Improved Zero Text Watermarking Algorithm against Meaning Preserving Attacks

Internet is largely composed of textual contents and a huge volume of digital contents gets floated over the Internet daily. The ease of information sharing and re-production has made it difficult to preserve author-s copyright. Digital watermarking came up as a solution for copyright protection of plain text problem after 1993. In this paper, we propose a zero text watermarking algorithm based on occurrence frequency of non-vowel ASCII characters and words for copyright protection of plain text. The embedding algorithm makes use of frequency non-vowel ASCII characters and words to generate a specialized author key. The extraction algorithm uses this key to extract watermark, hence identify the original copyright owner. Experimental results illustrate the effectiveness of the proposed algorithm on text encountering meaning preserving attacks performed by five independent attackers.




References:
[1] A. Khan, A. M. Mirza and A. Majid, Optimizing Perceptual Shaping of
a Digital Watermark Using Genetic Programming, Iranian Journal of
Electrical and Computer Engineering, vol. 3, pp. 144-150, 2004.
[2] J. T. Brassil, S. Low, N. F. Maxemchuk, and L. O-Gorman, Electronic
Marking and Identification Techniques to Discourage Document
Copying, IEEE Journal on Selected Areas in Communications, vol. 13,
no. 8, pp. 1495-1504, October 1995.
[3] J. T. Brassil, S. Low, and N. F. Maxemchuk, Copyright Protection for
the Electronic Distribution of Text Documents, Proceedings of the IEEE,
vol. 87, no. 7, pp.1181-1196, July 1999.
[4] N. F. Maxemchuk, S. H. Low, Performance Comparison of Two Text
Marking Methods, IEEE Journal of Selected Areas in Communications
(JSAC),vol. 16 no. 4 1998. pp. 561-572, May 1998.
[5] N. F. Maxemchuk, "Electronic Document Distribution," AT&T
Technical Journal, September 1994, pp. 73-80. 6.
[6] N. F. Maxemchuk and S. Low, Marking Text Documents, Proceedings
of the IEEE International Conference on Image Processing, Washington,
DC, , pp. 13-16, Oct. 26-29, 1997.
[7] S. H. Low, N. F. Maxemchuk, and A. M. Lapone, Document
Identification for Copyright Protection Using Centroid Detection, IEEE
Transactions on Communications, vol. 46, no.3, pp 372-381, Mar. 1998.
[8] S. H. Low and N. F. Maxemchuk, Capacity of Text Marking Channel,
IEEE Signal Processing Letters, vol. 7, no. 12 , pp. 345 -347, Dec. 2000.
[9] D. Huang and H. Yan, Interword distance changes represented by sine
waves for watermarking text images, IEEE Trans. Circuits and Systems
for Video Technology, Vol.11, No.12, pp.1237-1245, Dec 2001.
[10] M. J. Atallah, C. McDonough, S. Nirenburg, and V. Raskin, Natural
Language Processing for Information Assurance and Security: An
Overview and Implementations, Proceedings 9th ACM/SIGSAC New
Security Paradigms Workshop, Cork, Ireland, pp. 51-65, September,
2000.
[11] M. J. Atallah, V. Raskin, M. C. Crogan, C. F. Hempelmann, F.
Kerschbaum, D. Mohamed, and S.Naik, Natural language watermarking:
Design,analysis, and a proof-of-concept implementation, Proceedings of
the Fourth Information Hiding Workshop, vol. LNCS 2137, Pittsburgh,
PA, 25-27 April 2001.
[12] H. M. Meral et al., Natural language watermarking via morphosyntactic
alterations, Computer Speech and Language, 23, 107-125, 2009.
[13] H. M. Meral, E. Sevin├º, E. ├£nkar, B. Sankur, A. S. ├ûzsoy, T. G├╝ngör,
Syntactic tools for text watermarking, 19th SPIE Electronic Imaging
Conf. 6505: Security, Steganography, and Watermarking of Multimedia
Contents, San Jose, Jan. 2007.
[14] M. Atallah, V. Raskin, C. F. Hempelmann, M. Karahan, R. Sion, U.
Topkara, and K. E. Triezenberg, Natural Language Watermarking and
Tamperproofing, Fifth Information Hiding Workshop, vol. LNCS, 2578,
Noordwijkerhout, The Netherlands, Springer-Verlag, October, 2002.
[15] U. Topkara, M. Topkara, M. J. Atallah, The Hiding Virtues of
Ambiguity: Quantifiably Resilient Watermarking of Natural Language
Text through Synonym Substitutions, In Proceedings of ACM
Multimedia and Security Conference, Geneva, 2006.
[16] X. Sun, A. J. Asiimwe. Noun-Verb Based Technique of Text
Watermarking Using Recursive Decent Semantic Net Parsers. Lecture
Notes in Computer Science (LNCS) 3612: 958-961, Springer Press,
August 2005.
[17] M. Topkara, U. Topraka, and M.J. Atallah, Information hiding through
errors: a confusing approach. Proceedings of SPIE Security,
Steganography, and watermarking of Multimedia Contents IX., pp.
65050 V-1-65050V-12.
[18] B. Macq and O. Vybornova, A method of text watermarking using
presuppositions, in Proceedings of the SPIE International Conference on
Security, Steganography, and Watermarking of Multimedia Contents,
January 2007.
[19] Peng Lu et al., An optimized natural language watermarking algorithm
based on TMR, Proceedings of 9th International Conference for Young
Computer Scientists, 2009.
[20] Z. Jalil and A. M. Mirza, "An Invisible Text Watermarking Algorithm
using Image Watermark", International Conference on Systems,
Computing Sciences, and Software Engineering (SCSS 2009),
Innovations in Computing Sciences and Software Engineering,
published by Springer, ISBN: 978-90-481-9111-6.
[21] Z. Jalil, A. M. Mirza, and T. Iqbal, "A Zero-Watermarking Algorithm
for Text Documents using Structural Components", International
Conference on Information and Emerging Technologies (ICIET 2010),
June 14-16, 2010, Karachi, Pakistan.
[22] Z. Jalil, M. Farooq, M. Arif and A. M. Mirza, "A Zero Text
Watermarking Algorithm Using Non-Vowel Alphabets", International
Journal of Electrical, Computer, and Systems Engineering (ICCESSE
2010), November 24-26, 2010, Venice, Italy.
[23] DAWN news website article link:
http://epaper.dawn.com/ArticleText.aspx?article=01_08_2010_006_006