Filters








9 Hits in 7.1 sec

Proposing High-Smart Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet

Fahd N. AL-WESABI
2020 IEICE transactions on information and systems  
Fifth level order of word mechanism based on hidden Markov model is integrated with digital zero-watermarking techniques to improve the tampering detection accuracy issues of the previous literature proposed  ...  In this paper, a Hybrid of Natural Language Processing and Zero-Watermarking Approach (HNLPZWA) has been proposed for the content authentication and tampering detection of Arabic text.  ...  Acknowledgements The author extends his appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Research Groups under grant number (R. G.  ... 
doi:10.1587/transinf.2020edp7011 fatcat:cly6hoy5rfe7zaucoubgwuuece

Text Analysis-Based Watermarking Approach for Tampering Detection of English Text

Fahd N. Al-Wesabi
2021 Computers Materials & Continua  
Based on hidden Markov model (HMM), the fourth level order of the word mechanism is used to analyze the contents of the given English text to nd the interrelationship between the contexts.  ...  In this paper, text zero-watermarking and text feature-based approach is proposed to improve the tampering detection accuracy of English text contents.  ...  The algorithm of text analysis and watermark generation based on the fourth-level order of the word mechanism of the Markov model proceeds as illustrated in Fig. 3 . Algorithm 2.  ... 
doi:10.32604/cmc.2021.015785 fatcat:3g27idtitfdx3oreqlffujt5ay

A Smart English Text Zero-Watermarking Approach Based on Third-Level Order and Word Mechanism of Markov Model

Fahd N. Al-Wesabi
2020 Computers Materials & Continua  
In this paper, an intelligent text Zero-Watermarking approach SETZWMWMM (Smart English Text Zero-Watermarking Approach Based on Mid-Level Order and Word Mechanism of Markov Model) has been proposed for  ...  Based on Hidden Markov Model (HMM), Third level order of word mechanism is used to analyze the interrelationship between contexts of given English texts.  ...  The proposed approach is based on third level order of word Mechanism based on Markov Model.  ... 
doi:10.32604/cmc.2020.011151 fatcat:o7bgbo6bajfipfdotubtdlfyye

Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text

Mohammad Alamgeer, Fahd N. Al-Wesabi, Huda G. Iskandar, Imran Khan, Nadhem Nemri, Mohammad Medani, Mohammed Abdullah Al-Hagery, Ali Mohammed Al-Sharafi
2022 Computers Materials & Continua  
In this paper, a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking (SFASCDW) is proposed for content authentication and tampering detection  ...  A first-level order of alphanumeric mechanism, based on hidden Markov model, is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach.  ...  Approach based on Fourth level order of Arabic Word Mechanism of Markov Model (ZWAFWMMM) [6] .  ... 
doi:10.32604/cmc.2022.018591 fatcat:aacbbrrfvzaavhgdzkt6jhtpee

An Optimal Text Watermarking Method for Sensitive Detecting of Illegal Tampering Attacks

Anwer Mustafa Hilal, Fahd N. Al-Wesabi, Mohammed Alamgeer, Manar Ahmed Hamza, Mohammad Mahzari, Murad A. Almekhlafi
2022 Computers Materials & Continua  
This is achieved by using the third level and alphanumeric strategy of the Markov model as a text analysis technique for analyzing the Arabic contents to obtain its features which are considered as the  ...  In this paper, an efficient text-based watermarking method has been proposed for detecting the illegal tampering attacks on the Arabic text transmitted online via an Internet network.  ...  Approach based on Fourth level order of Arabic Word Mechanism of Markov Model (ZWAFWMMM) [6] .  ... 
doi:10.32604/cmc.2022.019686 fatcat:qyysl6t4sjba7giub6ejptymiu

Proposing a High-Robust Approach for Detecting the Tampering Attacks on English Text Transmitted via Internet

Fahd N. Al-Wesabi, Huda G. Isk, ar, Mohammad Alamgeer, Mokhtar M. Ghilan
2020 Intelligent Automation and Soft Computing  
Second-gram and word mechanism of hidden Markov model is used as a natural text analysis technique to extracts English text features and use them as a watermark key and embed them logically and validates  ...  In this paper, a robust approach INLPETWA (an Intelligent Natural Language Processing and English Text Watermarking Approach) is proposed to tampering detection of English text by integrating zero text  ...  Conflicts of Interest: The authors declare that they have no conflicts of interest. References  ... 
doi:10.32604/iasc.2020.013782 fatcat:orlrn5rshza3nlruyrr4664vd4

Tamper Detection and Localization for Quranic Text Watermarking Scheme Based on Hybrid Technique

Ali A. R. Alkhafaji, Nilam Nur Amir Sjarif, M. A. Shahidan, Nurulhuda Firdaus Mohd Azmi, Haslina Md Sarkan, Suriayati Chuprat
2021 Computers Materials & Continua  
To enhance the watermarking scheme of the text of the Quran based on hybrid techniques (XOR and queuing techniques) of the purposed scheme.  ...  The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio (PSNR), and Normalized Cross-Correlation (NCC); thus, the location for tamper  ...  Funding Statement: The authors extend their appreciation to the Ministry of Higher Education (MOHE) and Universiti Teknologi Malaysia (UTM) for their educational and nancial support.  ... 
doi:10.32604/cmc.2021.015770 fatcat:ynsgwv5eorgobbbx643q7u4bgi

Payload Capacity Scheme for Quran Text Watermarking Based on Vowels with Kashida

Ali A.R. Alkhafaji, Nilam Nur Amir Sjarif, M.A Shahidan, Nurulhuda Firdaus Mohd Azmi, Haslina Md Sarkan, Suriayati Chuprat, Osamah Ibrahim Khalaf, Ehab Nabiel Al-Khanak
2021 Computers Materials & Continua  
The purpose of this paper is to enhance the Quran text watermarking scheme based on a reversing technique.  ...  A watermarking technique with enhanced attributes must, therefore, be designed for the Quran's text using Arabic vowels with kashida.  ...  Funding Statement: The authors extend them appreciation to the Ministry of Higher Education (MOHE) and Universiti Teknologi Malaysia (UTM) for their educational and financial support.  ... 
doi:10.32604/cmc.2021.015803 fatcat:fbmqdtx3dbf6xlozek3ily7q3m

Towards Template Security for Iris-based Biometric Systems

Marwa Fouad, Université D'Ottawa / University Of Ottawa, Université D'Ottawa / University Of Ottawa
2012
This unique attribute of biometric based authentication system poses a challenge that might slow down public acceptance and the use of biometrics for authentication purposes in large scale applications  ...  The most widely accepted iris recognition systems are based on Daugman's model that creates a binary iris template.  ...  Unauthorized detection (passive attack, does not modify the cover work) -there are 3 levels of severity: ~ The attacker detects and deciphers the embedded message ~ The attacker detects the watermarks,  ... 
doi:10.20381/ruor-5635 fatcat:4xo5xyv7lbbqppfhi5bcr4ljge