques. The watermark key will be generated by utilizing the extracted features of the text analysis process using the third order and word level of the Markov model. The Embedding and detection processes of the proposed scheme will be performed logically without the effect of the original text. The proposed scheme is implemented using PHP with VS code IDE. The simulation results, using varying sizes of standard datasets, show that the proposed scheme can obtain high reliability and provide better accuracy of the common illegal tampering attacks. Comparison results with other baseline techniques show the added value of the proposed scheme.</description><subject>Algorithms</subject><subject>Arabic language</subject><subject>Authenticity</subject><subject>Digital broadcasting</subject><subject>Digital media</subject><subject>Feature extraction</subject><subject>Internet</subject><subject>Markov chains</subject><subject>Methods</subject><subject>Natural language</subject><subject>Performance evaluation</subject><subject>Reliability</subject><subject>Semantics</subject><subject>Text analysis</subject><subject>Watermarking</subject><issn>1546-2226</issn><issn>1546-2218</issn><issn>1546-2226</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpNkLtOAzEQRS0EEiHQU1qi3mCPHxuXUXhKkSgSass7scOGfQTbKfh7NiwF1Vxpju5oDiG3nM0EaCbvscUZMIAZ40YZeUYmXEldAIA-_5cvyVVKe8aEFoZNyHrt8RjrbkcX0VU10mXfZd_lRBfNro91_mhp6CNdty5m-uCzx3yi-0Bfm8bvXEM3rj34sSJnh5_pmlwE1yR_8zen5P3pcbN8KVZvz6_LxapA0DoXIWyl4vOqVBVoAYYFjiAEcDVsDFO8cijRGKa3CICl50yKrTIaPZYqVGJK7sbeQ-y_jj5lu--PsRtOWlDlHLTiIAeKjRTGPqXogz3Eevjm23Jmf9XZQZ09qbOjOvED3MxhbQ</recordid><startdate>2022</startdate><enddate>2022</enddate><creator>Al Duhayyim, Mesfer</creator><creator>Abdullah Alohali, Manal</creator><creator>N. Al-Wesabi, Fahd</creator><creator>Mustafa Hilal, Anwer</creator><creator>Medani, Mohammad</creator><creator>Ahmed Hamza, Manar</creator><general>Tech Science Press</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>PHGZM</scope><scope>PHGZT</scope><scope>PIMPY</scope><scope>PKEHL</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>2022</creationdate><title>Securing Arabic Contents Algorithm for Smart Detecting of Illegal Tampering Attacks</title><author>Al Duhayyim, Mesfer ; Abdullah Alohali, Manal ; N. Al-Wesabi, Fahd ; Mustafa Hilal, Anwer ; Medani, Mohammad ; Ahmed Hamza, Manar</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c266t-ffd4518b75b263290f1c233215ffd9051bac4c9906dc22c7e1043d596cec75fb3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Arabic language</topic><topic>Authenticity</topic><topic>Digital broadcasting</topic><topic>Digital media</topic><topic>Feature extraction</topic><topic>Internet</topic><topic>Markov chains</topic><topic>Methods</topic><topic>Natural language</topic><topic>Performance evaluation</topic><topic>Reliability</topic><topic>Semantics</topic><topic>Text analysis</topic><topic>Watermarking</topic><toplevel>online_resources</toplevel><creatorcontrib>Al Duhayyim, Mesfer</creatorcontrib><creatorcontrib>Abdullah Alohali, Manal</creatorcontrib><creatorcontrib>N. Al-Wesabi, Fahd</creatorcontrib><creatorcontrib>Mustafa Hilal, Anwer</creatorcontrib><creatorcontrib>Medani, Mohammad</creatorcontrib><creatorcontrib>Ahmed Hamza, Manar</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ProQuest Central (New)</collection><collection>ProQuest One Academic (New)</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Middle East (New)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Computers, materials & continua</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Al Duhayyim, Mesfer</au><au>Abdullah Alohali, Manal</au><au>N. Al-Wesabi, Fahd</au><au>Mustafa Hilal, Anwer</au><au>Medani, Mohammad</au><au>Ahmed Hamza, Manar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Securing Arabic Contents Algorithm for Smart Detecting of Illegal Tampering Attacks</atitle><jtitle>Computers, materials & continua</jtitle><date>2022</date><risdate>2022</risdate><volume>70</volume><issue>2</issue><spage>2879</spage><epage>2894</epage><pages>2879-2894</pages><issn>1546-2226</issn><issn>1546-2218</issn><eissn>1546-2226</eissn><abstract>The most common digital media exchanged via the Internet is in text form. The Arabic language is considered one of the most sensitive languages of content modification due to the presence of diacritics that can cause a change in the meaning. In this paper, an intelligent scheme is proposed for improving the reliability and security of the text exchanged via the Internet. The core mechanism of the proposed scheme depends on integrating the hidden Markov model and zero text watermarking techniques. The watermark key will be generated by utilizing the extracted features of the text analysis process using the third order and word level of the Markov model. The Embedding and detection processes of the proposed scheme will be performed logically without the effect of the original text. The proposed scheme is implemented using PHP with VS code IDE. The simulation results, using varying sizes of standard datasets, show that the proposed scheme can obtain high reliability and provide better accuracy of the common illegal tampering attacks. Comparison results with other baseline techniques show the added value of the proposed scheme.</abstract><cop>Henderson</cop><pub>Tech Science Press</pub><doi>10.32604/cmc.2022.019594</doi><tpages>16</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1546-2226 |
ispartof | Computers, materials & continua, 2022, Vol.70 (2), p.2879-2894 |
issn | 1546-2226 1546-2218 1546-2226 |
language | eng |
recordid | cdi_proquest_journals_2578265124 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Algorithms Arabic language Authenticity Digital broadcasting Digital media Feature extraction Internet Markov chains Methods Natural language Performance evaluation Reliability Semantics Text analysis Watermarking |
title | Securing Arabic Contents Algorithm for Smart Detecting of Illegal Tampering Attacks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-19T13%3A58%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Securing%20Arabic%20Contents%20Algorithm%20for%20Smart%20Detecting%20of%20Illegal%20Tampering%20Attacks&rft.jtitle=Computers,%20materials%20&%20continua&rft.au=Al%20Duhayyim,%20Mesfer&rft.date=2022&rft.volume=70&rft.issue=2&rft.spage=2879&rft.epage=2894&rft.pages=2879-2894&rft.issn=1546-2226&rft.eissn=1546-2226&rft_id=info:doi/10.32604/cmc.2022.019594&rft_dat=%3Cproquest_cross%3E2578265124%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2578265124&rft_id=info:pmid/&rfr_iscdi=true |