6 research outputs found

    Genetic Algorithm Based Model in Text Steganography

    Get PDF
    Steganography is an ancient art. It is used for security in open systems. It focuses on hiding secret messages inside a cover medium. The most important property of a cover medium is the amount of data that can be stored inside it without changing its noticeable properties. There are many sophisticated techniques with which to hide, analyze, and recover that hidden information. This paper discusses an exploration in the use of Genetic Algorithm operators on the cover medium. We worked with text as the cover medium with the aim of increasing robustness and capacity of hidden data. Elitism is used for the fitness function. The model presented here is applied on text files, though the idea can also be used on other file types. Our results show this approach satisfied both security and hiding capacity requirements. Furthermore, we found that an increase in the size of the secret message resulted in an exponential increase in the size of the generated cover text. We also found a close relationship between the size of the chromosome used and the population size

    Print-Scan Resilient Text Image Watermarking Based on Stroke Direction Modulation for Chinese Document Authentication

    Get PDF
    Print-scan resilient watermarking has emerged as an attractive way for document security. This paper proposes an stroke direction modulation technique for watermarking in Chinese text images. The watermark produced by the idea offers robustness to print-photocopy-scan, yet provides relatively high embedding capacity without losing the transparency. During the embedding phase, the angle of rotatable strokes are quantized to embed the bits. This requires several stages of preprocessing, including stroke generation, junction searching, rotatable stroke decision and character partition. Moreover, shuffling is applied to equalize the uneven embedding capacity. For the data detection, denoising and deskewing mechanisms are used to compensate for the distortions induced by hardcopy. Experimental results show that our technique attains high detection accuracy against distortions resulting from print-scan operations, good quality photocopies and benign attacks in accord with the future goal of soft authentication

    A novel zero-watermarking scheme for text document authentication

    Get PDF
    The demand for copyright protection of text documents is extremely vital especially when the text is transmitted over the Internet. One of the best practical resolutions to maintain the security of document media is digital watermarking. Several approaches have been proposed to guarantee the safety and protection of the documents against dishonest copying and distribution. This paper suggests an innovative zero-watermarking scheme for the purpose of authentication and tamper detection in simple text documents. The algorithm generates a watermark based on the effective characters of the text contents which can be extracted later using extraction algorithm to identify the status of tampering in the text document. Experimental results demonstrate the effectiveness of the algorithm against random tampering attacks. Watermark pattern matching and watermark distortion rate are used as evaluation parameters on multiple text samples of varying length
    corecore