-
Mathematical Biosciences and Engineering, 2019, 16(4): 2233-2249. doi: 10.3934/mbe.2019110.
Research article Special Issues
-
Export file:
Format
- RIS(for EndNote,Reference Manager,ProCite)
- BibTex
- Text
Content
- Citation Only
- Citation and Abstract
Robust authentication for paper-based text documents based on text watermarking technology
1 Institute of Computer Science and Technology, Peking University, Beijing 100871, China
2 Chinese Academy of Inspection and Quarantine, Beijing, 100176, China
2 Citrix System Inc, 4988 Great America Parkway Santa Clara, CA 95054, United States
Received: , Accepted: , Published:
Special Issues: Security and Privacy Protection for Multimedia Information Processing and communication
Keywords: integrity authentication; chaotic mapping; image template matching; text watermarking scheme; minimum editing distance
Citation: Wenfa Qi, Wei Guo, Tong Zhang, Yuxin Liu, Zongming Guo, Xifeng Fang. Robust authentication for paper-based text documents based on text watermarking technology. Mathematical Biosciences and Engineering, 2019, 16(4): 2233-2249. doi: 10.3934/mbe.2019110
References:
- 1. J. Lee and C. S. Won, A watermarking sequence using parities of error control coding for image authentication and correction, IEEE Trans. Consum. Electron., 46 (2000), 313–317.
- 2. C. Li, Y. Wang and B. Ma, et al., Multi-block dependency based fragile watermarking scheme for fingerprint images protection, Multimed. Tools Appl., 64 (2013), 757–776.
- 3. X. Lv and Z. J.Wang, Perceptual image hashing based on shape contexts and local feature points, IEEE Trans. Inf. Forensics Security, 7 (2012), 1081–1093.
- 4. K. Maeno, Q. Sun and S. F. Chang, et al., New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization, IEEE Trans. Multimedia, 8 (2006), 32–45.
- 5. C. Qin, P. Ji and C. Chang, et al., Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery, IEEE Multimedia, 25 (2018), 36–48.
- 6. Z. Tang, X. Zhang and L. Huang, et al., Robust image hashing using ring-based entropies, Signal Process., 93 (2013), 2061–2069.
- 7. R. Vartak and S. Deshmukh, Survey of digital image authentication techniques, International Journal of Research in Advent Technology, 2 (2014), 176–179.
- 8. Y. Zhao, S. Wang and X. Zhang, et al., Robust hashing for image authentication using zernike moments and local features, IEEE Trans. Inf. Forensics Security, 8 (2013), 55–63.
- 9. Z. Yang, Y. Huang and X. Li, et al., Efficient secure data provenance scheme in multimedia outsourcing and sharing, CMC-Comput. Mat. Contin., 56 (2018), 1–17.
- 10. C. Qin, X. Chen and X. Luo, et al., Perceptual Image Hashing via Dual-cross Pattern Encoding and Salient Structure Detection, Inf. Sci., 423 (2018), 284–302.
- 11. J. Dittmann, A. Steinmetz and R. Steinmetz, Content-based digital signature for motion pictures authentication and content-fragile watermarking, in Proceedings IEEE International Conference on Multimedia Computing and Systems, IEEE, (1999), 209–213.
- 12. Z. Hou and X. Tang, Integrity authentication scheme of color video based on the fragile watermarking, in 2011 International Conference on Electronics, Communications and Control (ICECC), IEEE, (2011), 4354–4358.
- 13. T. S. Rao and R. R. Kurra, A smart intelligent way of video authentication using classification and decomposition of watermarking methods, preprint, arXiv:1404.7237.
- 14. D. Xu, R.Wang and J.Wang, A novel watermarking scheme for H.264/AVC video authentication, Sig. Proc. Image Comm., 26 (2011), 267–279.
- 15. W. Zhang, Research on algorithm of digital video watermarking based on H.264 for copyright protection and content, Ph.D thesis, Beijing university of Post and telecommunications, 2013.
- 16. H. Zhu, The research of watermarking technology based on H.264/AVC, Ph.D thesis, Ningbo University, 2011.
- 17. J. Li, Digital watermarking technology for protecting the copyright of audio aggregation and authenticating the integrity of audio aggregation, Ph.D thesis, Ningbo University, 2012.
- 18. R. Wang and Y. Xiong, A novel watermarking algorithm for protecting audio aggregation based on ICA, in 6th International Conference on Digital Content, Multimedia Technology and its Applications, IEEE, (2010), 302–308.
- 19. X. Wang, P. Niu and M. Lu, A robust digital audio watermarking scheme using wavelet moment invariance, J. Syst. Softw., 84 (2011), 1408–1421.
- 20. I. K. Yeo and H. J. Kim, Modified patchwork algorithm: a novel audio watermarking scheme, IEEE Trans. Speech and Audio Processing, 11 (2003), 381–386.
- 21. Z. Jalil, A. M. Mirza and H. Jabeen, Word length based zero-watermarking algorithm for tamper detection in text documents, in 2010 2nd International Conference on Computer Engineering and Technology, IEEE, (2010), 376–378.
- 22. Q. C. Li and Z. H. Dong, Novel text watermarking algorithm based on chinese characters structure, in 2008 International Symposium on Computer Science and Computational Technology, IEEE, (2008), 348–351.
- 23. J. Liu, L. He and D. Fang, et al., A text digital watermarking for chinese word document, in 2008 International Symposium on Computer Science and Computational Technology, IEEE, (2008), 217–220.
- 24. L. Xiang, Y. Li and W. Hao, et al., Reversible natural language watermarking using synonym substitution and arithmetic coding, CMC-Comput. Mat. Contin., 55 (2018), 541–559.
- 25. L. Xiang,W.Wu and X. Li, et al., A linguistic steganography based on word indexing compression and candidate selection, Multimed. Tools Appl., 77 (2018), 28969–28989.
- 26. W. Guo, Y. Liu and B. Yang, et al., Research on information hiding technology in paper-based document, China Printing and Packing Study, 5 (2013), 30–34.
- 27. B. Yang, W. Shi and W. Qi, et al., Methods and apparatus for embedding and detecting digital watermarks in a text document, 2012, US Patent 8,107,129.
- 28. C. Ji, Y. Song and Z. Pang, A tamper proof method for the paper documents, 2012, China Patent 102,722,737.
- 29. T. Amano and D. Misaki, A feature calibration method for watermarking of document images, in Proceedings of the Fifth International Conference on Document Analysis and Recognition. ICDAR' 99 (Cat. No. PR00318), IEEE, (1999), 91–94.
- 30. R. Chen, Research of Digital Watermarking technology to Resist Printing and Scanning, Ph.D thesis, Xidian University, 2014.
- 31. M. Lei, Y. Yang and R. Hu, A print resilient watermark scheme based on character complexity, Journal of Beijing University of Posts and Telecommunications, 38 (2015), 58–62.
- 32. S. Li, A Study of Digital Watermarking Algorithm On Binary Text Image to Resist Hard-copy Attack, Ph.D thesis, Xidian University, 2012.
- 33. W. Qi, X. Li and B. Yang, et al., Document watermarking scheme for information tracking, Journal on Communications, 29 (2008), 183–190.
- 34. M. Wu and B. Liu, Data hiding in binary image for authentication and annotation, IEEE Trans. Multimedia, 6 (2004), 528–538.
- 35. H. Yang and A. C. Kot, Pattern-based data hiding for binary image authentication by connectivitypreserving, IEEE Trans. Multimedia, 9 (2007), 475–486.
- 36. L. Xiang, J. Yu and C. Yang, et al., A word-embedding-based steganalysis method for linguistic steganography via synonym-substitution, IEEE Access, 6 (2018), 64131–64141.
- 37. S. Chen and H. Leung, Ergodic chaotic parameter modulation with application to digital image watermarking, IEEE Trans. Image Process., 14 (2005), 1590–1602.
- 38. Z. Li, Image authentication based on Digital Watermarking and Its Key Issues, Ph.D thesis, Beijing Jiaotong University, 2008.
- 39. G. Shao and M. Zhang, Novel fragile authentication watermark based on chaotic system, in 2004 IEEE International Symposium on Industrial Electronics, IEEE, (2004), 1491–1494.
- 40. J. C. Yoo and T. H. Han, Fast normalized cross-correlation, Circuits Syst. Signal Process., 28 (2009), 819–843.
- 41. Y. Niu and C. Zhang, Comparison of string similarity algorithm, Computer and Digital Engineering, 40 (2012), 14–17.
- 42. D. Liu, Research on novel text digital watermarking technologies and their typical applications, Ph.D thesis, University of Electronic Science and Technology, 2007.
- 43. Y. Liu, W. Guo and W. Qi, Researches on Text Image Watermarking Scheme Based on the Structure of Character Glyph, Applied Mechanics and Materials, 731 (2015), 1163–1168.
Reader Comments
© 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution Licese (http://creativecommons.org/licenses/by/4.0)
Associated material
Metrics
Other articles by authors
Related pages
Tools
your name: * your email: *