Loading…
Digital Watermarking Technique for Text Document Protection Using Data Mining Analysis
In the current era, information security is on its top priority for all organizations. The individuals, government officials, and military with the rapid development of Internet technologies like the Internet of Things (IoT), big data, and cloud computing facing data security problems. As the massiv...
Saved in:
Published in: | IEEE access 2019, Vol.7, p.64955-64965 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c474t-727acf044974dc00c3db63e07c0ded330c20d23dd512d395c1be745f1b3bc7f73 |
---|---|
cites | cdi_FETCH-LOGICAL-c474t-727acf044974dc00c3db63e07c0ded330c20d23dd512d395c1be745f1b3bc7f73 |
container_end_page | 64965 |
container_issue | |
container_start_page | 64955 |
container_title | IEEE access |
container_volume | 7 |
creator | Khadam, Umair Iqbal, Muhammad Munwar Azam, Muhammad Awais Khalid, Shehzad Rho, Seungmin Chilamkurti, Naveen |
description | In the current era, information security is on its top priority for all organizations. The individuals, government officials, and military with the rapid development of Internet technologies like the Internet of Things (IoT), big data, and cloud computing facing data security problems. As the massive rate of data growth, it is a challenging task for the researchers, that how to manage the vast amount of data safely and effectively while designing smart cities. It has been quite easy to produce an illegal copy of digital contents. The verification of digital content is one of the major issues because digital contents are generated daily and shared via the internet. The limited techniques are available for document copyright protection. However, most of the existing techniques produce distortion during watermark insertion or lack of capacity. In the said perspective, a digital watermarking technique is proposed for document copyright protection and ownership verification with the help of data mining. The techniques of data mining are applied to find suitable properties from the document for embedding watermark. The proposed model provides copyright protection to text documents on local and cloud computing paradigm. For the evaluation of the proposed technique, 20 different text documents are used to perform many attacks such as formatting, insertion, and deletion attacks. The proposed technique attained a high-level of imperceptibility where peak signal to noise ratio (PSNR) values are between 64.67% and 71.03%, and similarity (SIM) percentage is between 99.92% and 99.99%. The proposed technique is robust and resists from formatting attacks and capacity of the proposed technique is also improved as compared to the previous techniques. |
doi_str_mv | 10.1109/ACCESS.2019.2916674 |
format | article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_journals_2455615127</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8713871</ieee_id><doaj_id>oai_doaj_org_article_74ad05485cad4fcf98d0460af781b09c</doaj_id><sourcerecordid>2455615127</sourcerecordid><originalsourceid>FETCH-LOGICAL-c474t-727acf044974dc00c3db63e07c0ded330c20d23dd512d395c1be745f1b3bc7f73</originalsourceid><addsrcrecordid>eNpNUU1rAjEQXUoLFesv8LLQszbZJJvdo6y2FSwtqO0xZPNhY3Vjkwj13zfbFWlgyMww7808XpIMIRhDCMqHSVXNlstxBmA5zkqY5xRfJb0M5uUIEZRf_8tvk4H3WxBfEVuE9pL3qdmYwHfpBw_K7bn7Ms0mXSnx2Zjvo0q1dbH6CenUiuNeNSF9czYoEYxt0rVvh6c88PTFNG0-afju5I2_S24033k1OP_9ZP04W1XPo8Xr07yaLEYCUxxGNKNcaIBxSbEUAAgk6xwpQAWQSiIERAZkhqQkMJOoJALWimKiYY1qQTVF_WTe8UrLt-zgTFRwYpYb9tewbsO4C0bsFKOYS0BwQQSXWAtdFhLgHHBNC1iDUkSu-47r4GyU7gPb2qOLgjzLMCE5jEe0G1E3JZz13il92QoBa_1gnR-s9YOd_YioYYcySqkLoqAQtfELbJGGlQ</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455615127</pqid></control><display><type>article</type><title>Digital Watermarking Technique for Text Document Protection Using Data Mining Analysis</title><source>IEEE Open Access Journals</source><creator>Khadam, Umair ; Iqbal, Muhammad Munwar ; Azam, Muhammad Awais ; Khalid, Shehzad ; Rho, Seungmin ; Chilamkurti, Naveen</creator><creatorcontrib>Khadam, Umair ; Iqbal, Muhammad Munwar ; Azam, Muhammad Awais ; Khalid, Shehzad ; Rho, Seungmin ; Chilamkurti, Naveen</creatorcontrib><description>In the current era, information security is on its top priority for all organizations. The individuals, government officials, and military with the rapid development of Internet technologies like the Internet of Things (IoT), big data, and cloud computing facing data security problems. As the massive rate of data growth, it is a challenging task for the researchers, that how to manage the vast amount of data safely and effectively while designing smart cities. It has been quite easy to produce an illegal copy of digital contents. The verification of digital content is one of the major issues because digital contents are generated daily and shared via the internet. The limited techniques are available for document copyright protection. However, most of the existing techniques produce distortion during watermark insertion or lack of capacity. In the said perspective, a digital watermarking technique is proposed for document copyright protection and ownership verification with the help of data mining. The techniques of data mining are applied to find suitable properties from the document for embedding watermark. The proposed model provides copyright protection to text documents on local and cloud computing paradigm. For the evaluation of the proposed technique, 20 different text documents are used to perform many attacks such as formatting, insertion, and deletion attacks. The proposed technique attained a high-level of imperceptibility where peak signal to noise ratio (PSNR) values are between 64.67% and 71.03%, and similarity (SIM) percentage is between 99.92% and 99.99%. The proposed technique is robust and resists from formatting attacks and capacity of the proposed technique is also improved as compared to the previous techniques.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2019.2916674</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Cloud computing ; Copyright protection ; Data mining ; Digital watermarking ; Digital watermarks ; Information security ; Insertion ; Internet of Things ; Security ; Signal to noise ratio ; Smart cities ; Verification ; Watermarking</subject><ispartof>IEEE access, 2019, Vol.7, p.64955-64965</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c474t-727acf044974dc00c3db63e07c0ded330c20d23dd512d395c1be745f1b3bc7f73</citedby><cites>FETCH-LOGICAL-c474t-727acf044974dc00c3db63e07c0ded330c20d23dd512d395c1be745f1b3bc7f73</cites><orcidid>0000-0001-7212-1408 ; 0000-0002-5396-8897 ; 0000-0003-0488-4598</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8713871$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4024,27633,27923,27924,27925,54933</link.rule.ids></links><search><creatorcontrib>Khadam, Umair</creatorcontrib><creatorcontrib>Iqbal, Muhammad Munwar</creatorcontrib><creatorcontrib>Azam, Muhammad Awais</creatorcontrib><creatorcontrib>Khalid, Shehzad</creatorcontrib><creatorcontrib>Rho, Seungmin</creatorcontrib><creatorcontrib>Chilamkurti, Naveen</creatorcontrib><title>Digital Watermarking Technique for Text Document Protection Using Data Mining Analysis</title><title>IEEE access</title><addtitle>Access</addtitle><description>In the current era, information security is on its top priority for all organizations. The individuals, government officials, and military with the rapid development of Internet technologies like the Internet of Things (IoT), big data, and cloud computing facing data security problems. As the massive rate of data growth, it is a challenging task for the researchers, that how to manage the vast amount of data safely and effectively while designing smart cities. It has been quite easy to produce an illegal copy of digital contents. The verification of digital content is one of the major issues because digital contents are generated daily and shared via the internet. The limited techniques are available for document copyright protection. However, most of the existing techniques produce distortion during watermark insertion or lack of capacity. In the said perspective, a digital watermarking technique is proposed for document copyright protection and ownership verification with the help of data mining. The techniques of data mining are applied to find suitable properties from the document for embedding watermark. The proposed model provides copyright protection to text documents on local and cloud computing paradigm. For the evaluation of the proposed technique, 20 different text documents are used to perform many attacks such as formatting, insertion, and deletion attacks. The proposed technique attained a high-level of imperceptibility where peak signal to noise ratio (PSNR) values are between 64.67% and 71.03%, and similarity (SIM) percentage is between 99.92% and 99.99%. The proposed technique is robust and resists from formatting attacks and capacity of the proposed technique is also improved as compared to the previous techniques.</description><subject>Cloud computing</subject><subject>Copyright protection</subject><subject>Data mining</subject><subject>Digital watermarking</subject><subject>Digital watermarks</subject><subject>Information security</subject><subject>Insertion</subject><subject>Internet of Things</subject><subject>Security</subject><subject>Signal to noise ratio</subject><subject>Smart cities</subject><subject>Verification</subject><subject>Watermarking</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1rAjEQXUoLFesv8LLQszbZJJvdo6y2FSwtqO0xZPNhY3Vjkwj13zfbFWlgyMww7808XpIMIRhDCMqHSVXNlstxBmA5zkqY5xRfJb0M5uUIEZRf_8tvk4H3WxBfEVuE9pL3qdmYwHfpBw_K7bn7Ms0mXSnx2Zjvo0q1dbH6CenUiuNeNSF9czYoEYxt0rVvh6c88PTFNG0-afju5I2_S24033k1OP_9ZP04W1XPo8Xr07yaLEYCUxxGNKNcaIBxSbEUAAgk6xwpQAWQSiIERAZkhqQkMJOoJALWimKiYY1qQTVF_WTe8UrLt-zgTFRwYpYb9tewbsO4C0bsFKOYS0BwQQSXWAtdFhLgHHBNC1iDUkSu-47r4GyU7gPb2qOLgjzLMCE5jEe0G1E3JZz13il92QoBa_1gnR-s9YOd_YioYYcySqkLoqAQtfELbJGGlQ</recordid><startdate>2019</startdate><enddate>2019</enddate><creator>Khadam, Umair</creator><creator>Iqbal, Muhammad Munwar</creator><creator>Azam, Muhammad Awais</creator><creator>Khalid, Shehzad</creator><creator>Rho, Seungmin</creator><creator>Chilamkurti, Naveen</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-7212-1408</orcidid><orcidid>https://orcid.org/0000-0002-5396-8897</orcidid><orcidid>https://orcid.org/0000-0003-0488-4598</orcidid></search><sort><creationdate>2019</creationdate><title>Digital Watermarking Technique for Text Document Protection Using Data Mining Analysis</title><author>Khadam, Umair ; Iqbal, Muhammad Munwar ; Azam, Muhammad Awais ; Khalid, Shehzad ; Rho, Seungmin ; Chilamkurti, Naveen</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c474t-727acf044974dc00c3db63e07c0ded330c20d23dd512d395c1be745f1b3bc7f73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Cloud computing</topic><topic>Copyright protection</topic><topic>Data mining</topic><topic>Digital watermarking</topic><topic>Digital watermarks</topic><topic>Information security</topic><topic>Insertion</topic><topic>Internet of Things</topic><topic>Security</topic><topic>Signal to noise ratio</topic><topic>Smart cities</topic><topic>Verification</topic><topic>Watermarking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Khadam, Umair</creatorcontrib><creatorcontrib>Iqbal, Muhammad Munwar</creatorcontrib><creatorcontrib>Azam, Muhammad Awais</creatorcontrib><creatorcontrib>Khalid, Shehzad</creatorcontrib><creatorcontrib>Rho, Seungmin</creatorcontrib><creatorcontrib>Chilamkurti, Naveen</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Khadam, Umair</au><au>Iqbal, Muhammad Munwar</au><au>Azam, Muhammad Awais</au><au>Khalid, Shehzad</au><au>Rho, Seungmin</au><au>Chilamkurti, Naveen</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Digital Watermarking Technique for Text Document Protection Using Data Mining Analysis</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2019</date><risdate>2019</risdate><volume>7</volume><spage>64955</spage><epage>64965</epage><pages>64955-64965</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>In the current era, information security is on its top priority for all organizations. The individuals, government officials, and military with the rapid development of Internet technologies like the Internet of Things (IoT), big data, and cloud computing facing data security problems. As the massive rate of data growth, it is a challenging task for the researchers, that how to manage the vast amount of data safely and effectively while designing smart cities. It has been quite easy to produce an illegal copy of digital contents. The verification of digital content is one of the major issues because digital contents are generated daily and shared via the internet. The limited techniques are available for document copyright protection. However, most of the existing techniques produce distortion during watermark insertion or lack of capacity. In the said perspective, a digital watermarking technique is proposed for document copyright protection and ownership verification with the help of data mining. The techniques of data mining are applied to find suitable properties from the document for embedding watermark. The proposed model provides copyright protection to text documents on local and cloud computing paradigm. For the evaluation of the proposed technique, 20 different text documents are used to perform many attacks such as formatting, insertion, and deletion attacks. The proposed technique attained a high-level of imperceptibility where peak signal to noise ratio (PSNR) values are between 64.67% and 71.03%, and similarity (SIM) percentage is between 99.92% and 99.99%. The proposed technique is robust and resists from formatting attacks and capacity of the proposed technique is also improved as compared to the previous techniques.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2019.2916674</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0001-7212-1408</orcidid><orcidid>https://orcid.org/0000-0002-5396-8897</orcidid><orcidid>https://orcid.org/0000-0003-0488-4598</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2019, Vol.7, p.64955-64965 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_proquest_journals_2455615127 |
source | IEEE Open Access Journals |
subjects | Cloud computing Copyright protection Data mining Digital watermarking Digital watermarks Information security Insertion Internet of Things Security Signal to noise ratio Smart cities Verification Watermarking |
title | Digital Watermarking Technique for Text Document Protection Using Data Mining Analysis |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T20%3A02%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Digital%20Watermarking%20Technique%20for%20Text%20Document%20Protection%20Using%20Data%20Mining%20Analysis&rft.jtitle=IEEE%20access&rft.au=Khadam,%20Umair&rft.date=2019&rft.volume=7&rft.spage=64955&rft.epage=64965&rft.pages=64955-64965&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2019.2916674&rft_dat=%3Cproquest_ieee_%3E2455615127%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c474t-727acf044974dc00c3db63e07c0ded330c20d23dd512d395c1be745f1b3bc7f73%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2455615127&rft_id=info:pmid/&rft_ieee_id=8713871&rfr_iscdi=true |