Review Article

A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

Table 12

Implementation of structural techniques on highlight examples.

AlgorithmOriginal textWatermarked textEmbedded bits

Bender et al., 1996 [44]Tom’s leg is injured by falling.Tom’s leg is injured by falling.5
Lee and Tsai, 2008 [42]Tom’s leg is injured by falling.Tom’s leg is &#x32injured by &#160falling.15
Cheng et al., 2010 [45]12
Chou et al., 2012 [46]Tom’s leg is injured by falling.Tom’s leg is injured by falling.25
Gutub et al., 2010 [47]12
Por et al., 2012 [22]Tom’s leg is injured by falling.10
Taleby Ahvanooey and Tabasi, 2014 [15]Tom’s leg is injured by falling.Tom’s leg is injured by falling.4
Taleby Ahvanooey et al., 2015 [16]Tom’s leg is injured by falling.Tom’s leg is injured by falling.32
Taleby Ahvanooey et al., 2016 [11]Tom’s leg is injured by falling.Tom’s leg is injured by falling.Total bits of watermark
Alotaibi and Elrefaei, 2016 [19]Tom’s leg is injured by falling.20
Rizzo et al., 2016 [29]
Rizzo et al., 2017 [48]
All the world10