Taleby Ahvanooey et al., 2016 - Google Patents
An innovative technique for web text watermarking (AITW)Taleby Ahvanooey et al., 2016
- Document ID
- 5223728122762568093
- Author
- Taleby Ahvanooey M
- Dana Mazraeh H
- Tabasi S
- Publication year
- Publication venue
- Information Security Journal: A Global Perspective
External Links
Snippet
Embedding a hidden stream of bits in a cover file to prevent illegal use is called digital watermarking. The cover file could be a text, image, video, or audio. In this study, we propose invisible watermarking based on the text included in a webpage. Watermarks are …
- 238000000034 method 0 title description 29
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Taleby Ahvanooey et al. | An innovative technique for web text watermarking (AITW) | |
Taleby Ahvanooey et al. | A comparative analysis of information hiding techniques for copyright protection of text documents | |
Chen et al. | Coverless information hiding method based on the Chinese mathematical expression | |
Rizzo et al. | Fine-grain watermarking for intellectual property protection | |
Khadam et al. | Digital watermarking technique for text document protection using data mining analysis | |
Satir et al. | A Huffman compression based text steganography method | |
Al-Nofaie et al. | Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications | |
Rizzo et al. | Content-preserving text watermarking through unicode homoglyph substitution | |
Zhang et al. | Coverless text information hiding method based on the word rank map | |
Mir | Copyright for web content using invisible text watermarking | |
Khadam et al. | Text data security and privacy in the internet of things: threats, challenges, and future directions | |
Roslan | Sharp-edges method in Arabic text steganography | |
Jalil et al. | Content based zero-watermarking algorithm for authentication of text documents | |
Baawi et al. | A comparative study on the advancement of text steganography techniques in digital media | |
Singh et al. | A survey on text based steganography | |
Al-Wesabi | A Smart English Text Zero-Watermarking Approach Based on Third-Level Order and Word Mechanism of Markov Model. | |
Hilal et al. | A hybrid intelligent text watermarking and natural language processing approach for transferring and receiving an authentic english text via internet | |
Kaushik et al. | Zero-width text steganography in cybercrime attacks | |
Memon et al. | EVALUATION OF STEGANOGRAPHY FOR URDU/ARABIC TEXT. | |
Alanazi et al. | Involving spaces of unicode standard within irreversible Arabic text steganography for practical implementations | |
Fateh et al. | An email-based high capacity text steganography using repeating characters | |
Kumar et al. | Recent trends in text steganography with experimental study | |
Yaghobi et al. | Text steganography in webometrics | |
Zhang et al. | Coverless text information hiding method using the frequent words distance | |
Bertini et al. | Can information hiding in social media posts represent a threat? |