Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

() ( )

//:

//:

ABSTRACT
Due to the rapid development in communication and multimedia
technology, different techniques are used for copyright protection and
monitoring illegal copying of these media. One of the most important
techniques is digital watermarking.
In this research, an algorithm for copyright protection of text
documents was designed and implemented.
The algorithm includes three steps: Watermark generation using the
original text, watermark embedding using space embedding approach and
finally watermark extracting and comparing it with the original one using
normalized correlation.
Experimental results are presented to demonstrate the robustness of
the algorithm against common attacks which alter the embedded text like
changing some letters of the text, changing structure of text sentences, or
changing the number of spaces between the words etc.
Matlab Ver. 6.5 was used to implement the algorithm under
Windows.

, : .

.



... .

MatlabVer6.5

Windows .
.1 :

Information Hiding

, ,
]. [1
,
) (covered writing
) (steganography
) (intellectual property ) (authentication
) (digital watermarking ].[3,2

.
] .[8

.
Information Hiding Cryptography





]. [6

, ,

...

.
data watermarking
,
.
]. [5
.2 :

embedding

extraction .detection
) (1 .
Cover data key
Secret Public
. ,

.

.
Watermark W

Watermarked
data I

Cover data I

Digital Watermark
)(Embedding

Secret/Public key K

) (1 .
) (2


non-blind watermarking
. [8,7,5,4] blind watermarking

original data I

' Watermark W

Digital Watermark
)(detection

Test data
Secret/Public key K

) (2
.3 :


.
.
]: [6,1
_1

Line shift coding protocol

300/1 ,
,
.

0 1
.
_2

Word shift coding protocol

, .


,
) (0 ) (1
.

...

_ 3

Feature coding protocol

) (Parser
,
,
t , f
.

_ 4

Spaces in Text



,
.
.
.4 :

,
.
1.4

Watermark Generation

-:

.1 .
.2 .
.3 .

ASCII code

,
ASCII

code ) (1
) (1
). (0
) (1) (0
) (1 , )(1

). (0

) (1) (0

.

) (1
.

) (1 ) (0
) (1 ) (0 ) (26

.

) (W
.
2.4

Watermark Embedding


) . (W ) (3

)(W

) (0

...

) (W
) (1 )(

). (W



(W) code

textIndex=0

textIndex= textIndex+1

W(Index)=1

WIndex = WIndex+1

WIndex=sizeW

)(3

3.4 Watermark Extracting


) (Ex
) (W
.
) (4


) (0
) (Ex ) (1
) (Ex .

...

ExIndex=1

) (4

TextIndex=1

TextIndex=TextIndex+1

) (0
Ex
ex

) (1
Ex
ex

ExIndex=ExIndex+1
=+++++=1

ExIndex=ExIndex+1
=+++++=1

)ExIndex=size(W

watermark testing

):(Normalized Correlation
NC = Wi Wi / Wi Wi
:
:W .
:W .
NC ] [-1,1 ) (0,1
).[9] (1
.4:

) (5

) (6 .
. Watermark verification

Ex
] [-1,1
) (1 Ex
.W

...

Introduction to Steganography
Steganography the art of hiding messages inside other messages, has
until recently been the poor cousin of cryptography. Now it is gaining new
popular with the current industry demands for digital watermarking and
fingerprinting of audio and video.
What are watermarking and fingerprinting? Through the use of advanced comp.
software authors of image., music and software can place a hidden trade mk
in their product, allowing them to keep a check on piracy. This is commonly
known as watermarking.Hiding serial numbers or asset of characteristics that
distinguishes an object from asimilar objects known as fingerprinting.
Together, these two are intended to fight piracy. The later is used to detect
Copyright violators and the former is used to prosecute them. But these are
only examples of the much wider field of Steganography.
In this paper, we aim to present ageneral introduction to steganography
or data hiding as it is sometimes just known. Astrong focus on the history of
steganography is provided. We study the tricks the early Romans used such as
writing on the wood under wax tables through the developments of the middle
ages and ending with the triumphs of world war2 such as the German microdot
hailed by j.edge as masterpiece of siaionech we then tern to data hiding in
three different media that of text and images.
Steganography in images has truly come of age with the invension of fast power
Comp. Software is readily available of the Internet for any user to hide data
inside images the most popular technique is least significant bit insertion
which we look at, The final medium audio is first explained through a look at
also at more complex method

( )

Introduction to Steganography
Steganography the art of hiding message inside other messages, has
until recently been the poor cousin of cryptography. Now it is gaining new
popular with the current industry demands for digital watermarking and
fingerprinting of audio and video.
What are watermarking and fingerprinting? Through the use of advanced comp.
software authors of image, music and software can place a hidden trade mk
in their product, allowing them to keep a check on piracy. This is commonly
known as watermarking.Hiding serial numbers or asset of characteristics that
distinguishes an object from asimilar objects known as fingerprinting.
Together, these two are intended to fight piracy. The later is used to detect
Copyright violators and the former is used to prosecute them. But these are
only examples of the much wider field of Steganography.

( )
Attacks on Embedding Text .

: .

( sound) ( 7)( music)

.(1)

( 6) ( comp.)

( 7) ( mk) ( computer)

...

) (mark

) (messages ) (2
) (data
). (1

) (of audio and video ) (5

) (of multimedia like text ) (through the use of


) (6 ) (by using
) .(0.75

.
. :

) (1 ) (5

).(1


.
.7 :



) (1

) (1 .


.


.



.


.

...

[1]

Bender, W.; Gruhl, D. ; N. Morimoto and A. Lu (1996) Techniques


for Data Hiding ,IBM System Journal 35(3&4).

[2]

Jian Zhao and Eckhard Kock (1996) A Digital Watermarking


System for Multimedia Copyright Protection, ACM Multimedia,
Boston, USA.

[3]

Johnson, N.; Duric, Z., Jajoda (2000) Information Hiding:


Steganography
and
Watermarking
Attacks
and
Countermeasure, Kluwer Academic Publisher.

[4]

Mark Noto (2001) Hiding Text in MP3 Files , SANS Institute.

[5]

Nedeljko Cvegic,Tapio Seppanen, Improving Audio Watermarking


Scheme Using Psychoacoustic Watermark Filtering ".

[6]

Neil, F. Johnson and Zoran Duric (2000) Steganography and


Digital Watermarking , http://www.jjtc.com/ Steganography/.

[7]

Sabrina, Sowers and Abdou Youssef (1998) Testing Digital


Watermarking Resistance to Destruction , Information Hiding
LNCS.

[8]

Stefan Katzenbeisser ; Fabien A. P. Petitcolas (1999) Information


Hiding Techniques for Steganography and Digital Watermarking,
Arteech House, Boston, London .

[9]

Wah, W. (2003) Image Watermaking and


Techniques, Ph.D. Thesis, Hong Kong University.

Data

Hiding

You might also like