[BACK]
Intelligent Automation & Soft Computing
DOI:10.32604/iasc.2020.013782
images
Article

Proposing a High-Robust Approach for Detecting the Tampering Attacks on English Text Transmitted via Internet

Fahd N. Al-Wesabi1,*, Huda G. Iskandar2, Mohammad Alamgeer3 and Mokhtar M. Ghilan2

1Department of Computer Science, King Khalid University, KSA & Faculty of Computer and IT, Sana’a University, Sana’a, Yemen
2Faculty of Computer and IT, Sana’a University, Sana’a, Yemen
3Department of Information Systems, King Khalid University, Mayahel Aseer, Saudi Arabia
*Corresponding Author: Fahd N. Al-Wesabi. Email: Falwesabi@kku.edu.sa
Received: 21 August 2020; Accepted: 14 September 2020

Abstract: In this paper, a robust approach INLPETWA (an Intelligent Natural Language Processing and English Text Watermarking Approach) is proposed to tampering detection of English text by integrating zero text watermarking and hidden Markov model as a soft computing and natural language processing techniques. In the INLPETWA approach, embedding and detecting the watermark key logically conducted without altering the plain text. Second-gram and word mechanism of hidden Markov model is used as a natural text analysis technique to extracts English text features and use them as a watermark key and embed them logically and validates them during detection process to detect any tampering. INLPETWA approach has been implemented by self-developed program using PHP with VS code IDE. INLPETWA approach has been proved with various experiments and simulation scenarios. Comparison results with baseline approaches also show that the proposed approach is appropriate to detect all types of tampering attacks. The paper includes implications for integrating natural language processing and text-watermarking to propose an intelligent solution. This paper fulfils an identified need to study how we can use a robust text information via various Internet applications.

Keywords: NLP; Markov model; text-watermarking; text feature; content authentication; tampering detection

1  Introduction

For the research community, the security and reliability of text information exchanged through the Internet is the greatest promising and challenging field. In communication technologies, content authentication and honesty of automated text verification in different Languages and formats are of great significance. Numerous applications such as electronic banking, electronic commerce etc. impose most challenges during contents transfer via internet. In terms of content, structure, grammar, and semantics, much of the multimedia exchanged via Internet is in textual form and is very susceptible to online transmission. During the transfer process, malicious attackers can temper such digital content and thus the changed count [1].

For information security, many algorithms and techniques are available, such as content authentication, verification of integrity, detection of tampering, identification of owners, access control and copyright protection.

To overcome these issues, digital watermarking (DWM) is a technique can be used to hide the various data, such as text, binary images, video, and audio and embed them in digital content as a watermark information [2,3].

A fine-grain text watermarking method is suggested based on the substitution of homoglyph characters for Latin symbols and white spaces [4].

Several conventional methods and solutions for text watermarking were proposed [5] and categorized into different classes, such as linguistic, structure, zero watermark and format based methods [6]. To insert the watermark information into the document, most of these solutions require certain modifications or improvements to plain text material. Zero-watermarking without any alteration to the original digital material to embed the watermark information is a recent technology used with intelligent methods and algorithms. Moreover, in this technique the contents of given digital context can be utilized to generate the watermark key [1,68].

Restricted research has centred on the appropriate solutions to verify the credibility of critical digital media online [911]. In the research community, digital text authentication and tampering detection have received great attention. In addition, research in the field of text watermarking has concentrated on copyright protection in the last decade, but less interest and attention has been paid to integrity verification, identification of tampering and authentication of content due to the existence of text content based on the natural language [12].

Proposing the most appropriate techniques and solutions for various formats and content, especially in English and Arabic languages, is the most common challenge in this area [13,14]. Therefore, authentication of content, verification of honesty and detection of tampering of sensitive text is a major problem in different applications and needs required solutions.

Some instances of such sensitive digital text content are digital Holy Qur’an in Arabic, eChecks, online marks and exams. Different Arabic alphabet characteristics such as diacritics, extended letters, and other Arabic symbols make it easy to alter the key meaning of text material by making basic changes such as modifying diacritic arrangements [11,15]. The most popular soft computing and natural language processing (NLP) technique that is used for text analysis is HMM.

In this paper, authors present a robust approach INLPETWA (an Intelligent NLP and English Text Watermarking Approach) which makes use of English text zero watermarking and second gram of word method of Markov model. Soft computing tool and zero watermarking technique have been integrated in INLPETWA approach in order to analyzing the given English text and extract the watermark information. Embedding process will be conducted logically in the plain English text without effecting on contents and size of the plain text. After the transmission of the text, aim of the hidden DWM is used in next phase to detect and obtain tampered text on received English text and ensures the authenticity of the transmitted text.

The core objective of the INLPETWA approach is to achieve better performance with high detection level of any illegal tampering occurred in English text exchanged electronically via Internet.

This paper is organized in addition to the Section 1 as follows. Section 2 presents the previous related works. Section 3 presents the proposed INLPETWA. Section 4 explain the implementation, simulation, and experimental details. Section 5 describes the comparison and results discussion, and Section 6 offers conclusions.

2  Related Works

According to the processing domain of NLP and text watermarking, these existing methods and solutions of text watermarking reviewed in this paper classified into linguistic, structural, and zero-watermark techniques [1,6,12].

2.1 Linguistic-Based Methods

The approaches to linguistic text watermarking are based upon natural language to hide watermark key by making some altering on semantic and the syntactic nature of original text [1].

To enhance the capability and imperceptibility of Arabic text, a text watermarking algorithm based on open-word spaces [16] have been suggested. In this method, every word-space is used to embed binary data 1 or 0 to obtain the physical altering occurred on plain text.

A technique of text steganography [17] has been proposed to conceal details in the Arabic language. The process of this algorithm considers the presence in Arabic of Harakat (diacritics, i.e., Fat-ha, Kasra and Damma) and reverses the Fatha for the hiding of the message.

A Kashida-watermark based method has been presented in [18], which is frequency recurrence is utilized to get the document features. This method used a predefined watermark data whereby a Kashida is positioned for a bit 1 and omitted for a bit 0.

The method of text steganography [19] has been proposed to use Kashida extensions based on the characters ‘moon’ and ‘sun’ to write digital contents of the Arabic language. In this process, Kashida characters are used beside Arabic letters to decide which hidden secret bits are kept by specific characters. In this form, four cases are used for kashida characters: moon characters representing ‘00’; sun characters representing ‘01’; sun characters representing ‘10’; and moon characters representing ‘11’.

A text steganographic approach [20] based on multilingual Unicode characters has been suggested to cover details in scripts of English letters using the English Unicode alphabet in other languages. Thirteen letters of the English alphabet have been chosen for this approach. Two bits should be hidden in a time frame. Used ASCII code for embedding 00. However, for embedding 01,10, and 11, Unicode used multilingual ones.

2.2 Structure-Based Methods

Structural text-watermark-based methods are based on a framework dependent on material in which altering on structure of the original text are performed to hide a watermark data [2124].

Text watermarking method based on Unicode extended characters has been proposed in [21] to avoid the textual contents from illegal attacks. This method covers three main phases. Embedding the watermark key in this method based on building the predefined tables of encoding letters and using the scrambling algorithm to protect the watermark key.

The replacement attack method [22], which is focused on preserving the position of words in the text document, has been proposed. This approach depends on manipulating word transitions in the text document. For authentication the Chinese text, text based watermarking approaches [23,24] have been suggested based on combining the sentences properties. The mechanism of these approaches is as follows: first, a Chinese text is split into sentence sets, and then, for each word, a semantic code is obtained. Sentence entropy is determined by the frequency of semantic codes. Sentence significance is determined by the finding the similarity of semantic of words in Tongyici Cilin via the tree structure of the words. Finally, by using sentence entropy, importance, length, and a weighting function of each sentence.

2.3 Zero-Watermark-Based Methods

Zero watermark-based methods rely on text characteristics. Several zero-text-watermark-based algorithms and techniques have been suggested, as in studies [12,15,2529].

To measure the reliability of the electronic texts posted on social application ns, the ANiTH method [12] has been presented. Inside a digital text, this algorithm hides an invisible watermark and can be detected later to verify the reliability of the text content. A system based on zero watermarks [15] presented to validate the integrity internet data in which watermarks are embedded in plain text prior to transmission. The created watermark key is based on certain content characteristics, such as data size, frequency of data appearance, and data capture time.

Zero-watermarking algorithm has been presented in [25] to improve the privacy of a person by using Hurst exponent and zero crossing of the frames. For watermark embedding, these two steps are determined to evaluate the unvoiced frames. The process of this approach depends on integrating an individual’s identity without notifying any distortion in the signals of medical expression.

A zero-watermarking approach [26] was proposed to resolve the issues related with the security of English context, such as content verification and copyright protection. A zero-watermarking approach [27,28] has been suggested, which is based on the Markov model for English text content authentication. In this method, to extract the safe watermark information, the probability features of the English text are used and stored to verify the validity of the attacked text. These methods provide security against popular text attacks with a watermark distortion rate if, for all known attacks, it is greater than one. For copyright protection of English text based on the presence frequency of non-vowel ASCII letters and terms, the conventional watermark method [29] has been suggested.

3  Proposed Approach

An intelligent approach is proposed in this paper by integrating text-watermark and hidden Markov model as NLP technique in which do not need additional details to be embedded as a watermark data and do not need to make any changes to the plain text to insert a watermark inside it. Second gram of word method of Markov model is used as NLP to analyze English content and extract the features of these text contents. Several assumptions of INLPETWA are addressed as follows:

•    Watermark key will be extracted as a result of English text analysis without altering the original text.

•    High watermark robustness in all cases whenever the tackers get watermark key in any way.

•    All types of tampering attacks will be addressed to detect randomly such as insertion, deletion, and reorder attacks.

•    All volumes of tampering will be addressed to detect whenever attack volume is very low.

•    There are no limitations in size of English text.

The following subsections explain in detail two main processes that should perform in INLPETWA. The first process called watermark generation and embedding process, however, the second one called watermark extraction and detection process.

3.1 Watermark Generation and Embedding Processes

Three algorithms should be performed in this process are pre-processing, English text analysis and WM generation, and watermark embedding algorithm as illustrated in Fig. 1.

images

Figure 1: Text zero-watermarking generation and embedding processes of INLPETWA

3.1.1 Pre-processing Algorithm

Preprocessing of the plain English text is a core activity in both the WM generation and extraction phases to set all English letter in small case, delete blank spaces and extra new lines, and it will affect the accuracy of tampering detection and watermark robustness. The original English text (OET) is a necessary provided as input for this process.

3.1.2 Text Analysis and WM Generation Algorithm

This algorithm contains two sub procedures—building Markov chain matrix and text analysis, and WM generation processes.

–Building Markov matrix is the core phase to run INLPETWA approach. Markov chain matrix should be constructed in this phase to configure the Markov model environment and represents all possible states and transitions without reputations. In INLPETWA approach, each pair of English words of a given text refers to current state, and every word represent a transition in Markov chain matrix. During constructing the Markov chain matrix, zero values will be initialized for all states and transitions positions. Those positions will be used later to keep the status of presence times that the images pair of words is followed by the images unique word within the given English text as presented below in Alg. 1.

images

where,

–OET: is plain English text, PET: is a pre-processed English text.

This algorithm is performed as second step of this process in which English text should be analyzed to extract the features of the given text and utilize them to generate watermark information. In this algorithm, occurrence time of all transitions for each present state of pair words will computed by Eq. (1).

images

The following example of the provided English text illustrates the work mechanism of this algorithm.

“The quick brown fox jumps over the brown fox who is slow jumps over the brown fox is dead”

In second gram of word method of Markov model, each pair unique of English words represent a unique state. Fig. 2 explain the representation of states and transitions available of the above sample of English text.

images

Figure 2: States and transitions representation of the given text sample using INLPETWA

Authors assume “brown fox” is a current state, and its transition(s) are “jumps”, “who”, and “who”. We observe that “who” transition appears twice in the given English text sample.

Based on second gram of word method of hidden Markov, algorithm of text analysis and WM generation performed as presented in Fig. 3.

images

Figure 3: Feature extraction and WM generation of given English text using INLPETWA

Feature extraction of English text and WM generation algorithm is proceeds formally as presented in Alg. 2.

images

where, pw: previous pair of words, cpw: current pair of words.

3.1.3 Watermark Embedding Algorithm

In this approach, watermark embedding process will be done logically without necessity to make altering on the original plain text. As a result of feature extraction of the given English text, WM data is embedded logically by obtaining non-zeros values in Markov chain matrix. Those values will be concatenated and used extract the WM key pattern EW2_WMPO, as given in in Eq. (2) and showed in Fig. 4.

images

images

Figure 4: Original WM EW2_WMPO using INLPETWA

Algorithm of watermark embedding process using INLPETWA approach is executed as showed below in Alg. 3.

images

where, EW2_WMPO: WM patterns, EW2_DWMPO: digested WM.

3.2 Watermark Extraction and Detection Process

Pre-processing process is required for attacked English text (PETA). Then, attacked watermark key (EW2_EWMA) should be produced, and detection process should be calculated by INLPETWA approach to detect any illegal tampering occurred in the given English text.

This process includes two core algorithms are watermark extraction and detection. Though, EW2_EWMA will be produced from (PETA) and compared with EW2_WMPO by detection process.

Fig. 5 illustrate the work mechanism of this process.

images

Figure 5: Text zero-watermark extraction and detection processes of INLPETWA

3.2.1 Watermark Extraction Algorithm

PETA should be provided as input to initial setup of this algorithm. Though, EW2_WMPA is a core output of this algorithm as illustrated formally in Alg. 4.

images

where, PETA: pre-processed attacked English text document, EW2_WMPA: attacked DWM.

3.2.2 Algorithm of Watermark Detection

EW2_WMPA and EW2_WMPO should be provided as inputs to run this algorithm. However, the status of the given English text is a core output of this algorithm which can be reliable or not. This process can perform in two steps as follows:

•    Main matching for EW2_WMPO and EW2_WMPA is achieved. If those two WM patterns are similar in appearance, then there will be a warning “Given English text is a reliable”. Otherwise, the note will be rendered “Given English text is not reliable”, and then it going through next phase.

•    Secondary matching is performed by matching each state’s transition status in the entire produced pattern of watermarks. This means EW2_WMPA of each state is contrasted with an analogous transition of EW2_WMPO as given by Eq. (3) and (4) below.

images

where,

•    EW2_images: represents matching rate at the transition of change, (0 < EW2_PMRT <=1)T

•    images: refers to the initial transfer stage watermark value.

•    images: refers to attacked transfer stage watermark value.

images

where,

•    n: is a summation value of non zeros transitions.

•    i: is the cumulative pattern matching rate of the word state.

•    images: represents matching rate at the state of change, (0 < EW2_PMRS <=100).

The following step is obtaining the weight of each state stored in Markov chain matrix as illustrated in Eq. (5).

images

where,

•    images: is the matching value of ith state for each pair of words.

The final EW2_PMR of PETA and OETP are computed by Eq. (6).

images

where, N: is summation of non-zeros in EW2_MM.

The distortion rate of the watermark reflects the volume of tampering attacks that take place on the attacked contents of Arabic background, denoted by EW2_WDR and computed by Eq. (7).

images

Algorithm of WM detection process is implemented as showed in Alg. 5.

images

where,

•    EW2_SW: is value of properly weight of matched states.

•    images: refer to the importance of WM distortion rate (0 < EW2_WDRS <=100).

Fig. 6 shows the effects of the method of WM extraction and detection.

images

Figure 6: WM extraction and detection process of the given sample text

4  Implementation, Simulation and Experimental

To validate the accuracy of INLPETWA, Self-developed program has been implemented, several scenarios of experiments and simulation are performed as explained in detail in the following subsections.

4.1 Implementation Environment and Setup

INLPETWA approach, is executed by self-developed program in object oriented and PHP using VS Code IDE on the environment having modern features.

4.2 Simulation and Experimental Metrics

The following an experimental, simulation metrics and their related values that used to perform the experiments are given in Tab. 1.

Table 1: Simulation and experimental metrics

images

4.3 Performance Parameters

The performance of INLPETWA refers to accuracy of robustness and tampering detection which is evaluated by using the following parameters.

•    Accuracy of tampering detection (EW2_PMR and EW2_WDR) is evaluated under main four attack volumes which are: very low (5%), low (10%), mid (20%) and high (50%).

•    Desired accuracy of tampering detection values near to 100%.

•    Comparison of text size, attack types, and attack volumes effects against detection accuracy using the proposed INLPETWA approach, ZWAFWMMM and HNLPZWA baseline approaches.

4.4 Baseline Approaches

The performance and accuracy of INLPETWA is compared with HNLPZWA (an intelligent hybrid of natural language processing and zero-watermarking approach) and ZWAFWMMM (Zero-Watermarking Approach based on Fourth level order of Word Mechanism of Markov Model) [30]. Comparison is performed by using performance and accuracy parameters. Baseline approaches and their working parameters are stated in Tab. 2.

Table 2: Compared baseline approach

images

4.5 Simulation and Experiment Results of INLPETWA

In this sub section, performance evaluation of INLPETWA have been performed. The character set covers all English characters, spaces, special symbols, and numbers. Simulations are performed on various datasets sizes and various kind of attacks and volumes as showed above in Tab. 1.

4.5.1 Accuracy Evaluation of Tampering Detection

Various simulation scenarios have been conducted to text and evaluate the tampering detection accuracy of INLPETWA using all types of attacks and their rates as show in Tab. 3. Results are illustrated in Fig. 8.

Table 3: Accuracy evaluation of INLPETWA

images

The results in Fig. 7 show that, high effect is noticed under reorder attack in all simulation scenarios. This result is logic because reorder attack makes changes as insertion and deletion attacks. However, simulation using both insertion and deletion attacks, high effect is noticed under deletion attack in all scenarios of attack volumes because deletion attack also makes changes as insertion and deletion attacks. This represent that INLPETWA gives best detection accuracy under all attack’s scenarios with their volumes even attack volumes are very low.

images

Figure 7: Accuracy evaluation of INLPETWA under all volumes of all attacks

5  Comparison and Discussion

The performance and tampering detection accuracy results are critically analyzed, effect study and compared between INLPETWA and baseline approaches ZWAFWMMM and HNLPZWA and shows discussion of their effect under the major factors, i.e., attack volumes and types, and dataset size.

5.1 Comparison of Attack Type Effect

Tab. 4 shows a comparison of the different attack types effect on performance of INLPETWA, ZWAFWMMM and HNLPZWA approaches.

Table 4: Attack type effect on performance of INLPETWA, ZWAFWMMM and HNLPZWA approaches

images

Tab. 4 and Fig. 8 show how the performance of INLPETWA, ZWAFWMMM and HNLPZWA methods are affected by tampering attacks type. Comparison result show that, the proposed INLPETWA approach outperforms ZWAFWMMM and HNLPZWA in term of performance rate and watermark robustness in all scenarios of all attack types. This means that the proposed INLPETWA method is a strongly recommended to detection any illegal tampering of English text documents under all attack types.

images

Figure 8: Performance compression under attack type effect

5.2 Comparison of Attack Volume Effect

Tab. 5 shows a comparison of the different attack volume effect on performance of INLPETWA, ZWAFWMMM and HNLPZWA approaches.

Table 5: Attack volume effect on performance of INLPETWA with ZWAFWMMM and HNLPZWA

images

Tab. 5 and Fig. 9 show how the performance of INLPETWA, ZWAFWMMM and HNLPZWA methods are affected by all attack volumes. In case of HNLPZWA, the effect of tampering detection accuracy highly increased under high attack volume. However, it is approximately equal to effect of ZWAFWMMM under low and mid attack volumes. In Fig. 9, it can be seen that if the attack volume increases, the tampering detection accuracy also increases. In all cases of low, mid and high attack volumes, it seen also, the proposed INLPETWA approach outperforms ZWAFWMMM and HNLPZWA approaches in terms of performance and watermark robustness. This means that INLPETWA approach is a strongly recommended to detection any illegal tampering of English text under all volumes of attack types.

images

Figure 9: A compression of attack volume effect on performance

5.3 Comparison of Dataset Size Effect

In this subsection, authors present an evaluation of the different dataset size effects on performance of INLPETWA, ZWAFWMMM and HNLPZWA approaches against all attack types under their different volumes as shown in Tab. 6.

Table 6: Dataset size effect on general performance of INLPETWA with ZWAFWMMM and HNLPZWA

images

The comparative results as shown in Fig. 10 reflects the performance of INLPETWA with baseline ZWAFWMMM and HNLPZWA approaches. The results show that in the proposed INLPETWA approach, the highest effects of dataset size that lead to the best performance are ordered as AMST, AHMST, ALST and ASST respectively. This means that the performance increased with increasing document size and decreased with decreasing document size. On the other hands, results show that the proposed INLPETWA approach outperforms both ZWAFWMMM and HNLPZWA approaches in term of performance rate under all scenarios of dataset sizes.

images

Figure 10: A compression of dataset size effect on performance

6  Conclusions

Centered on the hidden Markov model mechanism of second gram and word method, a novel hybrid approach of NLP and English text zero-watermarking has been developed which is abbreviated as INLPETWA has been proposed in this paper by integrating soft computing and digital watermarking techniques. soft computing and NLP used in INLPETWA to perform text analysis process to found interrelationships between the content of the English-text provided and the main watermark created. Without modification or impact on plain text size, the created watermark should logically be embedded in the original English background. Hidden watermark will be used in the next phase to detect illegal tampering on received English-text after transmission of text through the Internet. INLPETWA approach has been developed and implemented in PHP using VS code IDE. The experiments are performed on different standard English datasets using various rates of insertion, reorder, and deletion attacks. The experiments results show that INLPETWA is applicable to detect tampering on English text. For future work, authors will intend to improve the performance using other mechanism of Markov model.

Funding Statement: The authors express their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Research Groups under Grant Number (R. G. P. 2/55/40/2019).

Conflicts of Interest: The authors declare that they have no conflicts of interest.

References

  1. S. Nurul, K. Amirrudin, Y. Lip and R. Hameedur. (2018). “A review of text watermarking: Theory, methods, and applications,” IEEE Access, vol. 6, pp. 8011–8018.
  2. M. Mohamed. (2013). “A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine,” Egyptian Informatics Journal, vol. 14, no. 1, pp. 1–13.
  3. D. Tong, C. Zhu, N. Ren and W. Shi. (2019). “High-capacity and robust watermarking scheme for small scale vector data,” KSII Transactions on Internet and Information Systems, vol. 13, no. 12, pp. 6190–621
  4. S. Giovanni, F. Bertini and D. Montesi. (2019). “Fine-grain watermarking for intellectual property protection,” EURASIP Journal on Information Security, vol. 10.
  5. A. Alwan, M. Shahidan, N. Nur, S. Mohammed and S. Mohd. (2018). “A review and open issues of diverse text watermarking techniques in spatial domain,” Journal of Theoretical and Applied Information Technology, vol. 96, pp. 5819–5840.
  6. P. Selvama, S. Balachandran, S. Pitchai and R. Jayabal. (2017). “Hybrid transform based reversible watermarking technique for medical images in telemedicine applications,” ELSEVIER Optik, vol. 145, pp. 655–671.
  7.  7.  N. Hurrah, A. Shabir, A. Nazir, A. Javaid, M. Elhoseny. (2019). et al., “Dual watermarking framework for privacy protection and content authentication of multimedia,” ELSEVIER Future Generation Computer Systems, vol. 94, pp. 654–673.
  8. A. Soltani, S. Ron, T. Sellis and E. Bertino. (2016). “On the properties of non-media digital watermarking: A review of state-of-the-art techniques,” IEEE Access, vol. 4, pp. 2670–2704.
  9. C. Qin, C. Chang and T. Hsu. (2013). “Effective fragile watermarking for image authentication with high-quality recovery capability,” KSII Transactions on Internet and Information Systems, vol. 7, no. 11, pp. 2941–2956.
  10. 10. S. Parah, J. Sheikh and G. Bhat. (2017). StegNmark: A ioint stego-watermark approach for early tamper detection, vol. 660. Switzerland: Springer International Publishing, 427–452.
  11. S. Hakak, A. Kamsin, O. Tayan, M. Yamani and G. Amin. (2017). “Approaches for preserving content integrity of sensitive online Arabic content: A survey and research challenges,” ELSEVIER Information Processing and Management, vol. 56, no. 2, pp. 367–380.
  12. M. Taleby, Q. Li, X. Zhu, M. Alazab and J. Zhang, “ANiTW: A novel intelligent text watermarking technique for forensic identification of spurious information on social media,” Computers and Security, vol. 90, pp. 1–14, 2020.
  13. A. Shabir, A. Javaid, A. Jahangir and A. Nazir. (2020). “Electronic health record hiding in images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication,” ELSEVIER Future Generation Computer Systems, vol. 108, pp. 935–949.
  14. A. Reem and A. Lamiaa. (2018). “Improved capacity Arabic text watermarking methods based on open word space,” Journal of King Saud University—Computer and Information Sciences, vol. 30, no. 2, pp. 236–248.
  15. H. Khizar, K. Abid, A. Mansoor and G. Alavalapati. (2018). “Towards a formally verified zero watermarking scheme for data integrity in the internet of things based-wireless sensor networks,” ELSEVIER Future Generation Computer Systems, vol. 167, pp. 1–16.
  16. A. Reem and A. Lamiaa. (2018). “Improved capacity Arabic text watermarking methods based on open word space,” Journal of King Saud University—Computer and Information Sciences, vol. 30, no. 2, pp. 236–248.
  17. S. Mujtaba and S. Asadullah. (2015). “A novel text steganography technique to Arabic language using reverse Fat5Th5Ta,” Pakistan Journal of Engineering, Technology and Sciences, vol. 1, no. 2, pp. 106–113.
  18. M. Yasser, N. Muhammad and T. Omar. (2014). “An enhanced Kashida-based watermarking approach for increased protection in Arabic text-documents based on frequency recurrence of characters,” International Journal of Computer and Electrical Engineering, vol. 6, no. 5, pp. 381–392.
  19. A. Anes, R. Farida and A. Sakinah. (2017). “Text steganography using extensions Kashida based on the moon and sun letters concept,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 8, pp. 286–290.
  20. M. Abdul, S. Wesam and A. Dhamyaa. (2013). “Text steganography based on Unicode of characters in multilingual,” International Journal of Engineering Research and Applications, vol. 3, no. 4, pp. 1153–1165.
  21. A. Nasr, A. Wan, R. Abdul, S. Khairulmiz and M. Sharifah. (2016). “Robust digital text watermarking algorithm based on Unicode extended characters,” Indian Journal of Science and Technology, vol. 9, no. 48, pp. 1–14.
  22. M. Bashardoost, M. Rahim, T. Saba and A. Rehman. (2017). “Replacement attack: A new zero text watermarking attack,” 3D Research, vol. 8, no. 1, pp. 11.
  23. Y. Liu, Y. Zhu and G. Xin. (2015). “A zero-watermarking algorithm based on merging features of sentences for Chinese text,” Journal of Chines Institution and Engineering, vol. 38, no. 3, pp. 391–398.
  24. P. Zhu, G. Xiang, W. Song, A. Li, Y. Zhang. (2016). et al., “A text zero watermarking algorithm based on Chinese phonetic alphabets,” Wuhan University Journal of Natural Sciences, vol. 21, no. 4, pp. 277–282.
  25. A. Zulfiqar, H. Shamim, M. Ghulam and A. Muhammad. (2018). “New zero-watermarking using Hurst exponent for protection of privacy in telemedicine,” IEEE Access, vol. 6, pp. 1–11.
  26. T. Omar, M. Yasser and N. Muhammed. (2014). “An adaptive zero-watermarking approach for text documents protection,” International Journal of Image Processing Techniques, vol. 1, no. 1, pp. 33–36.
  27. M. Ghilan, F. Ba-Alwi and F. Al-Wesabi. (2014). “Combined Markov model and zero watermarking techniques to enhance content authentication of Arabic text documents,” International Journal of Computational Linguistics Research, vol. 5, no. 1, pp. 26–42.
  28. N. Fahd, Z. Adnan and U. Kulkarni. (2014). “A zero text watermarking algorithm based on the probabilistic patterns for content authentication of text documents,” International Journal of Computer Engineering & Technology, vol. 4, no. 1, pp. 284–300.
  29. M. Hanaa and A. Maisa’a. (2016). “Comparison of eight proposed security methods using linguistic steganography text,” International Journal of Computing & Information Sciences, vol. 12, no. 2, pp. 243–251.
  30. N. Fahd, M. Khalid and N. Nadhem. (2020). “A zero watermarking approach for content authentication and tampering detection of Arabic text based on fourth level order and word mechanism of Markov model,” Journal of Information Security and Applications, vol. 52, pp. 1–15.
images This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.