An Optimal Text Watermarking Method for Sensitive Detecting of Illegal Tampering Attacks

Due to the rapid increase in the exchange of text information via internet networks, the security and authenticity of digital content have become a major research issue. The main challenges faced by researchers are how to hide the information within the text to use it later for authentication and at...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers, materials & continua materials & continua, 2022, Vol.70 (3), p.5583-5600
Hauptverfasser: Mustafa Hilal, Anwer, N. Al-Wesabi, Fahd, Alamgeer, Mohammed, Ahmed Hamza, Manar, Mahzari, Mohammad, A. Almekhlafi, Murad
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Due to the rapid increase in the exchange of text information via internet networks, the security and authenticity of digital content have become a major research issue. The main challenges faced by researchers are how to hide the information within the text to use it later for authentication and attacks tampering detection without effects on the meaning and size of the given digital text. In this paper, an efficient text-based watermarking method has been proposed for detecting the illegal tampering attacks on the Arabic text transmitted online via an Internet network. Towards this purpose, the accuracy of tampering detection and watermark robustness has been improved of the proposed method as compared with the existing approaches. In the proposed method, both embedding and extracting of the watermark are logically implemented, which causes no change in the digital text. This is achieved by using the third level and alphanumeric strategy of the Markov model as a text analysis technique for analyzing the Arabic contents to obtain its features which are considered as the digital watermark. This digital watermark will be used later to detecting any tampering of illegal attack on the received Arabic text. An extensive set of experiments using four data sets of varying lengths proves the effectiveness of our approach in terms of detection accuracy, robustness, and effectiveness under multiple random locations of the common tampering attacks.
ISSN:1546-2226
1546-2218
1546-2226
DOI:10.32604/cmc.2022.019686