A novel Bloom-filter-based scheme for secure text ownership protection

Faculty Computer Science Year: 2020
Type of Publication: ZU Hosted Pages: 3831-3845
Authors:
Journal: Wireless Networks Springer Volume: 26
Keywords : , novel Bloom-filter-based scheme , secure text ownership    
Abstract:
Due to the rapid growth of the Internet and content development services, digital text has become the most extensively used type of media in digital communication. However, digital text is at risk of being illegally tampered with, copied or redistributed, which could lead to many security threats related to privacy and ownership protection. Over the last few years, digital watermarking has been used to authenticate and protect the ownership of digital media such as images, audio, and videos. Compared to other digital media, digital text faces greater challenges in regard to watermarking due to its low capacity for information hiding and its high sensitivity to modification. While limited research has been conducted on text watermarking, the preliminary results indicate that the available schemes do not achieve an acceptable trade-off between imperceptibility, robustness, capacity, and security. In this paper, we propose a novel text watermarking method called Bloom Filter and Text Similarity Watermarking (BFTSW). A Bloom filter is employed in our proposed BFTSW method to reduce the size of the watermark that is generated based on a vector space model (VSM) representation of a text document. To verify the watermark, the text similarity between the VSM representation of the original text (which is recovered from the Bloom filter) and the VSM representation of a suspect text is computed and compared against a predefined threshold value to determine whether the watermark is present in the suspect text. Experimental results obtained with a prototype implementation show that the proposed BFTSW method is effective in terms of its robustness against malicious attacks, information capacity, and text quality preservation.
   
     
 
       

Author Related Publications

  • Walid Ibrahim Ibrahim Khedr, "An end-to-end ID-Based Encryption and Authentication Scheme for Short Message Service in GSM Networks", Advanced Institute of Convergence IT, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "On the Security of Anonymous Authentication Scheme for Mobile LEO Satellite Networks", Advanced Institute of Convergence IT, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "SRFID: A hash-based security scheme for low cost RFID systems", Elsevier, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "On the Security of Moessner’s and Khan’s Authentication Scheme for Passive EPCglobal C1G2 RFID Tags", National Chung Hsing University, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "Enhanced inter-ASN handover authentication scheme for IEEE 802.16m network", Institution of Engineering and Technology United Kingdom, 2015 More

Department Related Publications

  • Khalied Mohamed Hosny, "Deep Learning and Optimization-Based Methods for Skin Lesions Segmentation: A Review", IEEE, 2023 More
  • Ehab Roshdy Mohamed, "Deep Learning and Optimization-Based Methods for Skin Lesions Segmentation: A Review", IEEE, 2023 More
  • Duaa Saad AbdelHamid Shora, "Deep Learning and Optimization-Based Methods for Skin Lesions Segmentation: A Review", IEEE, 2023 More
  • Walid Ibrahim Ibrahim Khedr, "Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage", IEEE, 2019 More
Tweet