Embedding robust labels into images for copyright protection
KnowRight '95 Proceedings of the conference on Intellectual property rights and new technologies
Natural language processing for information assurance and security: an overview and implementations
Proceedings of the 2000 workshop on New security paradigms
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Natural Language Watermarking and Tamperproofing
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Techniques and Applications of Digital Watermarking and Content Protection
Techniques and Applications of Digital Watermarking and Content Protection
Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
New designs for improving the efficiency and resilience of natural language watermarking
New designs for improving the efficiency and resilience of natural language watermarking
A New Chinese Text Digital Watermarking for Copyright Protecting Word Document
CMC '09 Proceedings of the 2009 WRI International Conference on Communications and Mobile Computing - Volume 03
A Secure Web-Based Watermarking Scheme for Copyright Protection
WISA '09 Proceedings of the 2009 Sixth Web Information Systems and Applications Conference
Hi-index | 0.00 |
Digital watermarking is a copyright protection technique used to embed specific data in a cover file to prevent illegal use. In this research invisible digital watermarking based on the text information contained in a webpage has been proposed. Watermarks are based on predefined semantic and syntactic rules, which are encrypted and then converted into whitespace using binary controlled characters before embedding into a webpage. Structural means of HTML (Hyper Text Markup Language) are used as a cover file to embed the formulated watermarks. Proposed system has been validated against various attacks to find optimum robustness.