scispace - formally typeset
Open AccessJournal ArticleDOI

A Review of Text Watermarking: Theory, Methods, and Applications

Reads0
Chats0
TLDR
This paper reviews in detail the new classification of text watermarking, which is through embedding process and its related issues of attacks and language applicability, with a focus on its information integrity, information availability, originality preservation, information confidentiality, protection of sensitive information, document transformation, cryptography application, and language flexibility.
Abstract
During the recent years, the issue of preserving the integrity of digital text has become a focus of interest in the transmission of online content on the Internet. Watermarking has a useful tool in the protection of digital text content as it solves the problem of tampering, duplicating, unauthorized access, and security breaches. The rapid development currently observable in information transfer and access is the consequences of the widespread usage of the Internet. When it comes to the different types of digital data, text constitutes the most complex and challenging type to which the method of text watermarking can be applied. Text watermarking constitutes a highly complex task, most of all, since only limited research has been done in this field. In order to ensure the successful evaluation, analysis, and implementation, a comprehensive research needs to be performed. This paper studies the theory, methods, and applications of text watermarking, which includes the discussion on the definition, embedding and extracting processes, requirements, approaches, and language applications of the established text watermarking methods. This paper reviews in detail the new classification of text watermarking, which is through embedding process and its related issues of attacks and language applicability. Open research challenges and future directions are also investigated, with a focus on its information integrity, information availability, originality preservation, information confidentiality, protection of sensitive information, document transformation, cryptography application, and language flexibility.

read more

Citations
More filters
Proceedings ArticleDOI

On the Dangers of Stochastic Parrots: Can Language Models Be Too Big? 🦜

TL;DR: The authors take a step back and ask: How big is too big? What are the possible risks associated with this technology and what paths are available for mitigating those risks? They provide recommendations including weighing the environmental and financial costs first, investing resources into curating and carefully documenting datasets rather than ingesting everything on the web, carrying out pre-development exercises evaluating how the planned approach fits into research and development goals and supports stakeholder values, and encouraging research directions beyond ever larger language models.

Copyright protection for the electronic distribution of text documents : Identification and protection of multimedia information

TL;DR: Several mechanisms for marking documents and several other mechanisms for decoding the marks after documents have been subjected to common types of distortion are described and compared.
Journal ArticleDOI

A comprehensive survey on robust image watermarking

TL;DR: A comprehensive review on digital image watermarking methods that were published in recent years illustrating the conventional schemes in different domains can be found in this article , where the authors provide an overview of geometric invariant techniques and emerging watermark-based methods for novel medias, such as depth image based rendering (DIBR), high dynamic range (HDR), screen content images (SCIs), and point cloud model.
Journal ArticleDOI

AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media

TL;DR: This paper proposes a novel text steganography technique called AITSteg, which provides end-to-end security during the transmission of text messages via SMS or social media between end users, and is believed to be the first text steGANography technique that providing end- to-end secure transmission of the text message using symmetric keys via social media.
Journal ArticleDOI

Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis.

TL;DR: An overview of state of the art of the text hiding area is presented, and a comparative analysis of recent techniques are provided, especially those focused on marking structural characteristics of digital text message/file to hide secret bits.
References
More filters
Journal ArticleDOI

Information hiding-a survey

TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Journal ArticleDOI

Multimedia watermarking techniques

TL;DR: The basic concepts of watermarking systems are outlined and illustrated with proposed water marking methods for images, video, audio, text documents, and other media.
Proceedings ArticleDOI

Electronic marking and identification techniques to discourage document copying

TL;DR: Three coding methods are proposed that discourage illicit distribution by embedding each document with a unique codeword, yet enable one to identify the sanctioned recipient of a document by examination of a recovered document.
Journal ArticleDOI

Electronic marking and identification techniques to discourage document copying

TL;DR: This paper proposes techniques that discourage unauthorized distribution by embedding each document with a unique codeword, and describes one in detail, and presents experimental results showing that the identification techniques are highly reliable, even after documents have been photocopied.

Copyright protection for the electronic distribution of text documents : Identification and protection of multimedia information

TL;DR: Several mechanisms for marking documents and several other mechanisms for decoding the marks after documents have been subjected to common types of distortion are described and compared.
Related Papers (5)