Review Article

A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

Table 18

A comparative analysis of evaluated techniques against conventional attacks.

Algorithm nameSecurity limitationsRobustness against conventional attacks: yes (✓) and no (×)
InsertionRemovalReformattingReorderingRetypingCopay & paste

Topkara et al. (2006) [34]Medium safety ×××
Topkara et al. (2006) [35]Medium safety ×××
Meral et al. (2007 & 2009) [36, 51]Medium safety ×××
Kim (2008) [37]Medium safety ×××
Kim et al. (2010) [38]Medium safety ×××
Halvani et al. (2013) [39]Medium safety ×××
Mali et al. (2013) [40]Medium safety ×××
Lu et al. (2009) [41]Medium safety ×××
Bender et al. (1996) [44]Medium safety ×××
Lee and Tsai (2008) [42]Medium safety ×××
Cheng et al. (2010) [47]Easy to lose ×××××
Gutub et al. (2007) [49]Medium safety ×××
Gutub et al. (2010) [47]Medium safety ×××
Alginahi et al. (2013) [20]Medium safety ×××
Alginahi et al. (2014) [21]Medium safety ×××
Chou et al. (2012) [46]Medium safety ×××
Por et al. (2012) [22]Medium safety ×××
Mir (2014) [12]Unsafe ××××××
Taleby Ahvanooey and Tabasi (2014) [15]Optimum safety ××
Taleby Ahvanooey et al. (2015) [16]Optimum safety ××
Alotaibi and Elrefaei (2016) [43]Medium safety ×××
Taleby Ahvanooey et al. (2016) [11]Optimum safety ××
Alotaibi and Elrefaei (2017) [19]Medium safety ×××
Rizzo et al. (2016) [29]
Rizzo et al. (2017) [48]
Easy to lose ××××
Al-Nofaei et al. (2016) [50]Medium safety ×××