Watermarking of Electronic Text Documents
Electronic Commerce Research
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
A New Digital Watermarking for Text Document Images Using Diagonal Profile
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 3 - Volume 3
Document marking and identification using both line and word shifting
INFOCOM '95 Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies (Vol. 2)-Volume - Volume 2
A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics
ICDAR '03 Proceedings of the Seventh International Conference on Document Analysis and Recognition - Volume 2
Digital Watermarks for Audio Signals
ICMCS '96 Proceedings of the 1996 International Conference on Multimedia Computing and Systems
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
A video watermarking using the 3-d wavelet transform and two perceptual watermarks
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Authorship Proof for Textual Document
Information Hiding
EMNLP '11 Proceedings of the Conference on Empirical Methods in Natural Language Processing
Hi-index | 0.00 |
We present a text watermarking scheme that embeds a bitstream watermark Wi in a text document P preserving the meaning, context, and flow of the document. The document is viewed as a set of paragraphs, each paragraph being a set of sentences. The sequence of paragraphs and sentences used to embed watermark bits is permuted using a secret key. Then, English language sentence transformations are used to modify sentence lengths, thus embedding watermarking bits in the Least Significant Bits (LSB) of the sentences' cardinalities. The embedding and extracting algorithms are public, while the secrecy and security of the watermark depends on a secret key K. The probability of False Positives is extremely small, hence avoiding incidental occurrences of our watermark in random text documents. Majority voting provides security against text addition, deletion, and swapping attacks, further reducing the probability of False Positives. The scheme is secure against the general attacks on text watermarks such as reproduction (photocopying, FAX), reformatting, synonym substitution, text addition, text deletion, text swapping, paragraph shuffling and collusion attacks.