Proposing high-smart approach for content authentication and tampering detection of Arabic text transmitted via internet
FN Al-Wesabi - IEICE TRANSACTIONS on Information and …, 2020 - search.ieice.org
The security and reliability of Arabic text exchanged via the Internet have become a
challenging area for the research community. Arabic text is very sensitive to modify by …
challenging area for the research community. Arabic text is very sensitive to modify by …
[PDF][PDF] Entropy-Based Watermarking Approach for Sensitive Tamper Detection of Arabic Text.
FN Al-Wesabi - Computers, Materials & Continua, 2021 - cdn.techscience.cn
The digital text media is the most common media transferred via the internet for various
purposes and is very sensitive to transfer online with the possibility to be tampered illegally …
purposes and is very sensitive to transfer online with the possibility to be tampered illegally …
A zero watermarking approach for content authentication and tampering detection of Arabic text based on fourth level order and word mechanism of Markov model
Text information is a natural language dependent. Therefore, improving security and
reliability of text information exchanged via Internet network has become one of the most …
reliability of text information exchanged via Internet network has become one of the most …
Replacement attack: A new zero text watermarking attack
The main objective of zero watermarking methods that are suggested for the authentication
of textual properties is to increase the fragility of produced watermarks against tampering …
of textual properties is to increase the fragility of produced watermarks against tampering …
[PDF][PDF] A Reliable NLP Scheme for English Text Watermarking Based on Contents Interrelationship.
In this paper, a combined approach CAZWNLP (a combined approach of zero-watermarking
and natural language processing) has been developed for the tampering detection of …
and natural language processing) has been developed for the tampering detection of …
Tamper detection technique for document images using zero watermarking in wavelet domain
B Singh, MK Sharma - Computers & Electrical Engineering, 2021 - Elsevier
Existing tamper detection techniques for document images use the textual information of the
image to create a zero watermark. These techniques cannot authenticate a document image …
image to create a zero watermark. These techniques cannot authenticate a document image …
Enhancing fragility of zero-based text watermarking utilizing effective characters list
Text is an important medium used for sharing information worldwide. For a text document,
digital watermarking is an efficient way for copyright protection, authentication, tamper …
digital watermarking is an efficient way for copyright protection, authentication, tamper …
Content authentication and tampering detection of Arabic text: an approach based on zero-watermarking and natural language processing
Due to the rapid increase in exchange of text information via internet network, the security
and the reliability of the digital content has become a major research issue. The main …
and the reliability of the digital content has become a major research issue. The main …
[PDF][PDF] Tampering Detection Approach of Arabic-Text Based on Contents Interrelationship.
FN Al-Wesabi, A Abdelmaboud, AA Zain… - … Automation & Soft …, 2021 - cdn.techscience.cn
Text information depends primarily on natural languages processing. Improving the security
and usability of text information shared through the public internet has therefore been the …
and usability of text information shared through the public internet has therefore been the …
[PDF][PDF] Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text.
M Alamgeer, FN Al-Wesabi, HG Iskandar… - … , Materials & Continua, 2022 - academia.edu
Content authentication, integrity verification, and tampering detection of digital content
exchanged via the internet have been used to address a major concern in information and …
exchanged via the internet have been used to address a major concern in information and …