[BACK]
Computers, Materials & Continua
DOI:10.32604/cmc.2020.012088
images
Article

A Hybrid Intelligent Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet

Fahd N. Al-Wesabi1,2,*

1Department of Computer Science, King Khalid University, Muhayel Aseer, Saudi Arabia
2Faculty of Computer and IT, Sana’a University, Sana’a, Yemen
*Corresponding Author: Fahd N. Al-Wesabi. Email: falwesabi@kku.edu.sa
Received: 14 June 2020; Accepted: 30 June 2020

Abstract: In this paper, a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authentication and tampering detection of Arabic text contents. The proposed approach known as Second order of Alphanumeric Mechanism of Markov model and Zero-Watermarking Approach (SAMMZWA). Second level order of alphanumeric mechanism based on hidden Markov model is integrated with text zero-watermarking techniques to improve the overall performance and tampering detection accuracy of the proposed approach. The SAMMZWA approach embeds and detects the watermark logically without altering the original text document. The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques. To detect eventual tampering, SAMMZWA has been implemented and validated with attacked Arabic text. Experiments were performed on four datasets of varying lengths under multiple random locations of insertion, reorder and deletion attacks. The experimental results show that our method is more sensitive for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods.

Keywords: HMM; NLP; text analysis; zero-watermarking; tampering detection

1  Introduction

Security issues of digital text in various languages and formats have assumed great importance in communication technologies, especially in terms of content authentication, integrity verification, and copyright protection. Numerous applications, such as e-commerce and e-Banking, impose many challenges during transfer of content via the internet. Most of the digital media transferred over the internet is in text form and is highly sensitive in terms of content, structure, syntax, and semantics. Malicious attackers may temper these digital contents during the transfer process, and thus the modified content can result in incorrect decisions [1]. Several solutions of information security have been proposed for many proposes which includes encryption, data hiding, copyright protection, integrity verification and unauthorized access control [2,3]. Steganography and digital watermarking (DW) are the most common techniques of information hiding for several proposes such as content authentication and copyright protection whenever, if any altering is made in the watermarked media, the original media still protected and prove its ownership [4]. DW uses a specific algorithm to hide information by embedding it in the digital images, audio, video or text [5]. Several traditional text watermarking methods and solutions have been proposed and classified in various categories such as structure based, linguistic based, binary image based and format based [6]. Most of these solutions require some modifications or transformations on original digital text contents in order to embed the watermark information within text. Zero-watermarking is a modern technique that can be used with smart algorithms without any modification on original digital contents to embed the watermark information [7,8]. The most challenges in this area involve developing the appropriate methods to hide information in the sensitive text contents without any modification of it [9]. In last decade, the most common digital media transferred among various internet applications is in the form of text. Nevertheless, limited research focused in text solutions because text is natural language dependent and it is difficult to hide security information unlike images which security information can hide in pixels, audio in waves and video in frames [10]. Digital Holy Qur’an in Arabic, eChecks, online exams and marking are some examples of such sensitive digital text content. Various features of Arabic alphabets such as diacritics, extended letters, and other Arabic symbols make it easy to change the main meaning of text content by making simple modifications such as changing diacritics arrangements [1114]. Hidden Markov model (HMM) is the most common technique of natural language processing (NLP), which is used for text analysis and extract the text features.

In this paper, the authors present an intelligent hybrid approach for content authentication and tampering detection of Arabic text, called SAMMZWA. The proposed technique combines Markov Model and zero watermarking. The second order of alphanumeric mechanism of Markov model is used for text analysis in order to extract the interrelationships among contents of the given Arabic text which consequently generates the watermark key. The generated watermark is logically embedded in the original Arabic context without modifications of the original text. After transmission of the text, the embedded watermark is used to detect any tampering with the received Arabic text and ensures the authenticity of the transmitted text. The objective of the SAMMZWA approach is to achieve high accuracy of content authentication and sensitive detection of tampering attack in Arabic text.

The rest of the paper has five more sections. Section 2 provides a literature review of the related work. Section 3 presents SAMMZWA. Section 4 describes the implementation, simulation, and experimental details. Section 5 describes the comparison and results discussion, and Section 6 offers conclusions.

2  Literature Review

In the literature, several research on text watermarking approaches and methods have been proposed for several proposes of information security. In this paper, the authors briefly review the most common classifications of text watermarking methods which are linguistic-based watermarking, structural-based watermarking, and zero-watermarking methods [15].

2.1 Linguistic-Based Methods

The linguistic-based text watermarking methods are naturally language-based techniques, which works by making some modifications to the semantics and syntactic nature of plain text in order to embed the watermark key. In the linguistic and semantic-based approaches, information is hidden by making some manipulations on words and utilize them as watermark key using many methods and techniques such as synonym substitution, typos, noun-verbs, and text-meaning representational strings [16].

One of the syntactic-based method proposed in [17]. The proposed method uses open word space to improve the capacity of Arabic text. It works by utilize each word space to hide the binary bit 0 or 1 through which physical modification of the original text is conducted. Other syntactic-based methods presented in [18] for copyright protection by considers the existence of Harakat (diacritics, i.e., Fat-ha, Kasra, and Damma) in the Arabic language and reverses the Fatha for message hiding. Other English text watermarking method also make use of Unicode characters to hide the watermark information within English scripts. The ASCII code used for embedding is 00, however, and the Unicode used of multilingual for embedding are 01, 10, and 11 [19].

2.2 Structural-Based Methods

The structural-based text watermarking approaches are based on content structure which alters the features or structure of the text to embed the watermark information [20]. This also include modifications in general formatting features of the original text to hide watermark key such as locations of letters or words, writing style, repeating some letters or altering the features of the text [21,22]. One of the early approaches following the structure-based approach change the locations of words in text [23]. Other structural-based approaches proposed in [24,25] for content authentication of Chinese text by merging properties of sentences and calculate its entropy. In these approaches, the contents of Chines text divided into sets of small sentences and obtain semantic code of each word, then calculate its entropy by semantic codes’ frequency, and find the weight of each sentence by utilizing the sentence features such as entropy, length, relevance, and weight function. The extracted features utilized to generate the watermark by using the verbs, and nouns of the high-weight sentences.

2.3 Zero Watermark-Based Methods

Zero text watermark-based approaches are based on text features which is achieved by generating the watermark key from the text context. This means several text features should be obtained, extracted and utilized as a watermark information. Several techniques and solutions have been proposed based on text features includes number of words or sentences letters, first letter of each word, and appearance frequency of non-vowel ASCII letters and words [2634]. One of the available text zero-watermarking approaches presented in [26] which hide the watermarking information within the social media and validate it later in terms of accuracy and reliability. Other text zero-watermarking techniques proposed in [27] to validate data integrity of text context over the internet of things. The watermark information is generated as a text features such as text size, data appearance frequency, and time of data capturing. The generated watermark will have to be embedded logically in the original contents before its transmission. Reference [28] shows a text zero-watermarking method has been developed for individual privacy protection based on certain measures such as Hurst exponent and zero crossing of the speech signals. Individual identity has to obtained to embed it as a watermark key. In the case of copyright protection of English text, a text zero-watermark methods have been proposed in [29,30] which uses the appearance frequency of non-vowel ASCII letters and words.

According to combination solutions with zero-watermarking, such solutions presented in [31,32] which uses natural language processing and zero-watermarking for content authentication. The proposed methods trying to extract some text features to obtain the text probability properties and utilize it as a watermark key. Reference [33] shows a spatial domain technique for copyright protection, data security and content authentication of multimedia images. A robust geometric features-based method has been presented in [34] to improves capacity and watermark robustness.

3  The Proposed Approach

This paper proposes a novel reliable approach by integrating NLP and text zero-watermark techniques which there is no need to embed extra information such as watermark key, or even to perform any modifications on the original text. As a result of hybrid solution, very low impact of overall complexity is resulted in terms of time, but in the other hands, there is no possibility for attackers to figure out the mechanism work of algorithm. Second level order of alphanumeric mechanism of Markov model has been used as NLP technique to analyze the contents of Arabic text and extract the interrelationships features of these contents. The main contributions of our approach, SAMMZWA can be summarized as follows:

Unlike the previous work, in which the watermarking is performed by effecting text, content, and size, our approach SAMMZWA embeds the watermarking logically without any effect on the text, content, and size.

In our SAMMZWA approach, watermarking does not need any external information because the watermark key is produced as a result of text analysis and extracting the relationship between the content itself and then making it as a watermark.

Our SAMMZWA approach is highly sensitive to any simple modification on the text and the meaning in the Arabic text, which is known as complex text, including the Arabic symbols which can change the meaning of the Arabic word. The three contributions mentioned above are found somehow only in images but not in text. This is the vital point concerning to the contribution of this paper.

In addition, our SAMMZWA approach can effectively determine the place of tempering occurrence. This feature can be considered an advantage over Hash function method.

SAMMZWA has been implemented, simulated using various several standard datasets, and compared to other baseline approaches under all performance metrics to find which approach gives the best accuracy of tampering detection. Simulation and comparison results prove the accuracy and effectiveness of SAMMZWA approach in terms of tampering detection of unauthorized attacks. Baseline approaches and their execution parameters are presented later in Section 5.1.

The following subsections explain in detail two main processes that should be performed in SAMMZWA, namely watermark generation and embedding process, and watermark extraction and detection process.

3.1 Watermark Generation and Embedding Process

The three main sub-processes included in this process are pre-processing, Arabic text analysis and watermark generation, and watermark embedding as illustrated in Fig. 1.

images

Figure 1: Text analysis, watermark generation and embedding processes of SAMMZWA

3.1.1 Pre-Processing Process

The pre-processing of the original Arabic text is a key step for Arabic text analysis and watermark generation process to remove extra spaces and new lines, and it will be influence directly on the tampering detection accuracy. The original Arabic text (OAT) is required as input for the pre-processing process.

3.1.2 Text Analysis and Watermark Generation Process

This process include two sub processes are building Markov matrix, and text analysis and watermark generation processes.

Building a Markov matrix is the starting point of Arabic text analysis and watermark generation process using Markov model. A Markov matrix that represents the possible states and transitions available in a given text is constructed without reputations. In SAMMZWA approach, each unique pair of alphanumeric available in the given Arabic text represents a present state, and each unique alphanumeric represent a transition in Markov matrix. During the building process of the Markov matrix, the proposed algorithm initializes all transition values by zero to use these cells later to keep track of the number of times that the ith unique pair of alphanumeric is followed by the images single alphanumeric in the given Arabic text.

Pre-processing and building Markov matrix algorithm is executed as presented in Algorithm 1.

images

Algorithm 1: Pre-processing and building Markov algorithm of SAMMZWA

Where, OAT: is an original Arabic text, PAT: is a pre-processed Arabic text, a2_mm: is a states and transitions matrix with zeros values for all cells, ps: refers to present state, ns: refers to next state.

According to this algorithm, a method is presented to construct a two-dimensional matrix of Markov states and transitions named imageswhich represents the backbone of Markov model.

a2_mm[i][j] length is dynamic in which it is depending on the given text contents and size. The matrix rows refer to the states which is equal to the total number of unique pair of alphanumeric in the given text. However, the matrix columns refer to transitions which is fixed, which is equal to sixty-two possible transitions (twenty-eight alphabets of Arabic letters, space letter, ten integer numbers “0–9,” and twenty-four specific symbols, i.e., (. ' " , ; : ? ! / \ @ $ & % * + - = >< [ ]).

Text analysis and watermark generation process: after the Markov matrix is constructed, natural language processing and text analysis process should be performed to find the interrelationships between contexts of the given Arabic text and generate watermark patterns. In this sub-process, the appearance number of possible next transitions for each current state of pair of alphanumeric will calculated and constructed as transition probabilities by Eq. (1) below.

images

where,

trans: is total of all possible transitions.

n: is total of all possible states.

i: is ith present state of pair of alphanumeric.

j: is jth next transition.

The following example of an Arabic text sample describes the mechanism of the transition process of present state to other next states.

When using the second level order of alphanumeric mechanism of HMM, every unique pair of alphanumeric is a present state. Text analysis is processed as the text is read to obtain the interrelationship between present state and the next states as illustrated in Fig. 2.

images

Figure 2: States representation of Arabic text sample using SAMMZWA

Text analysis is performed using HMM to extract the features and find the interrelationship between the contents of the given text, we represent 39 unique present states and their 61 possible transitions as illustrated below in Fig. 3.

images

Figure 3: Sample of an Arabic text states and their transitions using SAMMZWA

Is it possible to have two or more no-zero value in a row, for instance, it is assumed here that “ال” is a present state of pair alphanumeric, and the available next transitions are “م ث، ب، س، ث، ب، ب، ى، ث، ب”. It is observed that ten transitions are available in the given Arabic text sample and “ث” transitions repeat three times.

Algorithm of text analysis and watermark generation based on the second-level order of alphanumeric mechanism of Markov model proceeds as illustrated in Fig. 4.

images

Figure 4: Feature extraction and watermark generation of the given text using SAMMZWA

Arabic text analysis and watermark generation algorithm is presented formally and executed as illustrated in Algorithm 2.

images

Algorithm 2: Watermark generation algorithm of SAMMZWA

where, ps: refers to the state of unique pair of alphanumeric, ns: represents the next state.

3.1.3 Watermark Embedding Process

In the proposed SAMMZWA approach, embedding the watermark have to done logically or digitally into the given text, without physically applying the watermark inside the text and no need to alter the original text. This is achieved by extracting the features of the given text and generating the watermark key by finding all non-zero values in Markov matrix and concatenate them sequentially to generate the original watermark pattern a2_WMPO, as given in Eq. (2) and illustrated in Fig. 5.

images

Figure 5: Generated watermark a2_WMPO using SAMMZWA

images

Watermark embedding process based on second level order of alphanumeric mechanism of Markov model is presented formally and executed as illustrated in Algorithm 3.

images

Algorithm 3: Watermark embedding algorithm of SAMMZWA

3.2 Watermark Extraction and Detection Process

While the watermarked key is kept secret and ready for detection and verification process, the original watermarked texts are shared to others via Internet. In order to verify the authenticity of the attacked text (AATP), the watermarked text is collected with its watermark key a2_EWMA and compared with the original watermarked text (PAT) with its watermark key a2_WMPO.

Two sub-processes are involved in this process, which are watermark extraction and watermark detection as illustrated in Fig. 6.

images

Figure 6: Watermark extraction and detection processes using SAMMZWA

3.2.1 Watermark Extraction Algorithm

The pre-processed attacked Arabic text (AATP) is required as input to this sub-process. However, attacked watermark patterns (a2_WMPA) is an output as illustrated in Algorithm 4.

images

Algorithm 4: Watermark extraction algorithm of SAMMZWA

3.2.2 Watermark Detection Algorithm

This process aims to verify the authenticity of the attacked text (AATP) and notify it is authentic or tampered. This process is achieved by compare a2_WMPA and a2_WMPO in both state and transition level matching as follows:

State level matching: is a default matching, which compare a whole pattern of a2_WMPO and a2_WMPA. The result of this matching is TRUE of FALSE. TRUE notification refer to authenticity of the text without any tampering occurred. Otherwise, FALSE notification refers to tampering detected and then it continues to the transition level matching.

Transition level matching: each transition in a2_WMPA will be compared with the equivalent transition of a2_WMPO as given by Eqs. (3) and (4).

images

where,

a2_images: refers to pattern matching rate value, (0 < a2_PMRT ≤ 1)T.

images

where,

images: refers to matching rate in state level, (0 < a2_PMRS ≤ 100).

The weight of each state will be calculated as give in Eq. (5).

images

where,

tf: refers to value of transitions frequency.

m: refers to total number of transitions.

images: is the total pattern matching rate of ith state for each unique pair of alphanumeric.

i: is a number of all available states.

The final a2_PMR of AETP and OATP are calculated by Eq. (6).

images

where,

N: is a total number of non-zeros values in a2_mm[i][j].

The distortion rate of watermark pattern refers to the detected tampering rate, which is denoted by a2_WDR and calculated by Eq. (7).

images

The watermark detection process is executed as illustrated in Algorithm 5.

images

Algorithm 5: Watermark detection algorithm of SAMMZWA

where,

a2_PMR: refers to tampering detection accuracy (0 < a2_PMR ≤ 100).

images: refers to distortion rate (0 < a2_WDRS ≤ 100).

The results of watermark extraction and detection process of the given sample of Arabic text using SAMMZWA are illustrated in Fig. 7.

images

Figure 7: Result of watermark extraction and detection process of the given text using SAMMZWA

As shown in Fig. 7, TP1 represents first transition of non-zero in the given text, TP2 represents second transition, and so on. Some states have only one transition, which is shown in TP1. However, some states have more than transitions, which are represented in TP1, TP2, and so on, such as “قف” and “ال” states.

4  Implementation and Simulation

To evaluate the tampering detection accuracy of SAMMZWA, several simulation and experiments are performed using self-developed program, various standard dataset, and predefined tampering attacks with various attack volumes as explained in the following sub sections.

4.1 Implementation Environment and Setup

A self-developed program has been developed to test and evaluate the performance of SAMMZWA. Implementation environment of SAMMZWA are: CPU: Intel Core i7-4650U/2.3 GHz, RAM: 8.0 GB, Windows 10–64 bit, PHP Programming language with VS Code IDE.

4.2 Simulation and Experimental Parameters

Tab. 1 shows an experimental and simulation parameters and their associated values that used to perform the experiments of the proposed SAMMZWA approach.

Table 1: Experimental and simulation parameters

images

4.3 Performance Metrics

Tampering detection accuracy refers to the performance of the SAMMZWA approach, which is evaluated using the following metrics:

Tampering detection accuracy (a2_PMR and a2_WDR) under all mentioned attack types and volumes.

Desired tampering detection accuracy values which close to 100%.

Comparison and results evaluation of dataset size effect, attack types effect, and attack volumes effect against tampering detection accuracy using the proposed SAMMZWA approach, HNLPZWA and ZWAFWMMM baseline approaches.

4.4 Simulation, Experiments and Results Discussion with SAMMZWA

In this sub section, author evaluates the tampering detection accuracy of SAMMZWA. The letter set cover all Arabic letters, spaces, numbers, and special symbols. Experiments were conducted in different volumes of datasets, various kinds of attacks with their rates as identified above in Tab. 1. The simulation and experiments results are shown in tabular form in Tab. 2 and graphically illustrated in Fig. 8.

Table 2: Tampering detection accuracy evaluation of SAMMZWA approach

images

From Tab. 2 above and Fig. 8 below, we can see that SAMMZWA shows the best tampering has been detected by reorder attack in cases of both large (50%) and very low (5%) volumes of attack because reorder attack represents both insertion and deletion attacks in the same time. Whereas, in case of mid attack volume, high tampering is detected under deletion attack. This mean that, SAMMZWA gives best detection accuracy and high sensitive to tampering under both deletion and reorder attacks in all scenarios of attack volumes.

images

Figure 8: Tampering detection accuracy evaluation of SAMMZWA under all attacks and various volumes

5  Comparison and Result Discussion

The tampering detection accuracy results were critically analyzed, effect study and compared between SAMMZWA and baseline approaches ZWAFWMMM and HNLPZWA and shows discussion of their effect under the major factors, i.e., dataset size, attack types and volumes.

5.1 Baseline Approaches

Tampering detection accuracy of SAMMZWA is compared with HNLPZWA (an intelligent hybrid of natural language processing and zero-watermarking approach) and ZWAFWMMM (Zero-Watermarking Approach based on Fourth level order of Arabic Word Mechanism of Markov Model) [35]. Comparison is performed under all performance metrics mentioned above in Sub Section 4.3 to find which approach gives the best accuracy of tampering detection.

5.2 Comparison of SAMMZWA with ZWAFWMMM and HNLPZWA Approaches

This subsection presents the tampering detection accuracy comparison of SAMMZWA with ZWAFWMMM and HNLPZWA approaches and study their effect under core affected factors are dataset size, attack types and volumes.

5.2.1 Comparison and Results Study of Dataset Size Effect

In this subsection, authors present an evaluation of the different dataset size effects on tampering detection accuracy against all attack types under their different volumes. Fig. 3 shows a comparison of that effect using SAMMZWA along with ZWAFWMMM and HNLPZWA approaches.

As shown in the summary of the comparative results of Fig. 9 applying the SAMMZWA approach, the highest effects of dataset size that lead to the best tampering detection accuracy are ordered as ASST, AMST, AHMST and ALST, respectively. This means that tampering detection accuracy increased with the decreasing document size and decreased with the increasing document size. On the other hand, the results show that, the SAMMZWA approach outperforms both ZWAFWMMM and HNLPZWA approaches in terms of tampering detection accuracy under all scenarios of dataset sizes.

images

Figure 9: A comparison of dataset size effect on tampering detection accuracy using SAMMZWA with ZWAFWMMM and HNLPZWA approaches

5.2.2 Comparison and Results Study of Attack Type Effect

Fig. 10 shows a comparison of the different attack types effect on tampering detection accuracy against all dataset sizes and all scenarios of attacks volumes. A comparison was performed using SAMMZWA with ZWAFWMMM and HNLPZWA approaches.

images

Figure 10: A comparison of attack type effect on tampering detection accuracy using SAMMZWA with ZWAFWMMM and HNLPZWA approaches

As shown in Fig. 10, the SAMMZWA approach outperforms both ZWAFWMMM and HNLPZWA in terms of tampering detection accuracy in all scenarios of deletion and rephrasing attacks. However, ZWAFWMMM and HNLPZWA approaches outperforms SAMMZWA approach in case of insertion attack. This means that SAMMZWA approach is strongly recommended and applicable for content authentication and tampering detection of Arabic text documents transmitted via internet in all cases of deletion and rephrasing attacks.

5.2.3 Comparison and Results Study of Attack Volume Effect

Fig. 11 shows a comparison of the different attack volume effects on tampering detection accuracy against all dataset sizes and all scenarios of attacks volumes. A comparison was performed using SAMMZWA with ZWAFWMMM and HNLPZWA approaches.

As shown in Fig. 11, the SAMMZWA approach outperforms ZWAFWMMM and HNLPZWA approaches in terms of tampering detection accuracy in all scenarios of low, mid and high volumes of all attacks. This means that SAMMZWA approach is strongly recommended and applicable for content authentication and tampering detection of Arabic text documents under all volumes of all attack types.

images

Figure 11: A compression of attack volume effect on tampering detection accuracy using SAMMZWA with ZWAFWMMM and HNLPZWA approaches

6  Conclusion

In this paper, SAMMZWA approach has been proposed by integrating a zero watermarking and natural language processing techniques for content authentication and tampering detection of Arabic text transmitted via the internet. SAMMZWA implemented using PHP self-developed program in VS code IDE as well as simulation and experiments using various standard dataset under different volumes of insertion, deletion, and rephrasing attacks. SAMMZWA approach has been compared with ZWAFWMMM and HNLPZWA approaches. Comparison results show that SAMMZWA outperforms ZWAFWMMM and HNLPZWA in terms tampering detection accuracy under deletion and reorder attacks. Although SAMMZWA approach is an efficient approach, and it is designed only for all scenarios of insertion attack. For the future work, the authors will consider detection accuracy under all scenarios of deletion and rephrasing attacks. Moreover, the authors also intend to evaluate the tampering detection accuracy using high level order of alphanumeric of Markov model.

Funding Statement: The author extends his appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number (R. G. P. 2/55/40/2019), Received by Fahd N. Al-Wesabi. www.kku.edu.sa

Conflicts of Interest: The author declares that he has no conflicts of interest to report regarding the present study.

References

1S. Nurul, A. Kamsin, L. Yee and H. Rahman. (2018), “A review of text watermarking: Theory, methods, and applications. ,” IEEE Access, vol. 6, pp, 8011–8028, .

  1. 2F. Peng, Q. Long, Z. X. Lin and M. Long. (2019), “A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates. ,” Multimedia Tools and Applications, vol. 78, no. (19), pp, 26885–26905, .
  2. 3A. Alwan, M. Shahidan, N. Amir, M. Hashim and M. S. Mohd. (2018), “A review and open issues of diverse text watermarking techniques in spatial domain. ,” Journal of Theoretical and Applied Information Technology, vol. 96, pp, 5819–5840, .
  3. 4C. G. Ho, J. J. Hyo, M. H. Min, K. Y. Tae and P. S. Bum. (2019), “User authentication system based on baseline-corrected ECG for biometrics. ,” Intelligent Automation and Soft Computing, vol. 25, no. (1), pp, 193–204, .
  4. 5P. Singh and R. S. Chadha. (2013), “A survey of digital watermarking techniques, applications and attacks. ,” International Journal of Engineering Innovation and Technologies, vol. 2, no. (9), pp, 165–175, .
  5. 6M. Kaur and V. Sharma. (2016), “Encryption based LSB steganography technique for digital images and text data. ,” International Journal of Computer Science and Network Security, vol. 16, no. (9), pp, 90–95, .
  6. 7Q. W. Yang, F. Peng, J. T. Li and M. Long. (2016), “Image tamper detection based on noise estimation and lacunarity texture. ,” Multimedia Tools and Applications, vol. 75, no. (17), pp, 10201–10211, .
  7. 8B. Kaur and S. Sharma. (2017), “Digital watermarking and security techniques: A review. ,” International Journal of Computer Science and Technology, vol. 8, no. (2), pp, 44–47, .
  8. 9S. Hakak, K. Amirrudin, O. Tayan, I. Yamani and G. Amin. (2019), “Approaches for preserving content integrity of sensitive online Arabic content: A survey and research challenges. ,” Information Processing and Management, vol. 56, no. (2), pp, 367–380, .
  9. 10N. Al-Maweri, R. Ali, A. Adnan, A. Ramli and S. Ahmad. (2016), “State-of-the-art in techniques of text digital watermarking: Challenges and limitations. ,” Journal of Computer Science, vol. 12, no. (2), pp, 62–80, .
  10. 11O. Tayan, M. Kabir and Y. Alginahi. (2014), “A hybrid digital-signature and zero-watermarking approach for authentication and protection of sensitive electronic documents. ,” Science World Journal, vol. 2014, no. (1), pp, 1–14, .
  11. 12S. Dhiman and O. Singh. (2016), “Analysis of visible and invisible image watermarking—A review. ,” International Journal of Computer Applications, vol. 147, no. (3), pp, 36–38, .
  12. 13S. Hakak, A. Kamsin, O. Tayan, M. Idris and G. Gilkar. (2019), “Approaches for preserving content integrity of sensitive online Arabic content: A survey and research challenges. ,” Information Processing & Management, vol. 56, no. (2), pp, 367–380, .
  13. 14K. Hameed, A. Khan, M. Ahmed, A. Goutham Reddy and M. M. Rathore. (2018), “Towards a formally verified zero watermarking scheme for data integrity in the Internet of things based-wireless sensor networks. ,” Future Generation Computer Systems, vol. 82, pp, 274–289, .
  14. 15S. Sameeka and P. Kalpesh. (2018), “Securing web contents through invisible text watermarking for copyright protection. ,” International Journal of Engineering Development and Research, vol. 6, no. (3), pp, 257–261, .
  15. 16J. Chen, H. F. Ma and Q. Lu. (2016), “Text watermarking algorithm based on semantic role labeling. ,” Proc. 3rd Int. Conf. of Digital Information Processing, Data Mining, Wireless Communication, pp, 117–120, .
  16. 17A. Reem and A. Lamiaa. (2018), “Improved capacity Arabic text watermarking methods based on open word space. ,” Journal of King Saud University—Computer and Information Sciences, vol. 30, no. (2), pp, 236–248, .
  17. 18S. Mujtaba and S. Asadullah. (2015), “A novel text steganography technique to Arabic language using reverse Fat5Th5Ta. ,” Pakistan Journal of Engineering, Technology and Sciences, vol. 1, no. (2), pp, 106–113, .
  18. 19S. Abdul, S. Wesam and A. Dhamyaa. (2013), “Text steganography based on Unicode of characters in multilingual. ,” International Journal of Engineering Research and Applications, vol. 3, no. (4), pp, 1153–1165, .
  19. 20A. Nasr addin, A. Wan, R. Abdul, S. Khairulmizam and M. Sharifah. (2016), “Robust digital text watermarking algorithm based on Unicode extended characters. ,” Indian Journal of Science and Technology, vol. 9, no. (48), pp, 1–14, .
  20. 21M. Kaur. (2015), “An existential review on text watermarking techniques. ,” International Journal of Computer Applications, vol. 120, no. (18), pp, 29–32, .
  21. 22R. Alotaibi and L. Elrefaei. (2015), “Arabic text watermarking: A review. ,” International Journal of Artificial Intelligence & Applications, vol. 6, no. (4), pp, 01–16, .
  22. 23M. Bashardoost, M. Rahim, T. Saba and A. Rehman. (2017), “Replacement attack: A new zero text watermarking attack. ,” 3D Research, vol. 8, no. (1), pp, 11, .
  23. 24Y. Liu, Y. Zhu and G. Xin. (2014), “A zero-watermarking algorithm based on merging features of sentences for Chinese text. ,” Journal of the Chinese Institute of Engineers, vol. 38, no. (3), pp, 391–398, .
  24. 25P. Zhu, G. Xiang and W. Song. (2016), “A text zero watermarking algorithm based on Chinese phonetic alphabets. ,” Wuhan University Journal of Natural Sciences, vol. 21, no. (4), pp, 277–282, .
  25. 26T. Milad. (2018), “ANiTH: A novel intelligent text hiding technique. ,” IEEE Dataport, vol. 10,
  26. 27H. Khizar, K. Abid, A. Mansoor and G. Alavalapati. (2018), “Towards a formally verified zero watermarking scheme for data integrity in the Internet of things based-wireless sensor networks. ,” ELSEVIER Future Generation Computer Systems, vol. 167, pp, 1–16, .
  27. 28A. Zulfiqar, M. Shamim, M. Ghulam and A. Muhammad. (2018), “New zero-watermarking algorithm using Hurst exponent for protection of privacy in telemedicine. ,” IEEE Access, vol. 6, pp, 7930–7940, .
  28. 29O. Tayan, M. Yasser and N. Muhammed. (2014), “An adaptive zero-watermarking approach for text documents protection. ,” International Journal of Image Processing Techniques, vol. 1, no. (1), pp, 33–36, .
  29. 30M. Hanaa and A. Maisa’a. (2016), “Comparison of eight proposed security methods using linguistic steganography text. ,” International Journal of Computing & Information Sciences, vol. 12, no. (2), pp, 243–251, .
  30. 31M. Mokhtar, M. Fadl and F. Al-Wesabi. (2014), “Combined Markov model and zero-watermarking techniques to enhance content authentication of Arabic text documents. ,” International Journal of Computational Linguistics Research, vol. 5, no. (1), pp, 26–42, .
  31. 32F. Al-Wesabi, Z. Adnan and U. Kulkarni. (2014), “A zero text watermarking algorithm based on the probabilistic patterns for content authentication of text documents. ,” International Journal of Computer Engineering & Technology, vol. 4, no. (1), pp, 284–300, .
  32. 33N. Hurrah, S. A. Parah, N. A. Loan, A. Javaid and M. Elhoseny. (2019), “Dual watermarking framework for privacy protection and content authentication of multimedia. ,” Future Generation Computer Systems, vol. 94, pp, 654–673, .
  33. 34D. Tong, C. Zhu, N. Ren and W. Shi. (2019), “High-capacity and robust watermarking scheme for small-scale vector data. ,” KSII Transactions on Internet and Information Systems, vol. 13, no. (12), pp, 6190–6213, .
  34. 35F. Al-Wesabi, M. Khalid and N. Nadhem. (2020), “A zero watermarking approach for content authentication and tampering detection of Arabic text based on fourth level order and word mechanism of Markov model. ,” ELSEVIER Journal of Information Security and Applications, vol. 52, pp, 1–15, .
images This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.