IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 8 - Issue 11, November 2019 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Text Watermarking Technique For Hindi Language Documents Using Structural Approach

[Full Text]

 

AUTHOR(S)

Nitin Namdeo Patil, Jayantrao Bhaurao Patil

 

KEYWORDS

Authorship, Copyright, Devanagari, Pratyaya, Robust, Structural Approach

 

ABSTRACT

The ease of availability of Internet in recent decades for sharing ideas and knowledge has motivated authors to publish their contents digitally instead of conventional paperwork. This leads to widespread availability of the author's information to a large volume of readers. But with this global connectivity, many security issues have raised threats to authorship and copyright of genuine authors. The digital contents are vulnerable to illegal copy, distribution, reproduction and authentication. For digital information in numerous natural languages, significant attempts have been made to secure the text from unauthentic access. Each of these concentrate on distinguished language construct(s) to attain uniqueness. In this paper we propose a new robust watermarking technique for Hindi language. Hindi belongs to Devanagari script and no watermarking technique for it is developed till now. We use pratyaya as important Hindi language construct in our structural approach to protect Hindi language digital text across the globe

 

REFERENCES


[1] F. A. P. Petitcolas, R. Anderson, and M. G. Kuhn, “Information hiding – A survey,” Proc. of the IEEE, pp. 1062- 1077, 1999. (IEEE Conference proceedings)
[2] F. Hartung, and M. Kutter, “Multimedia watermarking techniques,” Proc. of the IEEE, pp. 1079-1107, 1999. (IEEE Conference proceedings)
[3] Nighat Mir, “Robust Techniques of Web Watermarking Using Verbs, Articles and Preposition”, International Journal of Computer Science and Information Security, Vol. 9, No. 2, pp. 248-252, 2011. (Journal or magazine citation)
[4] Hasan M. Meral, Emre Sevinc, Ersin Unkar, Bulent Sankur, A. Sumru Ozsoy, and Tunga Gungor, “Syntactic Tool for Text Watermarking”, Proc. of the in International society for Optical Engineering, pp. 904-909, 2007. (Conference proceedings)
[5] Yingli Zhang, and Huaiqing Qin, “A Novel Robust Text Watermarking For Word Document”, 3rd International Congress on Image and Signal Processing, pp. 38-42, 2010. (Conference proceedings)
[6] Adnan Gutub, Fahd Al-Haidari, Khalid Al-Kahsah, and Jameel Hamodi, “e-Text Watermarking: Utilizing Kashida Extensions in Arabic Language Electronic Writing,” Journal of Emerging Technologies in Web Intelligence (JETWI), pp. 48-55, 2010. (Journal or magazine citation)
[7] Nitin N. Patil and J. B. Patil, “Implementation of a Novel Watermarking Technique for Devanagari Text”, International Journal of Information and Electronics Engineering, Vol. 5, No. 5, pp. 353-355, 2015. (Journal or magazine citation)
[8] Z. Jalil, and A. M. Mirza, ”An Invisible Text Watermarking Algorithm using Image Watermark”, International Conference on Systems, Computing Sciences, and Software Engineering (SCSS 2009), Innovations in Computing Sciences and Software Engineering, published by Springer, pp. 147-152,2009 (Conference proceedings)
[9] Constitution of India (as of 1 December 2007), The Constitution of India. Ministry of Law & Justice. (Constitution)
[10] Bharat R. Ambati, Samar Husain, Sambhav Jain, DiptiM.Sharma, Rajeev Sangal,(2010) “Two Methods to Incorporate Local Morph Syntactic Features in Hindi Dependency Parsing” In Proceedings of the NAACL HLT 1st Workshop on Statistical Parsing of Morphologically-Rich Languages, pages 22-30. (Conference proceedings)
[11] J. Brassil, S.Low, N. Maxemchuk, L. O’Gorman, ”Copyright Protection for the Electronic Distribution of Text Documents,” Proceedings of the IEEE (Invited Paper), Vol. 87 No. 7, pp. 1181-1196, 1999. (IEEE Invited Paper)
[12] J. T. Brassil, S. Low, N. F. Maxemchuk, L. O. Gorman, “Electronic Marking and Identification Techniques to Discourage Document Copying”, IEEE Journal on Selected Areas in Communications, pp. 1495-1504, 1995. (Journal & Conference proceedings)
[13] S. H. Low, N.F. Maxemchuk, A.M. Lapone, “Document Identification for Copyright Protection Using Centroid Detection”, IEEE Transactions on Communications, pp. 372-383, 1998. (IEEE Transactions)
[14] K. Bhattacharjya and H. Ancin, “Data embedding in text for a copier system”, Proc. of the IEEE International Conference on Image Processing, pp. 245-249, 1999. (IEEE Conference proceedings)
[15] Mercan Topkara, Cuneyt M. Taskiran and Edward J. Delp. “Natural Language Watermarking”, SPIE International Conference on Security, Steganography and Watermarking of Multimedia Contents, pp. 441-452, 2005. ( Conference proceedings)
[16] Culnane, H. Treharne, and A. T. S. Ho, “Improving Mutliset Formatted Binary Text Watermarking Using Continuous Line Embedding”, 2nd International Conference on Innovative Computing, Information and Control, pp. 287-292, 2008. (Conference proceedings)
[17] Suganya Ranganathan, Ahamed Johnsha Ali, Kathirvel K., and Mohan Kumar M. “Combined Text Watermarking”, International Journal of Computer Science and Information Technologies, pp. 414-416, 2010. (Journal or magazine citation)
[18] Zunera JaliI,Hamza Aziz Saad Bin Shahid Muhammad Arif and Anwar M. Mirza, “A Zero Text Watermarking Algorithm based on Non-Vowel ASCII Characters”, International Conference on Educational and Information Technology (ICEIT 2010), pp. 503-507, 2010. (Conference proceedings)
[19] Tayan, Omar, Yasser M. Alginahi, and Muhammed N. Kabir. ”An Adaptive Zero-Watermarking Approach for Text Documents Protection.” (Journal or magazine citation)
[20] Jalil, Zunera, Anwar M. Mirza, and Maria Sabir. ”Content based zero-watermarking algorithm for authentication of text documents.” arXiv preprint arXiv: 1003.1796 (2010). (Preprint)
[21] Gutub, Adnan Abdul-Aziz, Lahouari Ghouti, Alaaeldin A. Amin, Talal M. Alkharobi, and Mohammad K. Ibrahim. ”Utilizing Extension Character ’Kashida’ with Pointed Letters for Arabic Text Digital Watermarking.” In SECRYPT, pp. 329-332. 2007. (Conference proceedings)
[22] Alginahi, Yasser M., Muhammad N. Kabir, and Omar Tayan. ”An enhanced Kashida-based watermarking approach for Arabic text-documents.” In Electronics, Computer and Computation (ICECCO), 2013 International Conference, pp. 301-304. IEEE, 2013. (Conference proceedings)
[23] Information Technology Act, Vol. 21 of 2000, 2000. (Act)
[24] Technology Development for Indian Languages Programme (Online)