Review Article
A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents
Table 16
Approximate DR (%) of structural techniques against tampering attacks.
| Algorithm name | Doc 1 | Doc 2 | Doc 3 | Doc 4 | Average robustness |
| Bender et al., 1996 [44] | 81 | 85 | 93 | 86 | 86 | Lee and Tsai, 2008 [42] | 82 | 85 | 97 | 88 | 88 | Cheng et al., 2010 [45] | 81 | 85 | 02 | 87 | 64 | Chou and et al., 2012 [46] | 82 | 85 | 97 | 87 | 88 | Por et al., 2012 [22] | 81 | 84 | 93 | 86 | 86 | Taleby Ahvanooey and Tabasi, 2014 [15] | 99 | 97 | 88 | 98 | 95 | Taleby Ahvanooeyet al., 2015 [16] | 99 | 97 | 88 | 98 | 95 | Taleby Ahvanooeyet al., 2016 [11] | 99 | 99 | 98 | 99 | 99 | Alotaibi and Elrefaei, 2016 [19] | 82 | 85 | 97 | 88 | 88 |
|
|