Abstract
Nowadays, with the help of advanced technologies, an illegal copy of digital content can be shared easily. Which rise copyright and authentication problems. Digital text documents are generated and shared daily through different internet technologies such as the cloud, etc. The protection of these documents is a challenging task for researchers. In the past, steganography, cryptography, and watermarking techniques have been applied to resolve the copyright problem. However, most of the existing techniques are applicable for only plain text or protecting the document on the local paradigm. In the said perspective, we proposed a new technique to solve the problem of copyright and authentication on local and cloud paradigms. In this paper, we utilize some custom components of MS Word Document for concealing the watermark into a text document. These components are not referred to as the main document and will not modify the content and format. The experimental analysis and results prove that the proposed method improves the watermark capacity, imperceptible, and robust against formatting attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yesilyurt, M., Yalman, Y.: New approach for ensuring cloud computing security: using data hiding methods. Sādhanā 41(11), 1289–1298 (2016). https://doi.org/10.1007/s12046-016-0558-8
Khadam, U., et al.: Text data security and privacy in the internet of things: threats, challenges, and future directions. Wireless Commun. Mobile Comput. (2020). https://doi.org/10.1155/2020/7105625
Khadam, U., et al.: Digital watermarking technique for text document protection using data mining analysis. IEEE Access 7, 64955–64965 (2019). https://doi.org/10.1109/ACCESS.2019.2916674
Saba, T., et al.: Enhancing fragility of zero-based text watermarking utilizing effective characters list. Multimed. Tools Appl. 79(1), 341–354 (2019). https://doi.org/10.1007/s11042-019-08084-0
Naz, F., et al.: Watermarking as a service (WaaS) with anonymity. Multimed. Tools Appl. 79(23), 16051–16075 (2019). https://doi.org/10.1007/s11042-018-7074-2
Chen, X., Sun, H., Tobe, Y., Zhou, Z., Sun, X.: Coverless information hiding method based on the chinese mathematical expression. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 133–143. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27051-7_12
Zhou, Z., et al.: Coverless multi-keywords information hiding method based on text. Int. J. Secur. Appl. 10(9), 309–320 (2016). https://doi.org/10.14257/ijsia.2016.10.9.30
AlKhamese, A.Y., Shabana, W.R., Hanafy, I.M.: Data security in cloud computing using steganography: a review. In: 2019 International Conference on Innovative Trends in Computer Engineering (ITCE). IEEE (2019). https://doi.org/10.1109/ITCE.2019.8646434
Wahsheh, H.A., Luccio, F.L.: Security and privacy of QR code applications: a comprehensive study, general guidelines and solutions. Information 11(4), 217 (2020). https://doi.org/10.3390/info11040217
Mir, N., Khan, M.A.: Copyright protection for online text information: using watermarking and cryptography. In: 2020 3rd International Conference on Computer Applications & Information Security (ICCAIS). IEEE (2020). https://doi.org/10.1109/ICCAIS48893.2020.9096817
Khairullah, M.: A novel text steganography system using font color of the invisible characters in microsoft word documents. In: 2009 Second International Conference on Computer and Electrical Engineering. IEEE (2009). https://doi.org/10.1109/ICCEE.2009.127
Bhaya, W., Rahma, A.M., Al-Nasrawi, D.: Text steganography based on font type in MS-Word documents. (2013). https://doi.org/10.3844/jcssp.2013.898.904
Naqvi, N., Abbasi, A.T., Hussain, R., Khan, M.A., Ahmad, B.: Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach. Wireless Personal Commun. 103(2), 1563–1585 (2018). https://doi.org/10.1007/s11277-018-5868-1
Kumar, R., et al.: A high capacity email based text steganography scheme using Huffman compression. In: 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN). IEEE (2016). https://doi.org/10.1109/SPIN.2016.7566661
Khosravi, B., et al.: A new method for pdf steganography in justified texts. J. Inf. Secur. Appl. 45, 61–70 (2019). https://doi.org/10.1016/j.jisa.2019.01.003
Alghamdi, N., Berriche, L.: Capacity investigation of markov chain-based statistical text steganography: arabic language case. In: Proceedings of the 2019 Asia Pacific Information Technology Conference. ACM (2019). https://doi.org/10.1145/3314527.3314532
Long, Y., et al.: Coverless information hiding method based on web text. IEEE Access 7, 31926–31933 (2019). https://doi.org/10.1109/ACCESS.2019.2901260
Rizzo, S.G., Bertini, F., Montesi, D.: Fine-grain watermarking for intellectual property protection. EURASIP J. Inf. Secur. 2019(1), 1–20 (2019). https://doi.org/10.1186/s13635-019-0094-2
Zhang, J., Xie, Y., Shen, J., Wang, L., Lin, H.: Text information hiding method using the custom components. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICCCS 2018. LNCS, vol. 11066, pp. 473–484. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00015-8_41
Castiglione, A., De Santis, A., Soriente, C.: Taking advantages of a disadvantage: digital forensics and steganography using document metadata. J. Syst. Software 80(5), 750–764 (2007). https://doi.org/10.1016/j.jss.2006.07.006
Liu, T.-Y., Tsai, W.-H.: A new steganographic method for data hiding in microsoft word documents by a change tracking technique. IEEE Trans. Inf. Forensics Secur. 2(1), 24–30 (2007). https://doi.org/10.1109/TIFS.2006.890310
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Khadam, U., Iqbal, M.M., Mostarda, L., Ullah, F. (2020). An Efficient Framework for Text Document Security and Privacy. In: Xiang, Y., Liu, Z., Li, J. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2020. Communications in Computer and Information Science, vol 1298. Springer, Singapore. https://doi.org/10.1007/978-981-15-9031-3_12
Download citation
DOI: https://doi.org/10.1007/978-981-15-9031-3_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9030-6
Online ISBN: 978-981-15-9031-3
eBook Packages: Computer ScienceComputer Science (R0)