Heuristic Optimization Algorithm Based Watermarking on Content Authentication and Tampering Detection for English Text
نویسندگان
چکیده
Text information is a natural language dependent, which enhances reliability and security of text data exchanged through Internet networks becoming main concern for researchers. Content authentication, Tampering detection, integrity verification digital content are considered challenges in the communication exchange area Internet. Watermarking algorithms emerge as potential method achieving this with text. In simple words, watermarking embedding imperceptible messages within that serve unique signatures or identifiers. The message has regarding creator, copyright data, other metadata utilized authentication purposes. Therefore, study presents new Coyote Optimization Algorithm Watermarking-based Authentication Detection (COAW-CATD) technique English presented COAW-CATD aims to secure via tampering recognition. To accomplish this, designs zero-watermarking (ZWM) approach produce watermarks depending on textual content. generated watermark can be extracted assure document. Moreover, COA optimize placement ensure it robust tampering. experimental outcomes algorithm tested utilizing series simulations comparative reported its superior performance improved detection accuracy 95.93%.
منابع مشابه
Content based Zero-Watermarking Algorithm for Authentication of Text Documents
Copyright protection and authentication of digital contents has become a significant issue in the current digital epoch with efficient communication mediums such as internet. Plain text is the rampantly used medium used over the internet for information exchange and it is very crucial to verify the authenticity of information. There are very limited techniques available for plain text watermark...
متن کاملA Zero-Watermarking algorithm on multiple occurrences of letters for text tampering detection
Electronic publishing has gained importance with the widespread use of Internet. It involves transmission of digital data in bulk from one place to another. It brings various threats to the data in form of illegal copying, redistribution of copyright contents and forgery. Watermarking provides authentication and copyright protection to the multimedia contents over the Internet. This paper prese...
متن کاملTampering with a watermarking-based image authentication scheme
Article history: Received 17 January 2008 Received in revised form 3 April 2008 Accepted 8 May 2008
متن کاملInstitutional Repository Tampering with a watermarking - based image authentication scheme
We analyse a recent image authentication scheme designed by Chang et al. [Chang, C.-C., Hu, Y.-S., Lu, T.-C., 2006, A watermarkingbased image ownership and tampering authentication scheme. Pattern Recognition Letters. 27, 439-446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Maniccam, S.S., Bourbakis, N., 2004, Lossless compression and information hiding in imag...
متن کاملBiogeography-Based Optimization Algorithm for Automatic Extractive Text Summarization
Given the increasing number of documents, sites, online sources, and the users’ desire to quickly access information, automatic textual summarization has caught the attention of many researchers in this field. Researchers have presented different methods for text summarization as well as a useful summary of those texts including relevant document sentences. This study select...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3297263