Review Article
A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents
Table 12
Implementation of structural techniques on highlight examples.
| Algorithm | Original text | Watermarked text | Embedded bits |
| Bender et al., 1996 [44] | Tom’s leg is injured by falling. | Tom’s leg is injured by falling. | 5 | Lee and Tsai, 2008 [42] | Tom’s leg is injured by falling. | Tom’s leg is 2injured by  falling. | 15 | Cheng et al., 2010 [45] | | | 12 | Chou et al., 2012 [46] | Tom’s leg is injured by falling. | Tom’s leg is injured by falling. | 25 | Gutub et al., 2010 [47] | | | 12 | Por et al., 2012 [22] | Tom’s leg is injured by falling. | | 10 | Taleby Ahvanooey and Tabasi, 2014 [15] | Tom’s leg is injured by falling. | Tom’s leg is injured by falling. | 4 | Taleby Ahvanooey et al., 2015 [16] | Tom’s leg is injured by falling. | Tom’s leg is injured by falling. | 32 | Taleby Ahvanooey et al., 2016 [11] | Tom’s leg is injured by falling. | Tom’s leg is injured by falling. | Total bits of watermark | Alotaibi and Elrefaei, 2016 [19] | Tom’s leg is injured by falling. | | 20 | Rizzo et al., 2016 [29] Rizzo et al., 2017 [48] | All the world | | 10 |
|
|