A review and open issues of diverse text watermarking techniques in spatial domain

Nowadays, information hiding is becoming a helpful technique and fetches more attention due to the fast growth of using the internet; it is applied for sending secret information by using different techniques. Watermarking is one of major important technique in information hiding. Watermarking is of...

Full description

Saved in:
Bibliographic Details
Main Authors: Alwan, Ali A., M. A., Shahidan, Sjarif, Nilam Nur Amir, Hashim, Mohammed Mahdi, Mohd. Rahim, Mohd. Shafry
Format: Article
Language:English
Published: JATIT & LLS 2018
Subjects:
Online Access:http://eprints.utm.my/id/eprint/85621/1/AliAAlwan2018_AReviewAndOpenIssuesOfDiverseText.pdf
http://eprints.utm.my/id/eprint/85621/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Nowadays, information hiding is becoming a helpful technique and fetches more attention due to the fast growth of using the internet; it is applied for sending secret information by using different techniques. Watermarking is one of major important technique in information hiding. Watermarking is of hiding secret data into a carrier media to provide the privacy and integrity of information so that no one can recognize and detect it's accepted the sender and receiver. In watermarking, many various carrier formats can be used such as an image, video, audio, and text. The text is most popular used as a carrier files due to its frequency on the internet. There are many techniques variables for the text watermarking; each one has its own robust and susceptible points. In this study, we conducted a review of text watermarking in the spatial domain to explore the term text watermarking by reviewing, collecting, synthesizing and analyze the challenges of different studies which related to this area published from 2013 to 2018. The aims of this paper are to provide an overview of text watermarking and comparison between approved studies as discussed according to the Arabic text characters, payload capacity, Imperceptibility, authentication, and embedding technique to open important research issues in the future work to obtain a robust method.