Skip to main content
Top
Published in: Wireless Networks 5/2020

14-03-2020

A novel Bloom-filter-based scheme for secure text ownership protection

Author: Walid I. Khedr

Published in: Wireless Networks | Issue 5/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Due to the rapid growth of the Internet and content development services, digital text has become the most extensively used type of media in digital communication. However, digital text is at risk of being illegally tampered with, copied or redistributed, which could lead to many security threats related to privacy and ownership protection. Over the last few years, digital watermarking has been used to authenticate and protect the ownership of digital media such as images, audio, and videos. Compared to other digital media, digital text faces greater challenges in regard to watermarking due to its low capacity for information hiding and its high sensitivity to modification. While limited research has been conducted on text watermarking, the preliminary results indicate that the available schemes do not achieve an acceptable trade-off between imperceptibility, robustness, capacity, and security. In this paper, we propose a novel text watermarking method called Bloom Filter and Text Similarity Watermarking (BFTSW). A Bloom filter is employed in our proposed BFTSW method to reduce the size of the watermark that is generated based on a vector space model (VSM) representation of a text document. To verify the watermark, the text similarity between the VSM representation of the original text (which is recovered from the Bloom filter) and the VSM representation of a suspect text is computed and compared against a predefined threshold value to determine whether the watermark is present in the suspect text. Experimental results obtained with a prototype implementation show that the proposed BFTSW method is effective in terms of its robustness against malicious attacks, information capacity, and text quality preservation.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Al-maweri, N. A. A. S., Ali, R., Adnan, W. A. W., Ramli, A. R., & Ahmad, S. M. S. (2016). State-of-the-art in techniques of text digital watermarking: challenges and limitations. JCS,12(2), 62–80. Al-maweri, N. A. A. S., Ali, R., Adnan, W. A. W., Ramli, A. R., & Ahmad, S. M. S. (2016). State-of-the-art in techniques of text digital watermarking: challenges and limitations. JCS,12(2), 62–80.
7.
go back to reference Jalil, Z., Mirza, A. M., & Sabir, M. (2010). Content based zero-watermarking algorithm for authentication of text documents. International Journal of Computer Science and Information Security,7, 212–217. Jalil, Z., Mirza, A. M., & Sabir, M. (2010). Content based zero-watermarking algorithm for authentication of text documents. International Journal of Computer Science and Information Security,7, 212–217.
8.
go back to reference Atallah, M. J., Raskin, V., Hempelmann, C. F., Karahan, M., Sion, R., Topkara, U., et al. (2003). Natural language watermarking and tamperproofing (pp. 196-212, Information Hiding). Berlin: Springer. Atallah, M. J., Raskin, V., Hempelmann, C. F., Karahan, M., Sion, R., Topkara, U., et al. (2003). Natural language watermarking and tamperproofing (pp. 196-212, Information Hiding). Berlin: Springer.
9.
go back to reference Atallah, M. J., McDonough, C. J., Raskin, V., & Nirenburg, S. (2001). Natural language processing for information assurance and security: an overview and implementations. In Proceedings of the 2000 workshop on New security paradigms, 2001 2001 (pp. 51–65). Atallah, M. J., McDonough, C. J., Raskin, V., & Nirenburg, S. (2001). Natural language processing for information assurance and security: an overview and implementations. In Proceedings of the 2000 workshop on New security paradigms, 2001 2001 (pp. 51–65).
10.
go back to reference Atallah, M. J., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., et al. (2001). Natural language watermarking: design, analysis, and a proof-of-concept implementation (pp. 185–200, Information Hiding). Berlin: Springer. Atallah, M. J., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., et al. (2001). Natural language watermarking: design, analysis, and a proof-of-concept implementation (pp. 185–200, Information Hiding). Berlin: Springer.
11.
go back to reference Yazdani, H., Yazdani, V., & Doostari, M. A. (2013). A new method to persian text watermarking using curvaceous letters. Journal of Basic and Applied Scientific Research,3, 125–131. Yazdani, H., Yazdani, V., & Doostari, M. A. (2013). A new method to persian text watermarking using curvaceous letters. Journal of Basic and Applied Scientific Research,3, 125–131.
12.
go back to reference Liu, Y., Zhu, Y., & Xin, G. (2015). A zero-watermarking algorithm based on merging features of sentences for Chinese text. Journal of the Chinese Institute of Engineers,38(3), 391–398.CrossRef Liu, Y., Zhu, Y., & Xin, G. (2015). A zero-watermarking algorithm based on merging features of sentences for Chinese text. Journal of the Chinese Institute of Engineers,38(3), 391–398.CrossRef
14.
go back to reference Rizzo, S. G., Bertini, F., & Montesi, D. (2016). Content-preserving text watermarking through unicode homoglyph substitution. Paper presented at the Proceedings of the 20th International Database Engineering & Applications Symposium, Montreal, QC, Canada. Rizzo, S. G., Bertini, F., & Montesi, D. (2016). Content-preserving text watermarking through unicode homoglyph substitution. Paper presented at the Proceedings of the 20th International Database Engineering & Applications Symposium, Montreal, QC, Canada.
15.
go back to reference Al-Maweri, N. S., Adnan, W. W., Ramli, A., Samsudin, K., & Rahman, S. (2016). Robust digital text watermarking algorithm based on unicode extended character. Indian Journal of Science and Technology,9(48), 1–14. Al-Maweri, N. S., Adnan, W. W., Ramli, A., Samsudin, K., & Rahman, S. (2016). Robust digital text watermarking algorithm based on unicode extended character. Indian Journal of Science and Technology,9(48), 1–14.
24.
go back to reference Hammouda, K. M., & Kamel, M. S. (2004). Efficient phrase-based document indexing for web document clustering. IEEE Transactions on Knowledge and Data Engineering,16(10), 1279–1296.CrossRef Hammouda, K. M., & Kamel, M. S. (2004). Efficient phrase-based document indexing for web document clustering. IEEE Transactions on Knowledge and Data Engineering,16(10), 1279–1296.CrossRef
25.
go back to reference Sanderson, M. J. N. L. E. (2010). Christopher D. Manning, Prabhakar Raghavan, Hinrich Schütze, Introduction to information retrieval. Cambridge University Press. 2008. ISBN-13 978-0-521-86571-5, xxi + 482 pages. 16(1), 100–103. Sanderson, M. J. N. L. E. (2010). Christopher D. Manning, Prabhakar Raghavan, Hinrich Schütze, Introduction to information retrieval. Cambridge University Press. 2008. ISBN-13 978-0-521-86571-5, xxi + 482 pages. 16(1), 100–103.
26.
go back to reference Magara, M. B., Ojo, S. O., & Zuva, T. (2018). A comparative analysis of text similarity measures and algorithms in research paper recommender systems. In 2018 conference on information communications technology and society (ICTAS), 8-9 March 2018 (pp. 1–5). https://doi.org/10.1109/ictas.2018.8368766. Magara, M. B., Ojo, S. O., & Zuva, T. (2018). A comparative analysis of text similarity measures and algorithms in research paper recommender systems. In 2018 conference on information communications technology and society (ICTAS), 8-9 March 2018 (pp. 1–5). https://​doi.​org/​10.​1109/​ictas.​2018.​8368766.
27.
go back to reference Kumar, H. M. K., Harish, B. S., Kumar, S. V. A., & Aradhya, V. N. M. (2018). Classification of sentiments in short-text: an approach using mSMTP measure. Paper presented at the Proceedings of the 2nd international conference on machine learning and soft computing, Phu Quoc Island, Viet Nam, Kumar, H. M. K., Harish, B. S., Kumar, S. V. A., & Aradhya, V. N. M. (2018). Classification of sentiments in short-text: an approach using mSMTP measure. Paper presented at the Proceedings of the 2nd international conference on machine learning and soft computing, Phu Quoc Island, Viet Nam,
31.
go back to reference Amato, F., Cozzolino, G., Giacalone, M., Moscato, F., Romeo, F., & Xhafa, F. A Hybrid Approach for Document Analysis in Digital Forensic Domain. In Cham, 2019 (pp. 170–179, Advances in Internet, Data and Web Technologies). Berlin: Springer International Publishing. Amato, F., Cozzolino, G., Giacalone, M., Moscato, F., Romeo, F., & Xhafa, F. A Hybrid Approach for Document Analysis in Digital Forensic Domain. In Cham, 2019 (pp. 170–179, Advances in Internet, Data and Web Technologies). Berlin: Springer International Publishing.
Metadata
Title
A novel Bloom-filter-based scheme for secure text ownership protection
Author
Walid I. Khedr
Publication date
14-03-2020
Publisher
Springer US
Published in
Wireless Networks / Issue 5/2020
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-020-02296-1

Other articles of this Issue 5/2020

Wireless Networks 5/2020 Go to the issue