|Table of Contents|

Text watermarking design based on invisible characters(PDF)


Research Field:
Publishing date:


Text watermarking design based on invisible characters
Zhang ZhenyuLi QianmuQi Yong
School of Computer Science and Engineering,Nanjing University of Science and Technology,Nanjing 210094,China
text watermarking copyright protection tamper-proof information hiding invisible characters text traceability
In order to embed watermarks into text as well as to protect the content against tampering,a text watermarking method based on invisible Unicode characters is proposed.Technically,this method is independent of text layout and style and can be applied to non-formatted text watermarking.Consequently,copyright information can be encoded into a sequence of invisible characters by this method which can be embedded into the text without changing the visual appearance.Also,it is easy to obtain the author’s information from a piece of text,and more importantly,the text content is protected by the hash code in watermark.According to tests,this method is particularly applicable to the copyright protection of text transmitted over the Internet.


[1] 华梦,王雷.基于DCT-DWT的FRFT数字水印算法[J].南京理工大学学报,2015,39(4):435-439.
Hua Meng,Wang Lei.Method of digital watermark in FRFT domain based on DCT-DWT[J].Journal of Nanjing University of Science and Technology,2015,39(4):435-439.
Liu Jing,Liu Xiaowei,Zhang Jin,et al.Research on digital works tort tracking with text watermark[J].Acta Scientiarum Naturalium Universitatis Nankaiensis,2014,47(3):93-101.
[3]Brassil J T,Low S,Maxemchuk N F,et al.Electronic marking and identification techniques to discourage document copying[J].IEEE Journal on Selected Areas in Communications,2006,13(8):1495-1504.
Chen Qing,Xing Xiaoxi.Research on performance evaluation benchmark of formatted text watermarking[J].Application Research of Computers,2014,31(9):2764-2768.
Lei Min,Yang Yu,Hu Ruoxiang.A print resilient watermark scheme based on character complexity[J].Journal of Beijing University of Posts and Telecommunications,2015,38(B06):58-62.
[6]Yang H,Kot A C.Pattern-based data hiding for binary image authentication by connectivity-reserving[J].IEEE Transactions on Multimedia,2007,9(3):475-486.
[7]Borges P,Mayer J.Text luminance modulation for hardcopy watermarking[J].Signal Processing,2007,87(7):1754-1771.
[8]Kaur M,Mahajan K.Performance evaluation of natural language text watermarking using encryption techniques[J].International Journal of Computer Applications,2015,129(3):22-28.
Lin Xinjian,Tang Xianghong,Wang Jing,et al.A reversible text watermarking algorithm based on coding and synonymy substitution[J].Journal of Chinese Information Processing,2015,29(4):151-158.
[10]Ahvanooey M T,Mazraeh H D,Tabasi S H.An innovative technique for web text watermarking(AITW)[EB/OL].http://dx.doi.org/10.1080/19393555.2016.1202356 2016-07-15/2016-11-12.
[11]Mir N.Copyright for web content using invisible text watermarking[J].Computers in Human Behavior,2014,30(30):648-653.
[12]Zhu P,Lu M.Improved web page watermarking[C]//International Conference on Management of E-Commerce and E-Government.Beijing,China:IEEE Computer Society,2012:98-102.
[13]Wolf J K,Chun D.The single burst error detection performance of binary cyclic codes[J].IEEE Transactions on Communications,1994,42(1):11-13.


Last Update: 2017-08-31