Copyright protection for the electronic distribution of text documents (original) (raw)

Electronic marking and identification techniques to discourage document copying

IEEE Journal on Selected Areas in Communications, 1995

Modern computer networks make it possible to distribute documents quickly and economically by electronic means rather than by conventional paper means. However, the widespread adoption of electronic distribution of copyrighted material is currently impeded by the ease of unauthorized copying and dissemination. In this paper we propose techniques that discourage unauthorized distribution by embedding each document with a unique codeword. Our encoding techniques are indiscernible by readers, yet enable us to identify the sanctioned recipient of a document by examination of a recovered document. We propose three coding methods, describe one in detail, and present experimental results showing that our identification techniques are highly reliable, even after documents have been photocopied.

Attacks on Copyright Marking Systems

1998

In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects. We describe some contenders that have appeared in the research literature and in the field; we then present a number of attacks that enable the information hidden by them to be removed or otherwise rendered unusable.

Document identification to discourage illicit copying

Proceedings of GLOBECOM '95, 1995

A n important application of future communications networks will be electronic publishing and digital library, provided copyright can be protected. A way to discourage illicit copying and distribution of documents is to uniquely mark each document copy b y shifting certain lines or words slightly so that the original registered recipient can be identified from an illicit copy b y detecting its mark. I n this paper we present two techniques f o r reliable document identification, the centroid and the correlation detection. B y analyzing the noise characteristics, we obtain the maximum likelihood detectors for both methods and their probabilities of error. W e have applied these results to implement a marking and identification strategy proposed earlier, which marks a line both vertically b y line shift and horizontally b y word shift to make the marking robust against distortions in either direction. Preliminary experimental results are presented.

A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, and so on is just the plain text. Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy. During the last decade, digital watermarking and steganography techniques have been used as alternatives to prevent tampering, distortion, and media forgery and also to protect both copyright and authentication. This paper presents a comparative analysis of information hiding techniques, especially on those ones which are focused on modifying the structure and content of digital texts. Herein, various text watermarking and text steganography techniques characteristics are highlighted along with their applications. In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques. Finally, some guidelines and directions are suggested for future works.

Data hiding: steganography and copyright marking

1997

Communicating in secure way is, in general, synonymous of encrypting the traffic, but this is not really true in practice. If a person wants to comunicate a secret to another one is better hiding the message in an innocuos object as a mp3, mpeg and a jpg. This paper presents an overview of information hiding in general, steganography and copyright marking in particular. Several techniques to hide information are presented, terminology and possible related attacks, with specific attention on steganographic and copyright schemes. Information Hiding Covert Channels Steganography Anonymity Copyright Marking Technical Steganography Linguistic Steganography Robust Copyright Marking Fragile Watermarking Watermarking Fingerprinting Imperceptible Watermarking Visible Watermarking Fig. 1: A classification of information hiding techniques based on [11]. The model for steganography technique is not more complicated than that general one of Figure 2. Instead in the case of robust copyright marking, the model is the same, but there are several differentiations depending from the different types adopted systems. On the left side, the embedding process is able to build a marked object O, given an original object I, a mark M and a keyword K. The marked object is the result of I × K × M → O. On the right side, we have the detector scheme. Its output is either the recovered mark M or some kind of confidence measure indicating how likely it is for a given mark at the input to be present in the original object O under inspection. The different types of robust copyright marking systems are defined by their inputs and outputs: • Private marking systems require at least the original image. This type is subdivided two subtypes. o The first, extract the mark M from the probably distorted object O' and use the original object as a hint to find where the mark could be in O'. o The second [15-17] also require a copy of the embedded mark for extraction and comparison with that inside O' (O' × I × K × M → {0,1}). This scheme will be more accurate than the others since it conveys very little information and requires access to secret material [14]. • Semi-private marking does not use the original object for detection but answers the same question (O' × K × M → {0,1}). The main uses of semi-private and private marking are to prove ownership in court and to control reproduction in applications such as DVD [18-24]. • Public marking (or blind marking) requires neither the original I nor the embedded mark M. This system extracts the mark from the marked-object: O' × K → M [25-29]. • There is also asymmetric marking (or public key marking) which should have the property that any user can read the mark, without being able to remove it. 2.2 Properties Each data hiding technique must have certain properties that are dictated by the intended application. The most important properties of data hiding schemes are robustness, undetectability, invisibility, security, complexity, and capacity. We present definitions of those concepts below. Robustness Robustness determines the algorithm behavior towards data distortions introduced through standard and malicious data processing. The embedded information is said to be

Detailed Examination of Information Hiding Techniques for Copyright Protection of Text Documents

IOSR Journals , 2019

In view of the current trend in ICT evolution with incessant usage of web and other online services, copying, sharing, storing and transmitting information is by far done through digital media. It is no surprise that countless methods of protecting such data have evolved, but the greatest disadvantage in digital text transmission is the fact that inestimable digital copies of the data/file can be made and is liable of tainted. This leads to the global problem of copyright protection, copy protection and content authentication. This work critically examines information hiding techniques of text document and their consequences. Various watermarking system properties and text steganography techniques characteristics were also highlighted coupled with different types of attacks and their possible defenses. The relative analytical method of data conversion from qualitative data to quantitative data was applied and finally the work was concluded by examining text as an essential media of information transfer which needs complete protection.

Marking text documents

Proceedings of International Conference on Image Processing, 2000

Electronic documents are more easily copied and redistributed than paper documents. This is a major impediment to electronic publishing. Illegal redistribution can be discouraged by placing unique marks in each copy and registering the copy with the original recipient. If an illegal copy is discovered, the original recipient can be identified.

Digital text watermarking: secure content delivery and data hiding in digital documents

2006

Secure communication of data over public channels is one of the most important challenges. Both the activities to secure contents and to break security are very hot. In order to reduce the chances of attack, security needs to be made invisible. The needs to preserve originality, ownership information, and integrity of text documents in a way that cannot be identified by everyone is being felt badly. Watermarking of the documents is a step toward achieving these objectives. However, to watermark a plain text document (ASCII) in a way that the original text will not change (and it would be very difficult to break it), is a great challenge. We have developed a novel encoding scheme which can be used to insert information in plain text without changing the text. A system has been developed based upon this encoding scheme. This paper describes the system and demonstrates its workings.

A Quick Glance over the Digital Watermarking

IJSRD, 2013

Digital watermarking is a process for modifying physical or electronic media to embed a machine-readable code into the media. The media may be modified such that the embedded code is imperceptible or nearly imperceptible to the user, yet may be detected through an automated detection process. Watermarking is the art of imperceptibly embedding a message into a work. More than 700 years ago in Fabriano (Italy), paper watermarks appeared in handmade paper, in order to identify its provenance, format, and quality. In this context, the watermark is a kind of invisible signature that allows identifying the creator or the owner of a document, and to detect possible copyright violations, and especially non-authorized copying [1]. More recently, different watermarking techniques and strategies have been proposed in order to solve a number of problems, ranging from the detection of content manipulations, to information hiding (steganography), to document usage tracing. In particular, the insertion of multiple watermarks to trace a document during its lifecycle is a very interesting and challenging application [1]. The main property of the proposed method is that it allows the insertion of multiple watermarks by different users, who sequentially come into play one after the other and do not need any extra information besides the public keys. This characteristic makes the present approach more attractive than previously available solutions.

An Efficient Framework for Text Document Security and Privacy

2020

Nowadays, with the help of advanced technologies, an illegal copy of digital content can be shared easily. Which rise copyright and authentication problems. Digital text documents are generated and shared daily through different internet technologies such as the cloud, etc. The protection of these documents is a challenging task for researchers. In the past, steganography, cryptography, and watermarking techniques have been applied to resolve the copyright problem. However, most of the existing techniques are applicable for only plain text or protecting the document on the local paradigm. In the said perspective, we proposed a new technique to solve the problem of copyright and authentication on local and cloud paradigms. In this paper, we utilize some custom components of MS Word Document for concealing the watermark into a text document. These components are not referred to as the main document and will not modify the content and format. The experimental analysis and results prove...