Review Article

A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

Table 16

Approximate DR (%) of structural techniques against tampering attacks.

Algorithm nameDoc 1Doc 2Doc 3Doc 4Average robustness

Bender et al., 1996 [44]8185938686
Lee and Tsai, 2008 [42]8285978888
Cheng et al., 2010 [45]8185028764
Chou and et al., 2012 [46]8285978788
Por et al., 2012 [22]8184938686
Taleby Ahvanooey and Tabasi, 2014 [15]9997889895
Taleby Ahvanooeyet al., 2015 [16]9997889895
Taleby Ahvanooeyet al., 2016 [11]9999989999
Alotaibi and Elrefaei, 2016 [19]8285978888