An Authorship Protection Technology for Electronic Documents Based on Image Watermarking
Abstract
:1. Introduction
- A technology for protecting the authorship of electronic documents by digital watermark embedding into images contained in electronic documents is proposed. An important advantage of our technology is the use of a set of watermarking algorithms when dealing with images of different types.
- All possible scenarios for the implementation of this authorship protection technology are described and analyzed depending on which part of the document (full document, only text or only images) is copied by the plagiarist.
- The limits of applicability of the proposed technology are investigated using several watermarking algorithms of different classes. Experiments are performed with both classic detailed images and poorly detailed synthesized images (illustrations).
2. Related Work
3. The Proposed Technology
3.1. The Main Concept
3.2. Application Scenarios
3.2.1. Full Copying
3.2.2. Text-Only Copying
3.2.3. Images-Only Copying
4. Experimental Results
5. Discussion
5.1. Discussion of Experimental Results
- To embed digital watermarks into images in electronic documents, a pool of algorithms should be formed that covers various groups of images.
- The analysis and classification of the images contained in the document should be performed before the embedding procedure. The level of image detail should be used as a classification criterion.
- Digital watermarks can be generated with or without the context of the document.
- The generated digital watermarks should be embedded into images of the document. The choice of the embedding algorithm for each image will be performed based on the image class.
5.2. Comparison of the State of the Art
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Ryu, H.-S.; Park, H. A system for supporting paper-based augmented reality. Multimedia Tools Appl. 2015, 75, 3375–3390. [Google Scholar] [CrossRef]
- Raso, R.; Cucerca, S.; Werth, D.; Loos, P. Automated Augmented Reality Content Creation for Print Media. In Information Systems and Management in Media and Entertainment Industries; Springer Science and Business Media LLC: Berlin, Germany, 2016; pp. 245–261. [Google Scholar]
- Hussain, M.; Wahab, A.W.A.; Bin Idris, Y.I.; Ho, A.T.; Jung, K.-H. Image steganography in spatial domain: A survey. Signal Process. Image Commun. 2018, 65, 46–66. [Google Scholar] [CrossRef]
- Kadhim, I.J.; Premaratne, P.; Vial, P.J.; Halloran, B. Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research. Neurocomputing 2019, 335, 299–326. [Google Scholar] [CrossRef]
- McAteer, I.; Ibrahim, A.; Zheng, G.; Yang, W.; Valli, C. Integration of Biometrics and Steganography: A Comprehensive Review. Technologies 2019, 7, 34. [Google Scholar] [CrossRef] [Green Version]
- Qasim, A.F.; Meziane, F.; Aspin, R. Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review. Comput. Sci. Rev. 2018, 27, 45–60. [Google Scholar] [CrossRef]
- Kumar, S.; Singh, B.K.; Yadav, M. A Recent Survey on Multimedia and Database Watermarking. Multimedia Tools Appl. 2020, 79, 20149–20197. [Google Scholar] [CrossRef]
- Yu, X.; Wang, C.; Zhou, X. Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images. Futur. Internet 2017, 9, 56. [Google Scholar] [CrossRef] [Green Version]
- Lin, W.-H.; Horng, S.-J.; Kao, T.-W.; Chen, R.-J.; Chen, Y.-H.; Lee, C.-L.; Terano, T. Image copyright protection with forward error correction. Expert Syst. Appl. 2009, 36, 11888–11894. [Google Scholar] [CrossRef]
- Rawat, S.; Raman, B. A publicly verifiable lossless watermarking scheme for copyright protection and ownership assertion. AEU Int. J. Electron. Commun. 2012, 66, 955–962. [Google Scholar] [CrossRef]
- Ahvanooey, M.T.; Li, Q.; Shim, H.J.; Huang, Y. A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents. Secur. Commun. Networks 2018, 2018, 1–22. [Google Scholar] [CrossRef]
- Ahvanooey, M.T.; Li, Q.; Hou, J.; Rajput, A.R.; Yini, C. Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis. Entropy 2019, 21, 355. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Halvani, O.; Steinebach, M.; Wolf, P.; Zimmermann, R. Natural language watermarking for german texts. In Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security—IH&MMSec’ 13, Montpellier, France, 17–19 June 2013; Association for Computing Machinery (ACM): New York, NY, USA, 2013; pp. 193–202. [Google Scholar]
- Mali, M.L.; Patil, N.N.; Patil, J.B. Implementation of Text Watermarking Technique Using Natural Language Watermarks. In Proceedings of the 2013 International Conference on Communication Systems and Network Technologies, Gwalior, India, 6–8 April 2013; Institute of Electrical and Electronics Engineers (IEEE): Washington, DC, USA, 2013; pp. 482–486. [Google Scholar]
- Lozhnikov, P.S.; Sulavko, A.E.; Eremenko, A.V.; Volkov, D. Method of protecting paper and electronic text documents through a hidden biometric identifier based on a signature. In Proceedings of the 2016 Dynamics of Systems, Mechanisms and Machines (Dynamics), Omsk, Russia, 15–17 November 2016; Institute of Electrical and Electronics Engineers (IEEE): Washington, DC, USA, 2016; pp. 1–5. [Google Scholar]
- Taha, A.; Hammad, A.S.; Selim, M.M. A high capacity algorithm for information hiding in Arabic text. J. King Saud Univ. Comput. Inf. Sci. 2020, 32, 658–665. [Google Scholar] [CrossRef]
- Rizzo, S.G.; Bertini, F.; Montesi, D. Fine-grain watermarking for intellectual property protection. EURASIP J. Inf. Secur. 2019, 2019, 10. [Google Scholar] [CrossRef] [Green Version]
- Kozachok, A.V.; Kopylov, S.A.; Shelupanov, A.A.; Evsutin, O.O. Text marking approach for data leakage prevention. J. Comput. Virol. Hacking Tech. 2019, 15, 219–232. [Google Scholar] [CrossRef]
- Kuribayashi, M.; Wong, K. Improved DM-QIM Watermarking Scheme for PDF Document. In Proceedings of the 18th International Workshop on Digital Watermarking—IWDW 2019, Chengdu, China, 2–4 November 2019; Springer: Cham, Switzerland, 2019; pp. 171–183. [Google Scholar]
- Bitar, A.W.; Darazi, R.; Couchot, J.-F.; Couturier, R. Blind digital watermarking in PDF documents using Spread Transform Dither Modulation. Multimedia Tools Appl. 2015, 76, 143–161. [Google Scholar] [CrossRef] [Green Version]
- Hatoum, M. Digital Watermarking for PDF Documents and Images: Security, Robustness and AI-based attack. Ph.D. Thesis, University of Bourgogne Franche-Comte, Besancon, France, 23 September 2020. [Google Scholar]
- Liu, Y.; Limsiroratana, S.; Choksuriwong, A. Data hiding in text document images by cloud model. In Proceedings of the 4th International Congress on Image and Signal Processing, Shangai, China, 15–17 October 2011; Institute of Electrical and Electronics Engineers (IEEE): Washington, DC, USA, 2011; Volume 2, pp. 1025–1029. [Google Scholar]
- Laouamer, L.; Tayan, O. Performance Evaluation of a Document Image Watermarking Approach with Enhanced Tamper Localization and Recovery. IEEE Access 2018, 6, 26144–26166. [Google Scholar] [CrossRef]
- Alotaibi, R.A.; Elrefaei, L. Text-image watermarking based on integer wavelet transform (IWT) and discrete cosine transform (DCT). Appl. Comput. Inform. 2019, 15, 191–202. [Google Scholar] [CrossRef]
- Tan, L.; Hu, K.; Zhou, X.; Chen, R.; Jiang, W. Print-scan invariant text image watermarking for hardcopy document authentication. Multimedia Tools Appl. 2018, 78, 13189–13211. [Google Scholar] [CrossRef]
- Mehta, S.; Prabhakaran, B.; Nallusamy, R.; Newton, D. mPDF: Framework for Watermarking PDF Files using Image Watermarking Algorithms. arXiv 2016, arXiv:1610.02443. preprint. [Google Scholar]
- Uljarević, D.; Veinović, M.; Kunjadić, G.; Tepšić, D. A new way of covert communication by steganography via JPEG images within a Microsoft Word document. Multimedia Syst. 2017, 23, 333–341. [Google Scholar] [CrossRef]
- Rashid, A.; Coustaty, M.; Prasath, V.B.S. An Algorithm for Data Hiding in Radiographic Images and ePHI/R Application. Technologies 2018, 6, 7. [Google Scholar] [CrossRef] [Green Version]
- Wazirali, R.; Alasmary, W.; Mahmoud, M.M.E.A.; Alhindi, A. An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms. IEEE Access 2019, 7, 133496–133508. [Google Scholar] [CrossRef]
- Di, F.; Zhang, M.; Huang, F.; Liu, J.; Kong, Y. Reversible data hiding in JPEG images based on zero coefficients and distortion cost function. Multimedia Tools Appl. 2019, 78, 34541–34561. [Google Scholar] [CrossRef]
- Su, Q.; Liu, D.; Yuan, Z.; Wang, G.; Zhang, X.; Chen, B.; Yao, T. New Rapid and Robust Color Image Watermarking Technique in Spatial Domain. IEEE Access 2019, 7, 30398–30409. [Google Scholar] [CrossRef]
- Poljicak, A.; Mandic, L.; Agic, D. Discrete Fourier transform–based watermarking method with an optimal implementation radius. J. Electron. Imaging 2011, 20, 033008. [Google Scholar] [CrossRef]
- Cedillo-Hernandez, M.; Garcia-Ugalde, F.; Nakano-Miyatake, M.; Perez-Meana, H. Robust watermarking method in DFT domain for effective management of medical imaging. Signal Image Video Process. 2013, 9, 1163–1178. [Google Scholar] [CrossRef]
- Ko, H.-J.; Huang, C.-T.; Horng, G.; Wang, S.-J. Robust and blind image watermarking in DCT domain using inter-block coefficient correlation. Inf. Sci. 2020, 517, 128–147. [Google Scholar] [CrossRef]
- Horng, S.-J.; Rosiyadi, D.; Li, T.; Takao, T.; Guo, M.; Khan, M.K. A blind image copyright protection scheme for e-government. J. Vis. Commun. Image Represent. 2013, 24, 1099–1105. [Google Scholar] [CrossRef]
- Salimi, L.; Haghighi, A.; Fathi, A. A novel watermarking method based on differential evolutionary algorithm and wavelet transform. Multimedia Tools Appl. 2020, 79, 11357–11374. [Google Scholar] [CrossRef]
- Abdulrahman, A.K.; Ozturk, S. A novel hybrid DCT and DWT based robust watermarking algorithm for color images. Multimedia Tools Appl. 2019, 78, 17027–17049. [Google Scholar] [CrossRef]
- Maheswari, S.U.; Hemanth, D.J. Performance enhanced image steganography systems using transforms and optimization techniques. Multimedia Tools Appl. 2015, 76, 415–436. [Google Scholar] [CrossRef]
- Pakdaman, Z.; Saryazdi, S.; Nezamabadi-Pour, H. A prediction based reversible image watermarking in Hadamard domain. Multimedia Tools Appl. 2016, 76, 8517–8545. [Google Scholar] [CrossRef]
- SIPI Image Database. Available online: http://sipi.usc.edu/database/ (accessed on 5 September 2020).
- Pixabay. Available online: https://pixabay.com/ru/ (accessed on 5 September 2020).
- Ponomarenko, N.; Silvestri, F.; Egiazarian, K.; Carli, M.; Astola, J.; Lukin, V. On between-coefficient contrast masking of DCT basis functions. In Proceedings of the Third International Workshop on Video Processing and Quality Metrics, Scottsdale, AR, USA, 25–26 January 2007; Volume 4. [Google Scholar]
- Kwan, C.; Larkin, J.; Budavari, B.; Chou, B.; Shang, E.; Tran, T. A Comparison of Compression Codecs for Maritime and Sonar Images in Bandwidth Constrained Applications. Computers 2019, 8, 32. [Google Scholar] [CrossRef] [Green Version]
Compression Quality | Compressed Images Quality | |||
---|---|---|---|---|
Cover Image | Watermarked [31] | Watermarked [34] | Watermarked [37] | |
No | PSNR = INF SSIM = 1 | PSNR = 46.3677 dB SSIM = 0.9997 | PSNR = 38.4450 dB SSIM = 0.9980 | PSNR = 43.2915 dB SSIM = 0.9993 |
Maximum | PSNR = 42.9381 dB SSIM = 0.9993 | PSNR = 41.2843 dB SSIM = 0.9989 | PSNR = 36.0020 dB SSIM = 0.9964 | PSNR = 40.0725 dB SSIM = 0.9984 |
High | PSNR = 38.4946 dB SSIM = 0.9977 | PSNR = 37.7989 dB SSIM = 0.9973 | PSNR = 34.6790 dB SSIM = 0.9949 | PSNR = 37.1789 dB SSIM = 0.9970 |
Medium | PSNR = 36.1193 dB SSIM = 0.9957 | PSNR = 35.6825 dB SSIM = 0.9953 | PSNR = 33.3799 dB SSIM = 0.9927 | PSNR = 35.2881 dB SSIM = 0.9950 |
Low | PSNR = 34,2754 dB SSIM = 0.9931 | PSNR = 33.9960 dB SSIM = 0.9929 | PSNR = 32.3243 dB SSIM = 0.9904 | PSNR = 33.7073 dB SSIM = 0.9925 |
Minimum | PSNR = 31.0073 dB SSIM = 0.9850 | PSNR = 30.8568 dB SSIM = 0.9847 | PSNR = 29.4452 dB SSIM = 0.9806 | PSNR = 30.7325 dB SSIM = 0.9843 |
Compression Quality | Airplane | Baboon | Lena | Goldhill | Peppers |
---|---|---|---|---|---|
No | BER = 0 NCC = 1 | BER = 0 NCC = 1 | BER = 0 NCC = 1 | BER = 0 NCC = 1 | BER = 0 NCC = 1 |
Maximum | BER = 0 NCC = 1 | BER = 0 NCC = 1 | BER = 0 NCC = 1 | BER = 0 NCC = 1 | BER = 0 NCC = 1 |
High | BER = 0.0002 NCC = 0.9998 | BER = 0.0005 NCC = 0.9996 | BER = 0.0007 NCC = 0.9993 | BER = 0.0005 NCC = 0.9996 | BER = 0.0007 NCC = 0.9993 |
Medium | BER = 0.0173 NCC = 0.9841 | BER = 0.0439 NCC = 0.6596 | BER = 0.0225 NCC = 0.9794 | BER = 0.0231 NCC = 0.9787 | BER = 0.0232 NCC = 0.9787 |
Low | BER = 0.1104 NCC = 0.8970 | BER = 0.1543 NCC = 0.8580 | BER = 0.1172 NCC = 0.8916 | BER = 0.1228 NCC = 0.8861 | BER = 0.1129 NCC = 0.8952 |
Minimum | BER = 0.3018 NCC = 0.7177 | BER = 0.4116 NCC = 0.6078 | BER = 0.3059 NCC = 0.7227 | BER = 0.3303 NCC = 0.6832 | BER = 0.3105 NCC = 0.7142 |
Compression Quality | Work1 | Gears | Social media | Work2 | |
---|---|---|---|---|---|
No | BER = 0.0054 NCC = 0.9951 | BER = 0.0081 NCC = 0.9926 | BER = 0.0034 NCC = 0.9968 | BER = 0 NCC = 1 | BER = 0 NCC = 1 |
Maximum | BER = 0.0068 NCC = 0.9937 | BER = 0.0088 NCC = 0.9918 | BER = 0.0034 NCC = 0.9968 | BER = 0 NCC = 1 | BER = 0 NCC = 1 |
High | BER = 0.0115 NCC = 0.9895 | BER = 0.0102 NCC = 0.9905 | BER = 0.0042 NCC = 0.9962 | BER = 0.0002 NCC = 0.9997 | BER = 0.0002 NCC = 0.9997 |
Medium | BER = 0.0187 NCC = 0.9828 | BER = 0.0163 NCC = 0.9849 | BER = 0.0139 NCC = 0.9872 | BER = 0.0019 NCC = 0.9982 | BER = 0.0022 NCC = 0.9979 |
Low | BER = 0.1359 NCC = 0.8751 | BER = 0.1519 NCC = 0.8645 | BER = 0.1313 NCC = 0.8792 | BER = 0.1021 NCC = 0.9045 | BER = 0.1174 NCC = 0.8957 |
Minimum | BER = 0.2851 NCC = 0.7354 | BER = 0.1953 NCC = 0.8161 | BER = 0.2456 NCC = 0.8028 | BER = 0.3161 NCC = 0.7855 | BER = 0.1716 NCC = 0.8409 |
Compression Quality | Airplane | Baboon | Lena | Goldhill | Peppers |
---|---|---|---|---|---|
No | BER = 0 NCC = 1 | BER = 0 NCC = 1 | BER = 0 NCC = 1 | BER = 0 NCC = 1 | BER = 0 NCC = 1 |
Maximum | BER = 0 NCC = 1 | BER = 0 NCC = 1 | BER = 0 NCC = 1 | BER = 0 NCC = 1 | BER = 0 NCC = 1 |
High | BER = 0.0044 NCC = 0.9959 | BER = 0.0032 NCC = 0.9942 | BER = 0.0024 NCC = 0.9978 | BER = 0.0068 NCC = 0.9937 | BER = 0.0046 NCC = 0.9957 |
Medium | BER = 0.1243 NCC = 0.8842 | BER = 0.1445 NCC = 0.8661 | BER = 0.1301 NCC = 0.8796 | BER = 0.1406 NCC = 0.8686 | BER = 0.1421 NCC = 0.8677 |
Low | BER = 0.3129 NCC = 0.6976 | BER = 0.2605 NCC = 0.7552 | BER = 0.3289 NCC = 0.6881 | BER = 0.3113 NCC = 0.7036 | BER = 0.3142 NCC = 0.6977 |
Minimum | BER = 0.5398 NCC = 0.4235 | BER = 0.5259 NCC = 0.4835 | BER = 0.5325 NCC = 0.4269 | BER = 0.5376 NCC = 0.4623 | BER = 0.5374 NCC = 0.4322 |
Compression Quality | Airplane | Baboon | Lena | Goldhill | Peppers |
---|---|---|---|---|---|
No | BER = 0 NCC = 1 | BER = 0 NCC = 1 | BER = 0 NCC = 1 | BER = 0 NCC = 1 | BER = 0 NCC = 1 |
Maximum | BER = 0.0012 NCC = 0.9989 | BER = 0.0005 NCC = 0.9996 | BER = 0.0015 NCC = 0.9987 | BER = 0.0009 NCC = 0.9991 | BER = 0.0012 NCC = 0.9989 |
High | BER = 0.0261 NCC = 0.9760 | BER = 0.0209 NCC = 0.9807 | BER = 0.0183 NCC = 0.9832 | BER = 0.0186 NCC = 0.9830 | BER = 0.0227 NCC = 0.9791 |
Medium | BER = 0.0537 NCC = 0.9504 | BER = 0.0601 NCC = 0.9445 | BER = 0.0601 NCC = 0.9446 | BER = 0.0674 NCC = 0.9381 | BER = 0.0588 NCC = 0.9456 |
Low | BER = 0.1047 NCC = 0.9027 | BER = 0.1111 NCC = 0.8967 | BER = 0.1000 NCC = 0.9069 | BER = 0.1089 NCC = 0.8993 | BER = 0.1089 NCC = 0.8993 |
Minimum | BER = 0.2522 NCC = 0.7652 | BER = 0.2488 NCC = 0.7672 | BER = 0.2446 NCC = 0.7686 | BER = 0.2515 NCC = 0.7627 | BER = 0.2456 NCC = 0.7688 |
Algorithm | Highly Detailed Images | Synthesized Images |
---|---|---|
[31] |
|
|
[34] |
| Embedding was not carried out. |
[37] |
| Embedding was not carried out. |
Ref No. | Document Type | Embedding Method | Authorship Protection | ||
---|---|---|---|---|---|
Text Copying | Images Copying | Format Changing | |||
[14] | Any type | Making lexical or syntactic changes in texts | Yes | No | Any format changing |
[18] | RTF, DOC, DOCX, PDF | Changing the value of line spacing | No | No | Printing, scanning, conversion to image |
[21] | Character coordinate modification | No | No | Printing, scanning, conversion to image | |
[24] | Text image | Changing the frequency coefficients of images | No (separate copying of text is not possible) | Yes | Conversion to JPEG format |
[26] | Robust image watermarking (any algorithm) | No (separate copying of text is not possible) | Yes | Printing, scanning, conversion to image | |
Proposed | Any document containing an image | Robust image watermarking (any algorithm) | Yes, if the watermark is created using context (for example, hashing) | Yes | Any format changing |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Melman, A.; Evsutin, O.; Shelupanov, A. An Authorship Protection Technology for Electronic Documents Based on Image Watermarking. Technologies 2020, 8, 79. https://doi.org/10.3390/technologies8040079
Melman A, Evsutin O, Shelupanov A. An Authorship Protection Technology for Electronic Documents Based on Image Watermarking. Technologies. 2020; 8(4):79. https://doi.org/10.3390/technologies8040079
Chicago/Turabian StyleMelman, Anna, Oleg Evsutin, and Alexander Shelupanov. 2020. "An Authorship Protection Technology for Electronic Documents Based on Image Watermarking" Technologies 8, no. 4: 79. https://doi.org/10.3390/technologies8040079
APA StyleMelman, A., Evsutin, O., & Shelupanov, A. (2020). An Authorship Protection Technology for Electronic Documents Based on Image Watermarking. Technologies, 8(4), 79. https://doi.org/10.3390/technologies8040079