Concise analysis of current text automation and watermarking approaches

@article{Alkawaz2016ConciseAO,
  title={Concise analysis of current text automation and watermarking approaches},
  author={Mohammed Hazim Alkawaz and Ghazali Sulong and Tanzila Saba and Abdulaziz S. Almazyad and Amjad Rehman},
  journal={Security and Communication Networks},
  year={2016},
  volume={9},
  pages={6365-6378}
}
With ceaseless utilization of web and other online advances, it has turned out to be amazingly simple to imitate, discuss, and convey digital material. Subsequently, confirmation and copyright assurance issues have been emerged. Text is the most widely used media of communication on the web as compared with images and videos. The significant part of books, daily papers, websites, commercial, research papers, reports, and numerous different archives are just the plain text. Therefore, copyrights… CONTINUE READING

Figures and Topics from this paper.

Explore Further: Topics Discussed in This Paper

Citations

Publications citing this paper.
SHOWING 1-3 OF 3 CITATIONS

A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

  • Security and Communication Networks
  • 2018
VIEW 10 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

On the development of a web extension for text authentication on Google Chrome

  • 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE)
  • 2019
VIEW 3 EXCERPTS
CITES BACKGROUND

Design and Implement SumoBot for Classroom Teaching

  • 2018 IEEE Conference on Systems, Process and Control (ICSPC)
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 98 REFERENCES

Machine aided malaria parasitemia detection in Giemsa-stained thin blood smears

  • Neural Computing and Applications
  • 2016
VIEW 10 EXCERPTS
HIGHLY INFLUENTIAL

Performance comparison of two text marking methods

  • IEEE Journal on Selected Areas in Communications
  • 1998
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Some general methods for tampering with watermarks

  • IEEE Journal on Selected Areas in Communications
  • 1997
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

1029–1044

Saba T. Evaluation of artificial intelligent techniques Rehman A, 424
  • doi. 10.1007/s10462-012-9372-9. Current text automation and watermarking M. H. Alkawaz et al. Security Comm. Networks
  • 2017

1181–1196

Low S Maxemchuk NF. Copyright protection for the elect Brassil JT, 877
  • Current text automation and watermarking M. H. Alkawaz et al. Security Comm. Networks
  • 2017
VIEW 1 EXCERPT

Multifocus watermarking approach Current text automation and watermarking

SR Waheed, MH Alkawaz, A Rehman, AS Almazyad, T. Saba
  • Security Comm. Networks
  • 2017
VIEW 1 EXCERPT

Resolving rightful ownerships with invisible watermarking Current text automation and watermarking

S Craver, N Memon, BL Yeo, MM. Yeung
  • M. H. Alkawaz et al. Security Comm. Networks
  • 2017

Similar Papers

Loading similar papers…