|Table of Contents|

Text watermarking design based on invisible characters(PDF)

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2017年04期
Page:
405-
Research Field:
Publishing date:

Info

Title:
Text watermarking design based on invisible characters
Author(s):
Zhang ZhenyuLi QianmuQi Yong
School of Computer Science and Engineering,Nanjing University of Science and Technology,Nanjing 210094,China
Keywords:
text watermarking copyright protection tamper-proof information hiding invisible characters text traceability
PACS:
TP309
DOI:
10.14177/j.cnki.32-1397n.2017.41.04.002
Abstract:
In order to embed watermarks into text as well as to protect the content against tampering,a text watermarking method based on invisible Unicode characters is proposed.Technically,this method is independent of text layout and style and can be applied to non-formatted text watermarking.Consequently,copyright information can be encoded into a sequence of invisible characters by this method which can be embedded into the text without changing the visual appearance.Also,it is easy to obtain the author’s information from a piece of text,and more importantly,the text content is protected by the hash code in watermark.According to tests,this method is particularly applicable to the copyright protection of text transmitted over the Internet.

References:

[1] 华梦,王雷.基于DCT-DWT的FRFT数字水印算法[J].南京理工大学学报,2015,39(4):435-439.
Hua Meng,Wang Lei.Method of digital watermark in FRFT domain based on DCT-DWT[J].Journal of Nanjing University of Science and Technology,2015,39(4):435-439.
[2]刘静,刘晓威,张金,等.基于文本水印的数字作品侵权追踪问题研究[J].南开大学学报(自然科学版),2014,47(3):93-101.
Liu Jing,Liu Xiaowei,Zhang Jin,et al.Research on digital works tort tracking with text watermark[J].Acta Scientiarum Naturalium Universitatis Nankaiensis,2014,47(3):93-101.
[3]Brassil J T,Low S,Maxemchuk N F,et al.Electronic marking and identification techniques to discourage document copying[J].IEEE Journal on Selected Areas in Communications,2006,13(8):1495-1504.
[4]陈青,邢晓溪.格式化文本水印性能评估基准研究[J].计算机应用研究,2014,31(9):2764-2768.
Chen Qing,Xing Xiaoxi.Research on performance evaluation benchmark of formatted text watermarking[J].Application Research of Computers,2014,31(9):2764-2768.
[5]雷敏,杨榆,胡若翔.基于文字复杂度的抗打印扫描文本水印算法[J].北京邮电大学学报,2015,38(B06):58-62.
Lei Min,Yang Yu,Hu Ruoxiang.A print resilient watermark scheme based on character complexity[J].Journal of Beijing University of Posts and Telecommunications,2015,38(B06):58-62.
[6]Yang H,Kot A C.Pattern-based data hiding for binary image authentication by connectivity-reserving[J].IEEE Transactions on Multimedia,2007,9(3):475-486.
[7]Borges P,Mayer J.Text luminance modulation for hardcopy watermarking[J].Signal Processing,2007,87(7):1754-1771.
[8]Kaur M,Mahajan K.Performance evaluation of natural language text watermarking using encryption techniques[J].International Journal of Computer Applications,2015,129(3):22-28.
[9]林新建,唐向宏,王静,等.编码与同义词替换结合的可逆文本水印算法[J].中文信息学报,2015,29(4):151-158.
Lin Xinjian,Tang Xianghong,Wang Jing,et al.A reversible text watermarking algorithm based on coding and synonymy substitution[J].Journal of Chinese Information Processing,2015,29(4):151-158.
[10]Ahvanooey M T,Mazraeh H D,Tabasi S H.An innovative technique for web text watermarking(AITW)[EB/OL].http://dx.doi.org/10.1080/19393555.2016.1202356 2016-07-15/2016-11-12.
[11]Mir N.Copyright for web content using invisible text watermarking[J].Computers in Human Behavior,2014,30(30):648-653.
[12]Zhu P,Lu M.Improved web page watermarking[C]//International Conference on Management of E-Commerce and E-Government.Beijing,China:IEEE Computer Society,2012:98-102.
[13]Wolf J K,Chun D.The single burst error detection performance of binary cyclic codes[J].IEEE Transactions on Communications,1994,42(1):11-13.

Memo

Memo:
-
Last Update: 2017-08-31