Zero-Text Watermarking Method for Embedded of Watermark Originality

Fahad Sabah, Saleem Butt
{"title":"Zero-Text Watermarking Method for Embedded of Watermark Originality","authors":"Fahad Sabah, Saleem Butt","doi":"10.56536/jicet.v1i2.11","DOIUrl":null,"url":null,"abstract":"In this era of technology, the ways to share information among people are completely changed. Technology made it fast to connect with people and share their views within second by using different social sites. The need for hours is how to secure data in a more precise form that can survive by any unauthorized users' raids such as copy, changing, insertion, and deletion of data. These types of attacks destroyed the originality of data. Data may be in any contents shape audio, video, and text but text contents are most difficult to survive from unauthorized access and use. As the content of the text is sharing in soft form over different social sites so the chances of attacks are increasing and the value of the text is difficult to maintain. The purposed solution of securing information or text from unauthorized attacks is text watermarking. Watermarking is the most host topic due to increasing attacks and as the technology is growing. To secure confidential information is one of the necessities of this era for preserving the originality and authentication of contents. In recent years different techniques of text watermarking are using for the security purposes of text. Different techniques and algorithms are used but the main requirements of text watermarking are not successfully achieved. These techniques may not give full access to attackers but the value of the text is degraded. This thesis presents a more enhanced technique to maintain the originality of the text.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Innovative Computing and Emerging Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.56536/jicet.v1i2.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In this era of technology, the ways to share information among people are completely changed. Technology made it fast to connect with people and share their views within second by using different social sites. The need for hours is how to secure data in a more precise form that can survive by any unauthorized users' raids such as copy, changing, insertion, and deletion of data. These types of attacks destroyed the originality of data. Data may be in any contents shape audio, video, and text but text contents are most difficult to survive from unauthorized access and use. As the content of the text is sharing in soft form over different social sites so the chances of attacks are increasing and the value of the text is difficult to maintain. The purposed solution of securing information or text from unauthorized attacks is text watermarking. Watermarking is the most host topic due to increasing attacks and as the technology is growing. To secure confidential information is one of the necessities of this era for preserving the originality and authentication of contents. In recent years different techniques of text watermarking are using for the security purposes of text. Different techniques and algorithms are used but the main requirements of text watermarking are not successfully achieved. These techniques may not give full access to attackers but the value of the text is degraded. This thesis presents a more enhanced technique to maintain the originality of the text.
嵌入水印原创性的零文本水印方法
在这个科技时代,人与人之间分享信息的方式完全改变了。科技让人们通过使用不同的社交网站快速地与人联系,并在几秒钟内分享他们的观点。几个小时的需求是如何以更精确的形式保护数据,以应对任何未经授权的用户的攻击,例如复制、更改、插入和删除数据。这些类型的攻击破坏了数据的原创性。数据可以是任何形式的内容——音频、视频和文本,但文本内容最难在未经授权的访问和使用中存活下来。由于文本内容在不同的社交网站上以软形式共享,因此攻击的机会增加,文本的价值难以维持。保护信息或文本免受未经授权攻击的解决方案是文本水印。随着水印技术的不断发展和攻击的增加,水印技术成为人们关注的热点。保护机密信息是保持内容原创性和真实性的时代要求之一。近年来,为了保证文本的安全,人们采用了不同的文本水印技术。虽然采用了不同的技术和算法,但都不能很好地满足文本水印的主要要求。这些技术可能不会让攻击者完全访问,但会降低文本的价值。本文提出了一种更强的技术来保持文本的原创性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信