A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Proposing High-Smart Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet
2020
IEICE transactions on information and systems
Fifth level order of word mechanism based on hidden Markov model is integrated with digital zero-watermarking techniques to improve the tampering detection accuracy issues of the previous literature proposed ...
In this paper, a Hybrid of Natural Language Processing and Zero-Watermarking Approach (HNLPZWA) has been proposed for the content authentication and tampering detection of Arabic text. ...
Acknowledgements The author extends his appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Research Groups under grant number (R. G. ...
doi:10.1587/transinf.2020edp7011
fatcat:cly6hoy5rfe7zaucoubgwuuece
Text Analysis-Based Watermarking Approach for Tampering Detection of English Text
2021
Computers Materials & Continua
Based on hidden Markov model (HMM), the fourth level order of the word mechanism is used to analyze the contents of the given English text to nd the interrelationship between the contexts. ...
In this paper, text zero-watermarking and text feature-based approach is proposed to improve the tampering detection accuracy of English text contents. ...
The algorithm of text analysis and watermark generation based on the fourth-level order of the word mechanism of the Markov model proceeds as illustrated in Fig. 3 .
Algorithm 2. ...
doi:10.32604/cmc.2021.015785
fatcat:3g27idtitfdx3oreqlffujt5ay
A Smart English Text Zero-Watermarking Approach Based on Third-Level Order and Word Mechanism of Markov Model
2020
Computers Materials & Continua
In this paper, an intelligent text Zero-Watermarking approach SETZWMWMM (Smart English Text Zero-Watermarking Approach Based on Mid-Level Order and Word Mechanism of Markov Model) has been proposed for ...
Based on Hidden Markov Model (HMM), Third level order of word mechanism is used to analyze the interrelationship between contexts of given English texts. ...
The proposed approach is based on third level order of word Mechanism based on Markov Model. ...
doi:10.32604/cmc.2020.011151
fatcat:o7bgbo6bajfipfdotubtdlfyye
Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text
2022
Computers Materials & Continua
In this paper, a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking (SFASCDW) is proposed for content authentication and tampering detection ...
A first-level order of alphanumeric mechanism, based on hidden Markov model, is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach. ...
Approach based on Fourth level order of Arabic Word Mechanism of Markov Model (ZWAFWMMM) [6] . ...
doi:10.32604/cmc.2022.018591
fatcat:aacbbrrfvzaavhgdzkt6jhtpee
An Optimal Text Watermarking Method for Sensitive Detecting of Illegal Tampering Attacks
2022
Computers Materials & Continua
This is achieved by using the third level and alphanumeric strategy of the Markov model as a text analysis technique for analyzing the Arabic contents to obtain its features which are considered as the ...
In this paper, an efficient text-based watermarking method has been proposed for detecting the illegal tampering attacks on the Arabic text transmitted online via an Internet network. ...
Approach based on Fourth level order of Arabic Word Mechanism of Markov Model (ZWAFWMMM) [6] . ...
doi:10.32604/cmc.2022.019686
fatcat:qyysl6t4sjba7giub6ejptymiu
Proposing a High-Robust Approach for Detecting the Tampering Attacks on English Text Transmitted via Internet
2020
Intelligent Automation and Soft Computing
Second-gram and word mechanism of hidden Markov model is used as a natural text analysis technique to extracts English text features and use them as a watermark key and embed them logically and validates ...
In this paper, a robust approach INLPETWA (an Intelligent Natural Language Processing and English Text Watermarking Approach) is proposed to tampering detection of English text by integrating zero text ...
Conflicts of Interest: The authors declare that they have no conflicts of interest.
References ...
doi:10.32604/iasc.2020.013782
fatcat:orlrn5rshza3nlruyrr4664vd4
Tamper Detection and Localization for Quranic Text Watermarking Scheme Based on Hybrid Technique
2021
Computers Materials & Continua
To enhance the watermarking scheme of the text of the Quran based on hybrid techniques (XOR and queuing techniques) of the purposed scheme. ...
The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio (PSNR), and Normalized Cross-Correlation (NCC); thus, the location for tamper ...
Funding Statement: The authors extend their appreciation to the Ministry of Higher Education (MOHE) and Universiti Teknologi Malaysia (UTM) for their educational and nancial support. ...
doi:10.32604/cmc.2021.015770
fatcat:ynsgwv5eorgobbbx643q7u4bgi
Payload Capacity Scheme for Quran Text Watermarking Based on Vowels with Kashida
2021
Computers Materials & Continua
The purpose of this paper is to enhance the Quran text watermarking scheme based on a reversing technique. ...
A watermarking technique with enhanced attributes must, therefore, be designed for the Quran's text using Arabic vowels with kashida. ...
Funding Statement: The authors extend them appreciation to the Ministry of Higher Education (MOHE) and Universiti Teknologi Malaysia (UTM) for their educational and financial support. ...
doi:10.32604/cmc.2021.015803
fatcat:fbmqdtx3dbf6xlozek3ily7q3m
Towards Template Security for Iris-based Biometric Systems
2012
This unique attribute of biometric based authentication system poses a challenge that might slow down public acceptance and the use of biometrics for authentication purposes in large scale applications ...
The most widely accepted iris recognition systems are based on Daugman's model that creates a binary iris template. ...
Unauthorized detection (passive attack, does not modify the cover work) -there are 3 levels of severity: ~ The attacker detects and deciphers the embedded message ~ The attacker detects the watermarks, ...
doi:10.20381/ruor-5635
fatcat:4xo5xyv7lbbqppfhi5bcr4ljge