Skip to main content
Log in

Tamper Detection Technique for Text Images based on Vowels and Unicode Zero Length Characters

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

A novel watermarking technique for the tamper detection of English text images is proposed in this paper. The frequency of maximum occurring vowel in every sentence is counted and converted to Unicode Zero Width Characters (ZWCs) by using a lookup table. These ZWCs and total length of each sentence are added at the end of the sentence. ZWCs of the Hash value of the cover text is calculated and inserted at the end of the cover text. These values are extracted from the received data on the receiver side for the tamper detection. The hash value of the received text as well as frequency of maximum occurring vowel of each sentence are again calculated and compared to their extracted corresponding values to prove the authentication of the image. Comparison with existing state-of-the-art techniques shows the effectiveness of the proposed technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data Availability

Data sharing not applicable to this article as data availability statement in my main manuscript.

References

  1. Ahvanooey, M. T., Mazraeh, H. D., & Tabasi, S. H. (2016). An innovative technique for web text watermarking. Information Security Journal: A Global Perspective, 25, 191–196.

    Google Scholar 

  2. Ahvanooey, M. T., Li, Q., Zhu, X., Alazab, M., & Zhang, J. (2020). ANiTW: A novel intelligent text watermarking technique for forensic identification of spurious information on social media. Computers & Security, 90, 1–14.

    Google Scholar 

  3. Alotaibi, R. A., & Elrefaei, L. A. (2017). Improved capacity Arabic text watermarking methods based on open word space. Journal of King Saud University-Computer and Informatics Sciences, 30, 236–248.

    Article  Google Scholar 

  4. Al-Maweri, N. A. S., Adnan, W. A. W., Ramli, A. R., Samsudin, K., & Rahman, S. M. (2016). Robust digital text watermarking algorithm based on Unicode Extended Characters. Indian Journal of Science and Technology, 9, 1–14.

    Google Scholar 

  5. Al-Wesabi, F. N., Mahmood, K., & Nemri, N. (2020). A zero watermarking approach for content authentication and tamper detection of Arabic text based on fourth level order and word mechanism of Markov Model. Jorunal of Information Security and Applications, 52, 1–15.

    Google Scholar 

  6. Cao, F., An, B., Wang, J., Ye, D., & Wang, H. (2017). Hierarchical recovery for tampered images based on watermark self-embedding. Displays, 46, 52–60.

    Article  Google Scholar 

  7. Gonzalez, M., Nakano-Miyatake, M., Perez-Meana, H., & Sanchez-Perez, G. (2015). Script format document authentication scheme based on watermarking techniques. Journal of Applied Research and Technology, 13, 435–442.

    Article  Google Scholar 

  8. Khosravi, B., Khosravi, B., Khosravi, B., & Nazarkardeh, K. (2019). A new method for pdf steganography in justified texts. Journal of Information Security and Applications, 45, 61–70.

    Article  Google Scholar 

  9. Mohamed, A. A. (2014). An improved algorithm for information hiding based on features of Arabic text: A Unicode approach. Egyptian Informatics Journal, 15, 79–87.

    Article  Google Scholar 

  10. Naqvi, N., Abbasi, A. T., Hussain, R., Khan, M. A., and Ahmad, B. (2018). “Multilayer partially Homomorphic encryption text steganography: A zero steganography approach”, Wireless Personal Communications, pp. 1563-1585.

  11. Patiburn, S. A., Iranmanesh, V., & Teh, P. L. (2017). Text steganography using daily emotions monitoring. International Journal of Education and Management Engineering, 3, 1–14.

    Article  Google Scholar 

  12. Por, L. Y., Wong, K., & Chee, K. O. (2011). UniSpaCh: A text-based data hiding method using Unicode space characters. The Journal of Systems and Software, 85, 1075–1082.

    Article  Google Scholar 

  13. Qin, C., Chang, C., and Hsu, T. (2013). Effective fragile watermarking for image authentication with high-quality recovery capability, KSII Transactions on Internet and Information Systems, vol. 7, pp. 2941-2956.

  14. Rivest, R. (1992).“The MD5 message-digest algorithm”, RFC 1321.

  15. Rizzo, S. G., Bertini, F., and Montesi, D. (2016). Content-preserving text watermarking through unicode Homoglyph substitution, in Proceedings of International Database Engineering and Applications Symposium, pp. 97-104.

  16. Rizzo, S. G., Bertini, F., Montesi, D., and Stomeo, C. (2017). Text watermarking in social media. in Proceedings of International Conference on Advances in Social Networks Analysis and Mining, IEEE/ACM, pp. 208-211.

  17. Rizzo, S. G., Bertini, F., & Montesi, D. (2019). Fine-grain watermarking for intellectual property protection. Journal on Information Security: EURASIP, pp. 1–20.

  18. Yang, S., Qin, C., Qian, Z., and Xu, B. (2014). Tampering detection and content Recovery for digital images using halftone mechanism. in Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IEEE, pp. 130–133.

Download references

Funding

No funding was received.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Balkar Singh.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, B., Hathwal, R.P. Tamper Detection Technique for Text Images based on Vowels and Unicode Zero Length Characters. Wireless Pers Commun 132, 2421–2436 (2023). https://doi.org/10.1007/s11277-023-10724-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10724-6

Keywords