Skip to main content
Log in

Advancing Partial Verification of Watermarking for Arabic Text via Utilization of Innovative Counting-Based Secret Sharing

  • Research Article-Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

Digital watermarking may be utilized to identify illicit usage of text as a means to protect its copyright. This research proposes an advanced watermarking method for Arabic text that supports slight verification through the innovative utilization of counting-based secret sharing. The results of the suggested method are compared with several other existing watermarking techniques using applicable tests conducted across identical Arabic benchmarks of the standard Imam Nawawi’s Forty Hadiths, as shown to be favorable in terms of speed, capacity, and security. The research further tested its resilience against the majority of conceivable manipulating text assaults showing our anticipated method to be impervious to electronic text attacks. Interestingly, this approach is not limited to Arabic language script only, as it is applicable to any related text-structure such as Urdu and Farsi writings. The work suggests attractive research contributions and exciting findings pointing the way forward to future specific and smart watermarking enhancements.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26

Similar content being viewed by others

Data Availability

Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Jalil, Z.; Mirza, A.: A review of digital watermarking techniques for text document. In: International Conference on Information and Multimedia Technology (2009)

  2. Gutub, A.: Enhancing cryptography of grayscale images via resilience randomization flexibility. Int. J. Inform. Secur. Priv. (IJISP), in press (2022). https://doi.org/10.4018/IJISP.307071

  3. Sufi, F.; Alsulami, M.; Gutub, A.: Automating global threat-maps generation via advancements of news sensors and AI, Arab. J. Sci. Eng. (AJSE), in press (2022). https://doi.org/10.1007/s13369-022-07250-1

  4. Gutub, A.; Al-Alwani, W.; Bin-Mahfoodh, A.: Improved method of arabic text steganography using the extension 'Kashida' character, Bahria Univ. J. Inform. Commun. Technol. (BUJICT), 3(1): 68–72, (2010). http://ojs.bahria.edu.pk/index.php/bujict/article/view/33.

  5. Gutub, A.: Dynamic smart random preference for higher medical image confidentiality. J. Eng. Res. (JER), in press (2022) https://doi.org/10.36909/jer.17853

  6. Al-Juaid, N.; Gutub, A.; Khan, E.: Enhancing PC data security via combining RSA cryptography and video based steganography. J. Inform. Secur. Cybercrimes Res. 1(1):5–13, (2018). https://doi.org/10.26735/16587790.2018.006

  7. Al-Ghamdi, M.; Al-Ghamdi, M.; Gutub, A.: Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimedia Tools Appl. 78(12), 16283–16310 (2019). https://doi.org/10.1007/s11042-018-6977-2

    Article  Google Scholar 

  8. Gutub, A.; AlKhodaidi, T.: Smart expansion of target key for more handlers to access multimedia counting-based secret sharing. Multimedia Tools Appl. 79(25–26), 17373–17401 (2020). https://doi.org/10.1007/s11042-020-08695-y

    Article  Google Scholar 

  9. Gutub, A.; Fattani, M.: A novel arabic text steganography method using letter points and extensions. Int. J. Comput. Electric. Automation Control Inform. Eng. 1(3), 502–505 (2007). https://doi.org/10.5281/zenodo.1061621

    Article  Google Scholar 

  10. Alginahi, Y.; Kabir, M.; Tayan, O.: An enhanced Kashida-based watermarking approach for Arabic text documents. In: International Conference on Electronics, Computer and Computation, ICECCO, pp 301–304, Turkey, (2013)

  11. Alotaibi, R.; Elrefaei, L.: Utilizing word space with pointed and un-pointed letters for arabic text watermarking. In: Proceedings of the 18th UKSim-AMSS International Conference on Computer Modelling and Simulation, UKSim, pp. 111–116, (2016)

  12. Ahmadoh, E.; Gutub, A.: Utilization of two diacritics for arabic text steganography to enhance performance. Lect. Notes Inform. Theory 3(1), 42–47 (2015). https://doi.org/10.18178/lnit.3.1.42-47

    Article  Google Scholar 

  13. Alginahi, Y.: A survey on arabic character segmentation. Int. J. Document Anal. Recognit. (IJDAR). 16(2), 105–126 (2012). https://doi.org/10.1007/s10032-012-0188-6

    Article  Google Scholar 

  14. Aabed, M.; Awaideh, S.; Elshafei, A.; Gutub, A.: Arabic diacritics based steganography. In: IEEE International Conference on Signal Processing and Communications (ICSPC), pp. 756–759, Dubai, UAE, 24–27 November (2007). https://doi.org/10.1109/ICSPC.2007.4728429

  15. Shamir, A.: How to share a secret. Commun. ACM 2(11), 612 (1979). https://doi.org/10.1145/359168.359176

    Article  MathSciNet  MATH  Google Scholar 

  16. Agarwal, M.: Text steganographic approaches: a comparison. Int. J. Netw. Secur. Appl. 5(1), 91–106 (2013). https://doi.org/10.5121/ijnsa.2013.5107

    Article  MathSciNet  Google Scholar 

  17. Al-Nofaie, S.; Fattani, M.; Gutub, A.: Merging two steganography techniques adjusted to improve arabic text data security. J. Comput. Sci. Comput. Math. (JCSCM) 6(3), 59–65 (2016). https://doi.org/10.20967/jcscm.2016.03.004

    Article  Google Scholar 

  18. Gutub, A.: Pixel indicator technique for RGB image steganography. J. Emerg. Technol. Web Intell. (JETWI) 2(1), 56–64 (2010). https://doi.org/10.4304/jetwi.2.1.56-64

    Article  Google Scholar 

  19. Al-Nofaie, S.; Gutub, A.; Al-Ghamdi, M.: Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. J. King Saud Univ. Comput. Inform. Sci. 33(8), 963–974 (2021). https://doi.org/10.1016/j.jksuci.2019.06.010

    Article  Google Scholar 

  20. Al-Nofaie, S.; Fattani, M.; Gutub, A.: Capacity improved arabic text steganography technique utilizing ‘kashida’ with whitespaces, The 3rd International Conference on Mathematical Sciences and Computer Engineering (ICMSCE2016), pp. 38–44, Langkawi, Malaysia, February (2016)

  21. Blakley, G.: Safeguarding cryptographic keys. Managing Requirements Knowledge”, International Workshop On (AFIPS). 48, pp. 313–31, (1979)

  22. Tasa, T.: Hierarchical threshold secret sharing. J. Cryptol. 20(2): 237–264, (2007) Available: https://doi.org/10.1007/s00145-006-0334-8

  23. Gutub, A.; Al-Juaid, N.; Khan, E.: Counting-based secret sharing technique for multimedia applications. Multimedia Tools Appl. (MTAP) 78(5), 5591–5619 (2019). https://doi.org/10.1007/s11042-017-5293-6

    Article  Google Scholar 

  24. Alaseri, K.; Gutub, A.: Merging secret sharing within Arabic text steganography for practical retrieval. J. Comput. Sci. Eng. (IJRDO) 4(9), 1–17 (2018)

    Google Scholar 

  25. Gutub, A.; Alaseri, K.: hiding shares of counting-based secret sharing via Arabic text steganography for personal usage. Arab. J. Sci. Eng. (AJSE) 45(4), 2433–2458 (2020). https://doi.org/10.1007/s13369-019-04010-6

    Article  Google Scholar 

  26. Gutub, A.; Ghouti, L.; Amin, A.; Alkharobi, T.; Ibrahim, M.K.: Utilizing extension character ‘kashida’ with pointed letters for Arabic text digital watermarking, Int. Conf. Secur. Cryptograp. SECRYPT, pp. 329–332, Barcelona, Spain, 28–31 (2007) https://doi.org/10.5220/0002116903290332

  27. Sharma, M.; Gupta, P.: A comparative study of steganography and watermarking Int. J. Res. IT Manag. 2(2), (2012)

  28. Gutub, A.; Al-Haidari, F.; Al-Kahsah, K.; Hamodi, J.: e-text watermarking: utilizing “kashida” extensions in Arabic language electronic writing. J. Emerg. Technol. Web Intell. (JETWI) 2(1), 48–55 (2010). https://doi.org/10.4304/jetwi.2.1.48-55

    Article  Google Scholar 

  29. Thabit, R.; Udzir, N.I.; Yasin, S.M.; Asmawi, A.; Gutub, A.: CSNTSteg: color spacing normalization text steganography model to improve capacity and invisibility of hidden data. IEEE Access 10, 65439–65458 (2022). https://doi.org/10.1109/ACCESS.2022.3182712

    Article  Google Scholar 

  30. Almehmadi, E.; Gutub, A.: Novel Arabic e-text watermarking supporting partial dishonesty based on counting-based secret sharing. Arab. J. Sci. Eng. 47(2), 2585–2609 (2022). https://doi.org/10.1007/s13369-021-06200-7

    Article  Google Scholar 

  31. Alotaibi, R.A.; Elrefaei, L.A.: Arabic text watermarking: a review. Int. J. Artif. Intell. Appl. 6(4), 01–16 (2015)

    Google Scholar 

  32. Gutub, A.: Watermarking images via counting-based secret sharing for lightweight semi-complete authentication, Int. J. Information Secur. Priv. (IJISP) 16(1), in press (2022) https://doi.org/10.4018/IJISP.2022010118

  33. Gutub, A.: Adopting counting-based secret-sharing for e-Video watermarking allowing fractional invalidation. Multimedia Tools Appl. (MTAP) 81(7), 9527–9547 (2022). https://doi.org/10.1007/s11042-022-12062-4

    Article  Google Scholar 

  34. Gutub, A.: Regulating watermarking semi-authentication of multimedia audio via counting-based secret sharing, Pamukkale Univ. J. Eng. Sci. in press (2022) https://doi.org/10.5505/pajes.2021.54837

  35. Gutub, A.: Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing, CAAI Transactions on Intelligence Technology, IET (IEE)-Wiley, in press (2022) https://doi.org/10.1049/cit2.12093

  36. Singh, A.; Satapathy, S.; Roy, A.; Gutub, A.: AI based mobile edge computing for IoT: applications, challenges, and future scope, Arab. J. Sci. Eng. (AJSE), in press (2022). https://doi.org/10.1007/s13369-021-06348-2

  37. Gutub, A.: Integrity verification of Holy Quran verses recitation via incomplete watermarking authentication. Int J Speech Technol, in press (2022). https://doi.org/10.1007/s10772-022-09999-0

  38. Gutub, A.; Al-Ghamdi, M.: Image based steganography to facilitate improving counting-based secret sharing. 3D Res. (2019). https://doi.org/10.1007/s13319-019-0216-0

    Article  Google Scholar 

  39. Sahu, A.K.; Gutub, A.: Improving grayscale steganography to protect personal information disclosure within hotel services. Multimedia Tools Appl. (2022). https://doi.org/10.1007/s11042-022-13015-7

    Article  Google Scholar 

  40. Cox, I.; Miller, M.L.; Bloom, J.; Fridrich, J.; Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers, Burlington, MA, USA (2007)

    Google Scholar 

  41. Hakak, S.; Kamsin, A.; Tayan, O.; Idris, M.Y.I.; Gilkar, G.A.: Approaches for preserving content integrity of sensitive online Arabic content: a survey and research challenges. Inf. Process. Manag. 56, 367–380 (2017)

    Article  Google Scholar 

  42. Aman, M.; Khan, A.; Ahmad, B.; Kouser, S.: A hybrid text steganography approach utilizing unicode space characters and zero-width character. Int. J. Inf. Technol. Secur. 9, 85–100 (2017)

    Google Scholar 

  43. Al-Otaibi, N.; Gutub, A.: 2-leyer security system for hiding sensitive text data on personal computers. Lect. Notes Information Theory 2(2), 151–157 (2014). https://doi.org/10.12720/lnit.2.2.151-157

    Article  Google Scholar 

  44. Shambour, M.K.; Gutub, A., Personal privacy evaluation of smart devices applications serving Hajj and Umrah rituals, J. Eng. Res. (JER), in press (2021). https://doi.org/10.36909/jer.13199

  45. Kheshaifaty, N.; Gutub, A.: Engineering graphical captcha and AES crypto hash functions for secure online authentication, J. Eng. Res. (JER), in press (2021). https://doi.org/10.36909/jer.13761

  46. Gutub, A.; Al-Qurashi, A.: Secure shares generation via M-Blocks partitioning for counting-based secret sharing. J. Eng. Res. (JER) 8(3), 91–117 (2020). https://doi.org/10.36909/jer.v8i3.8079

    Article  Google Scholar 

  47. Shambour, M.K.; Gutub, A.: Progress of IoT research technologies and applications serving Hajj and Umrah. Arab. J. Sci. Eng. (AJSE) 47(2), 1253–1273 (2022). https://doi.org/10.1007/s13369-021-05838-7

    Article  Google Scholar 

  48. Shambour, M.K.; Gutub, A.: The impact of corona disease on the feelings of Twitter users in the two holy cities during the Hajj season of 1442 AH”, Umm Al-Qura University Hajj Forum, pp. 254–265, Madinah, Saudi Arabia, 9–10 March (2022) http://drive.uqu.edu.sa/up/profile/Books/4310001/book_path_FeMAOaNgOR.pdf

  49. Abu-Hashem, M.; Gutub, A.: Efficient computation of Hash Hirschberg protein alignment utilizing hyper threading multi-core sharing technology, CAAI Transactions on Intelligence Technology, in press (2021‏). https://doi.org/10.1049/cit2.12070

  50. Gutub, A.; Almehmadi, E.: Arabic text watermarking tuned for medical e-record semi-authentication. Journal of Engineering Research (JER), in press (2022). https://doi.org/10.36909/jer.18943

Download references

Acknowledgements

Thanks to Umm Al-Qura University (UQU) for supporting this research. Special thanks to the Computer Engineering Department and the Master graduate studies program for motivating this contribution.

Funding

There is no funding source.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adnan Gutub.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Consent for Publication

We declare that this work is original as part of Master Thesis work research conducted at Umm Al-Qura University.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed Consent

Informed consent was obtained from all individual participants included in the study.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gutub, A., Almehmadi, E. Advancing Partial Verification of Watermarking for Arabic Text via Utilization of Innovative Counting-Based Secret Sharing. Arab J Sci Eng 48, 9963–9989 (2023). https://doi.org/10.1007/s13369-022-07387-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-022-07387-z

Keywords

Navigation