Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 514652, 14 pages
http://dx.doi.org/10.1155/2014/514652
Research Article

A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

1IT Research Center for the Holy Quran and Its Sciences (NOOR), Taibah University, Madinah 41411, Saudi Arabia
2College of Computer Science and Engineering (CCSE), Department of Computer Engineering, Taibah University, Madinah 41411, Saudi Arabia
3Department of Multimedia and Graphics, Faculty of Computer Systems & Software Engineering, Universiti Malaysia Pahang, Malaysia
4Academic Services, Department of Computer Science, Taibah University, Madinah, Saudi Arabia

Received 12 April 2014; Revised 17 June 2014; Accepted 29 June 2014; Published 28 August 2014

Academic Editor: Iftikhar Ahmad

Copyright © 2014 Omar Tayan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Z. Jalil, A. M. Mirza, and T. Iqbal, “A zero-watermarking algorithm for text documents based on structural components,” in Proceedings of the International Conference on Information and Emerging Technologies (ICIET ’10), pp. 1–5, Karachi, Pakistan, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. M. A. Qadir and I. Ahmad, “Digital text watermarking: Secure content delivery and data hiding in digital documents,” in Proceedings of the 39th Annual 2005 International Carnahan Conference on Security Technology (CCST '05), October 2005. View at Scopus
  3. B. Barán, S. Gómez, and V. Bogarín, “Steganographic watermarking for documents,” in Proceedings of the 34th Annual Hawaii International Conference on System Sciences, Maui, Hawaii, USA, January 2001. View at Scopus
  4. Z. Yu and X. Liu, “A new digital watermarking scheme based on text,” in Proceeding of the 1st International Conference on Multimedia Information Networking and Security (MINES '09), vol. 2, pp. 138–140, Hubei, China, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. C. Chen, S. Wang, and X. Zhang, “Information hiding in text using typesetting tools with stego-encoding,” in Proceedings of the 1st International Conference on Innovative Computing, Information and Control 2006 (ICICIC '06), pp. 459–462, September 2006. View at Publisher · View at Google Scholar · View at Scopus
  6. X. Zhou, W. Zhao, Z. Wang, and L. Pan, “Security theory and attack analysis for text watermarking,” in Proceedings of the International Conference on E-Business and Information System Security (EBISS '09), pp. 1–6, Wuhan, China, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. F. Al-Haidari, A. Gutub, K. Al-Kahsah, and J. Hamodi, “Improving security and capacity for arabic text steganography using ‘Kashida’ extensions,” in Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA '09), pp. 396–399, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. M. Shirali-Shahreza and S. Shirali-Shahreza, “Persian/arabic unicode text steganography,” in Proceedings of the 4th International Symposium on Information Assurance and Security (IAS '08), pp. 62–66, September 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. Y. Zhang, H. Qin, and T. Kong, “A novel robust text watermarking for word document,” in Proceedings of the 3rd International Congress on Image and Signal Processing (CISP '10), pp. 38–42, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  10. R. Davarzani and K. Yaghmaie, “Farsi text watermarking based on character coding,” in Proceedings of the International Conference on Signal Processing Systems (ICSPS '09), pp. 152–156, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. M. A. Aabed, S. M. Awaideh, A. M. Elshafei, and A. A. Gutub, “Arabic diacritics based steganography,” in Proceedings of the 2007 IEEE International Conference on Signal Processing and Communications (ICSPC '07), pp. 756–759, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. A. O. Adesina, H. O. Nyongesa, and K. K. Agbele, “Digital watermarking: a state-of-the-art review,” in Proceedings of the 5th IST-Africa Conference and Exhibition, May 2010. View at Scopus
  13. Z. Jalil and A. M. Mirza, “A review of digital watermarking techniques for text documents,” in Proceeding of the International Conference on Information and Multimedia Technology (ICIMT '09), pp. 230–234, Jeju Island, Republic of Korea, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. X. Zhou, Z. Wang, W. Zhao, S. Wang, and J. Yu, “Performance analysis and evaluation of text watermarking,” in Proceedings of the 1st International Symposium on Computer Network and Multimedia Technology (CNMT '09), December 2009. View at Publisher · View at Google Scholar · View at Scopus
  15. X. Zhou, W. Zhao, Z. Wang, and L. Pan, “Security theory and attack analysis for text watermarking,” in Proceedings of the International Conference on E-Business and Information System Security (EBISS '09), May 2009. View at Publisher · View at Google Scholar · View at Scopus
  16. A. Tanenbaum, Computer Networks, Prentice Hall, New York, NY, USA, 5th edition, 2010.
  17. B. Lin and H. Qiu, “Two improved digital signature schemes,” Journal of Systems Engineering and Electronics, vol. 12, no. 1, pp. 78–81, 2001. View at Google Scholar · View at Scopus
  18. L. Zhu, “Electronic signature based on digital signature and digital watermarking,” in Proceedings of the 2012 5th International Congress on Image and Signal Processing (CISP '12), pp. 1644–1647, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. C. Zhou, G. Zhu, B. Zhao, and W. Wei, “Study of one-way hash function to digital signature technology,” in Proceedings of the International Conference on Computational Intelligence and Security (ICCIAS '06), pp. 1503–1506, October 2006. View at Publisher · View at Google Scholar · View at Scopus
  20. O. P. Verma, R. Agarwal, D. Dafouti, and S. Tyagi, Performance Analysis of Data Encryption Algorithms, IEEE Delhi Technological University, New Delhi, India, 2011.
  21. S. R. Subramanya and B. K. Yi, “Digital signatures,” IEEE Potentials, vol. 25, no. 2, pp. 5–8, 2006. View at Publisher · View at Google Scholar · View at Scopus
  22. A. Kumar, S. Jakhar, and S. Makkar, “Distinction between secret key and public Key cryptography with existing glitches,” Indian Journal of Education and Information Management, vol. 1, no. 9, pp. 392–395, 2012. View at Google Scholar
  23. H. Agrawal and M. Sharma, “Implementation and analysis of various symmetric cryptosystems,” Indian Journal of Science and Technology, vol. 3, no. 12, pp. 1173–1176, 2010. View at Google Scholar
  24. L. Xiao-Fei, S. Xuan-Jing, and C. Hai-Peng, “An improved ElGamal digital signature algorithm based on adding a random number,” in Proceedings of the 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC '10), pp. 236–240, Wuhan, China, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  25. J. Liu and J. Li, “Cryptanalysis and improvement on a digital signature scheme without using one-way hash and message redundancy,” in Proceedings of the 2nd International Conference on Information Security and Assurance (ISA '08), pp. 266–269, Busan, Republic of Korea, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  26. H. Wang and S. Zhao, “Cryptanalysis and improvement of several digital signature schemes,” in Proceedings of the 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC '10), pp. 306–309, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  27. C. Fu and Z. Zhu, “An efficient implementation of RSA digital signature algorithm,” in Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing (WICOM '08), October 2008. View at Publisher · View at Google Scholar · View at Scopus
  28. C. Hu and X. Wang, “Zero watermark protocol based on time-stamp and digital signature,” in Proceedings of the International Forum on Information Technology and Applications (IFITA '09), pp. 193–196, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  29. S. S. P. Shukla, S. P. Singh, K. Shah, and A. Kumar, “Enhancing security & integrity of data using watermarking & digital signature,” in Proceedings of the 2012 1st International Conference on Recent Advances in Information Technology (RAIT '12), pp. 28–32, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  30. C. I. Podilchuk and E. J. Delp, “Digital watermarking: algorithm and application,” IEEE Signal Processing Magazine, vol. 18, no. 4, pp. 33–46, 2001. View at Publisher · View at Google Scholar · View at Scopus
  31. M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia data-embedding and watermarking technologies,” Proceedings of the IEEE, vol. 86, no. 6, pp. 1064–1087, 1998. View at Publisher · View at Google Scholar · View at Scopus
  32. Unicode Character Table, http://unicode-table.com/en/.
  33. O. Tayan, Y. Alginahi, and M. N. Kabir, “An adaptive zero-watermarking approach for authentication and protection of sensitive text documents,” in Proceedings of the International Conference on Advances in Computer and Information Technology (ACIT '13), May 2013.
  34. Z. Jalil, A. M. Mirza, and H. Jabeen, “Word length based zero-watermarking algorithm for tamper detection in text documents,” in Proceeding of the 2nd International Conference on Computer Engineering and Technology (ICCET '10), vol. 6, pp. V6-378–V6-382, Chengdu, China, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  35. Y. Meng, T. Guo, Z. Guo, and L. Gao, “Chinese text zero-watermark based on sentence's entropy,” in Proceedings of the International Conference on Multimedia Technology (ICMT '10), October 2010. View at Publisher · View at Google Scholar · View at Scopus
  36. O. Tayan, Y. Alginahi, and M. N. Kabir, “Performance assessment of zero-watermarking techniques for online arabic textual-content,” Life Science Journal, 2013. View at Google Scholar