Sie sind auf Seite 1von 8

(IJCNS) International Journal of Computer and Network Security, 97

Vol. 2, No. 10, 2010

Hybrid Portable Document Format Protection


Scheme based on Public key and Digital
Watermarking
Karim Shamekh1, Ashraf Darwish2 and Mohamed Kouta3
1
Computer Science Department, High Technology Institute, 10th of Ramadan, Egypt,
Karim_Shamekh@hotmail.com
2
Computer Science Department, Faculty of Science, Helwan University, Cairo, Egypt
amodarwish@yahoo.com
3
Arab Academy for Science, Technology and Maritime, Cairo, Egypt
mmkouta@hotmail.com

Abstract: Portable Document Format (PDF) developed by and operating system. Each PDF file contains a complete
Adobe Systems Inc. is a flexible and popular document description of a 2-D document, which includes text, fonts,
distribution and delivery file format, and it is supported within images, and vector graphics described by a context-free
various operating systems and devices. The ease of reproduction, grammar modified from PostScript. Many PDF readers are
distribution, and manipulation of digital documents creates available for use to read PDF files; each PDF file appears in
problems for authorized parties that wish to prevent illegal use the window of a PDF reader as an image-like document.
of such documents. To this end, digital watermarking has been The main advantage of the PDF format is that it allows
proposed as a last line of defence to protect PDF files copyright documents created within any desktop publishing package to
through visible watermarks in such files. As well as, to preserve
be viewed in the original typeset design, regardless of the
the integrity of the digital watermark, an asymmetric
cryptographic algorithm (DES) is employed. The proposed
systems where it is being displayed. Documents with texts,
watermarking method does not change the values of the stored images, hyper-links and other desirable features in
data objects. Experimental results show the feasibility of the document authoring, can be easily created with the packages
proposed method and provide a detailed security analysis and distributed by Adobe or with any other authoring application
performance evaluation to show that the digital watermarking is (e.g., Microsoft Office, OpenOffice, LaTeX, etc.) and then
robust and can withstand various types of attacks. converted to the PDF format. The result is an easy to
Keywords: Portable Document Format (PDF), Watermarking distribute, small size document, that will be displayed
(WM), Data Encryption Standard (DES), Copyright protection, exactly in the way it was created, on any platform and using
Cryptosystems. any viewer application.
Besides being very flexible and portable, PDF documents are
1. Introduction also considered to be secure. Popular document formats like
Microsoft Compound Document File Format (MCDFF) have
The number of files that are published and exchanged
been proven to have security flaws that can leak private user
through the Internet is constantly growing and electronic
information(see Castiglione et al.(2007)[6]), while PDF
document exchange is becoming more and more popular documents are widely regarded as immune to such
among Internet users. The diversity of platforms, formats problems. This is one of the reasons why many
and applications has called for a common technology to governmental and educational institutions have chosen PDF
overcome those differences and produce universally readable as their official document standard. In this paper, we will
documents to be exchanged without limitations. Even start giving a concise overview of the PDF format, focusing
though it is supported by nearly every application on any on how data is stored and managed.
machine, plain text ASCII has failed to become popular Digital watermarking is a relatively new research area that
because it does not allow text formatting, image embedding attracted the interest of numerous researchers both in the
and other features that are required to an efficient academia and the industry and became one of the hottest
communication. Portable Document Format (PDF) files [1] research topics in the multimedia signal processing
are popular nowadays, and so using them as carriers of community. Although the term watermarking has slightly
secret messages for covert communication is convenient. different meanings in the literature, one definition that
Though there are some techniques of embedding data in text seems to prevail is the following [7]: Watermarking is the
files [2-4], studies of using PDF files as cover media are practice of imperceptibly altering a piece of data in order to
embed information about the data. The above definition
very few, except Zhong et al. [5] in which integer numerals
reveals two important characteristics of watermarking. First,
specifying the positions of the text characters in a PDF file
information embedding should not cause perceptible
are used to embed secret data. In this paper a new algorithm
changes to the host medium (sometimes called cover
for PDF documents protection has been presented. medium or cover data). Second, the message should be
The PDF, created by Adobe Systems for document exchange related to the host medium. In this sense, the watermarking
[1], is a fixed-layout format for representing documents in a techniques form a subset of information hiding techniques.
manner independent of the application software, hardware, However, certain authors use the term watermarking with a
98 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 10, 2010

meaning equivalent to that of information hiding in the 2. Related Work


general sense.
Digital media are replacing traditional analog media and Information about the Portable Document Format can be
will continue to do so. By digital media, we mean digital found in [10]. Those documents are the main source of
representations of audio, text documents, images, video, information on how PDF documents are structured and
three-dimensional scenes, etc. These media offer many managed by various PDF compliant applications.
benefits over their analog predecessors (e.g., audio and Even though information leakage in published documents is
video cassettes). Unlike analog media, digital media can be a well known issue, only a few publications investigate the
stored, duplicated, and distributed with no loss of fidelity. problem. Byers (Byers, 2004 [11]) showed how hidden text
Digital media can also be manipulated and modified easily. can be extracted from
Clearly, digital media offer many benefits, but they also MicrosoftWorddocuments.Hecollectedover100,000
create problems for parties who wish to prevent illegal documents and compared the text that appears when each
reproduction and distribution of valuable digital media (e.g., document is opened with Microsoft Word, with the text
copyrighted, commercial, privileged, sensitive, and/or secret extracted from the same documents using widely known text
documents).Two classic methods for protecting documents extraction tools Almost each processed document had some
are encryption and copy protection. However, once hidden contents like previously deleted texts, revisions, etc.
decrypted, a document can be copied and distributed easily, Castiglione et al.(2007)[6] conducted a more extensive study
and copy-protection mechanisms can often be bypassed. As on the popular document format, investigating the way
a safeguard against failures of encryption and copy Microsoft Compound documents are created and structured.
protection, digital watermarking has been proposed as a last The same authors developed some tools to extract document
line of defence against unauthorized distribution of valuable hidden meta data as well as sensitive publisher information
digital media. and show how to use the slack space responsible of such
This paper provides insight for some of the security issues threat as a steganographic means.
within the use of digital watermarking and its integrity with Several companies and institutions have distributed
cryptographic algorithm (DES). guidelines to avoid information leakage in published
The remainder of this paper is as follows. Section 2 surveys documents after that the media reported news about
related works while Section 3 analyzes the portable documents published on the Web containing sensitive
document files (PDF) format. Section 4 reviews the digital information which were not supposed to become public. For
watermarking and cryptographic systems. Section 5 example, in May 2005 the Coalition Provisional Authority
introduces the proposed scheme, experimental results and in Iraq published a PDF document on the “Sgrena-Calipari
analysis. Conclusion and future work are given in section 6. Incident”. Black boxes were used to conceal the names of
some people involved in the incident, but all of them were
1.1Copyright Protection easily revealed copying the text from the original document
The main requirements for copyright-protection into a text editor [12]. Several papers discuss the PDF
watermarking algorithms are robustness (denoting how the structure [13, 14] and some of them introduce tools for
watermark can survive any kind of malicious or content extraction from PDF documents [15] or tools to use
unintentional transformations), visibility (does the PDF documents as a steganographic means [16].
watermark introduce perceptible artifacts), and capacity (the
amount of information which can be reliably hidden and 3. The Portable Document Format (PDF)
extracted from the document). For copyright applications,
robustness should be as high as possible, and visibility as This section will give a brief over view of the PDF format,
low as possible in order to preserve the value of the marked highlighting the parts that are relevant to our work. The
document. Note, however, that capacity can be low since Portable Document Format is based on the PostScript
copyright information generally requires a rather small (Adobe Systems Inc., 1999) page description language and
amount of information, which can be an index inside a has been introduced to improve performances and provide
database holding copyright information. Other requirements some form of user interactivity. A PDF document consists of
can be outlined, which are: security (from the cryptographic a collection of objects which together describe the
point of view), and that the scheme should be oblivious (the appearance of the document pages. Objects and structural
original or cover image is not needed for the extraction information are all encoded in a single, self contained,
process). Many robust watermarking schemes have been sequence of bytes.
proposed, consisting in either spatial domain or transform The structure of a PDF file has four main components:
domain watermarks. The main issue addressed for these • A header identifying the version of the PDF
schemes these last years is the robustness of watermarks specification to which the file complies. The file
against various intentional or unintentional alterations, header contains a five character magic number,
degradations, geometrical distortions or media-conversion ‘‘%PDF-’’, and a version number in the form 1.x
which can be applied to the watermarked image. The four where x is a digit between 0 and 7, as shown in
main issues of the state-of-the-art watermark robustness are Table 1.
described in more details in [8, 9]. • One or more body sections containing the objects
that constitute the document as it appears to the
user;
(IJCNS) International Journal of Computer and Network Security, 99
Vol. 2, No. 10, 2010

• One or more cross-reference tables storing (xref) followed by the object number of the first object that
information and pointers to objects stored in the has an entry in that section and the number of its entries.
file; Table 2 shows a section with entries of 36 objects, from
• One or more trailers that provide the location of object 0 to object 35. Each entry provides the following
the cross-reference tables in the file. information:
• The object offset in the file;
Table 1: PDF file header For version 1.7 document • The object generation number;
Header Version • The free/in-use flag with value n if the object is in use or ƒ
if the object is free, that is, if the object has been deleted.
%PDF- 1.7
Object 0 is a special object and it is always marked as free,
with generation number 65535. The latest document
(trailer) is stored at the end of the file and points to the last
A newly created PDF document has only one body section, section of the cross-reference table. A PDF document is
one cross-reference table and one trailer. When a document always read from the end (apart when generated with the
is modified, its previous version is not updated, but any “Fast Web View ”flag enabled),looking for the offset
changes and new contents are appended to the end of file, relative to the last section of the cross-reference table,
adding a new body section, a new section of the cross- required to identify the objects that constitute the latest
reference table and a new trailer. The incremental update version of the document. Each time the document is
avoids rewriting the whole file, resulting in a faster saving updated–adding new objects or modifying existing ones–a
process, especially when only small amendments are made new body, cross-reference table section and trailer are
to very large files. Objects stored in the body section have an appended to the file. The body section will contain the
object number used to unambiguously identify the object newly created objects or the updated version of the existing
within the file, anon-zero generation number and a list of ones, the cross-reference table section will store information
key-value pairs enclosed between the keywords (obj) and to retrieve those objects, while the trailer will have a
endobj. Generation numbers are used only when object reference to the newly created cross-reference table section,
numbers are reused, that is, when the object number as well as a pointer to the previous one.
previously assigned to an object that has been deleted is
assigned to a new one. Due to incremental updates, 4. Digital Watermarking and Cryptosystems:
whenever an object is modified, a copy of the object with the basics and overview
latest changes is stored in the file. The newly created copy
will have the same object number as the previous one. Thus, 4.1 Digital watermarking
several copies of an object can be stored in the file, each one Digital watermarking requires elements from many
reflecting the modifications made to that object from the disciplines, including signal processing,
time it was created, onwards. telecommunications, cryptography, psychophysics, and law.
The cross-reference table is composed of several sections In this paper, we focus on the process of protecting PDF
and allows random access to file objects. When a document documents.
is created, the cross-reference table has only one section and An effective watermark should have several properties,
new sections are added every time the file is updated. Each listed below, whose importance will vary depending upon
section contains one entry per object, for a contiguous the application.
number of objects. • Robustness
The watermark should be reliably detectable after alterations
Table 2: An example of cross-reference table to the marked document. Robustness means that it must be
xref difficult (ideally impossible) to defeat a watermark without
0 36 degrading the marked document severely-so severely that
0000000000 65535 f the document is no longer useful or has no (commercial)
0000076327 00000 n value.
0000076478 00000 n • Imperceptibility or a low degree of obtrusiveness
0000076624 00000 n To preserve the quality of the marked document, the
0000078478 00000 n watermark should not noticeably distort the original
document. Ideally, the original and marked documents
0000078629 00000 n
should be perceptually identical.
0000078775 00000 n
• Security
0000078488 00000 n Unauthorized parties should not be able to read or alter the
0000078639 00000 n watermark. Ideally, the watermark should not even be
. detectable by unauthorized parties.
. • No reference to original document
. For some applications, it is necessary to recover the
0000100661 00000 n watermark without requiring the original, unmarked
An example of cross-reference table section is given in document (which would otherwise be stored in a secure
Table 2.As shown, each section starts with the keyword archive).
100 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 10, 2010

• Unambiguity scheme on their watermark insertion technique of [23] in


A watermark must convey unambiguous information about order to make the watermark more robust.
the rightful owner of a copyright, point of distribution, etc. Hu and Kwong [24, 25] implemented an adaptive visible
Of these properties, robustness, imperceptibility, and watermarking in the wavelet domain by using the truncated
security are usually the most important. When speaking of Gaussian function to approximate the effect of luminance
robustness, we often talk about attacks on a watermark. An masking for the image fusion. Based on image features, they
attack is an operation on the marked document that, first classify the host and watermark image pixels into
intentionally or not, may degrade the watermark and make different perceptual classes.
the watermark harder to detect. For text documents, an Then, they use the classification information to guide the
attack might consist of photocopying. pixelwise watermark embedding. In high-pass subbands,
they focus on image features, while in the low-pass subband,
4.2. Visible watermarking
they use truncated Gaussian function to approximate the
Visible watermarking techniques are used to protect the effect of luminance masking. Yong et al. [26] also proposed
copyright of digital multimedia (audio, image or video) that a translucent digital watermark in the DWT domain and
have to be delivered for certain purposes, such as digital used the error-correct code to improve the ability of anti-
multimedia used in exhibition, digital library, advertisement attacks.
or distant learning web, while illegal duplication is Each of the above schemes wasn’t devoted to better feature
forbidden. Braudaway et al. [17] proposed one of the early based classification and the use of sophisticated visual
approaches for visible watermarking by formulating the masking models, so Huang and Tang [27] presented a
nonlinear equation to accomplish the luminance alteration contrast sensitive visible watermarking scheme with the
in spatial domain. In this scheme, dimensions of the assistance of HVS. They first compute the CSF mask of the
watermark image are equal to those of the host image. There discrete wavelet transform domain.
is a one-to-one correspondence between pixel locations in Secondly, they use a square function to determine the mask
the watermark image and those in the host image. weights for each subband. Thirdly, they adjust the scaling
According to their brightness, pixels in the watermark and embedding factors based on the block classification with
image can be divided into transparent and non-transparent the texture sensitivity of the HVS. However, their scheme
categories. The brightness of each pixel in the host image in should further consider the following issues:
proportion to the non-transparent regions of the watermark • The basis function of the wavelet transform plays an
will be increased or reduced to a perceptually equal amount important role during the application of CSF for
by using a nonlinear equation while the brightness of each the HVS in the wavelet transform domain, but the
pixel in proportion to the transparent regions of the study [27] didn’t consider this key factor.
watermark will remain the same after watermark • The embedding factors emphasize too much weight
embedding. on the low frequency domain, rather than equal
Meng and Chang [18] applied the stochastic approximation emphasis on the medium to high frequency
for Braudaway’s method in the discrete cosine transform domains.
(DCT) domain by adding visible watermarks in the video • The interrelationship of block classification and the
sequences. Mohanty et al. [19] proposed a watermarking characteristics of the embedding location should be
technique called dual watermarking which combines a further analysed.
visible watermark and an invisible watermark in the spatial For the first issue, the direct application of CSF for the HVS
domain. The visible watermark is adopted to establish the in the wavelet transform domain needs to be further studied
owner’s right to the image and invisible watermark is [28–32] while the basis function of the wavelet
utilized to check the intentional and unintentional transformation is a critical factor affecting the visibility of
tampering of the image. Chen [20] has proposed a visible the noise in the DWT domain.
watermarking mechanism to embed a gray level watermark For the second issue, the watermark embedding in the low
into the host image based on a statistic approach. First, the frequency components results in high degradation of the
host image is divided into equal blocks and the standard image fidelity.
deviation in each block is calculated. How to get the best trade-off between the visibility of the
The standard deviation value will determine the amount of watermark and the capability of resistance for removal still
gray value of the pixel in the watermark to be embedded needs to be further justified. For the third issue, the plane,
into the corresponding host image. Kankanhalli et al. [21] edge and texture block classification in the study [27] is a
proposed a visible watermarking algorithm in the discrete genuine approach.
cosine transform (DCT) domain. First, the host image and However, the local and global characteristics of wavelet
the watermark image are divided into 8 x8 blocks. coefficients should be carefully considered, and the content
Next, they classify each block into one of eight classes adaptive approach is necessary for making the optimal
depending on the sensitivity of the block to distortion and decision.
adopt the effect of luminance to make a final correction on
the block scaling factors. 4.3. DES (Data Encryption Standard)
The strength of the watermark is added in varying Data security research attracted a lot of interest in the
proportions depending on the class to which the image block research community in areas like databases [33], data
belongs. Mohanty et al. [22] proposed a modification mining [34], and Internet transaction [35, 36].
(IJCNS) International Journal of Computer and Network Security, 101
Vol. 2, No. 10, 2010

The DES algorithm is the most widely known block cipher KPDF document belong to him. Software programs consist
in the world and even today, is resistant to most of practical of two major entities: KPDF creator and KPDF viewer.
attacks. It was created by IBM and defined in 1977 as U.S. The KPDF creator as shown in (Fig.2) and the flowchart is
standard FIPS 46. It is a 64-bit block cipher with 56 bit keys shown in (Fig.3):
and 16 rounds. A round in DES is a substitution 1. Embedded digital watermark into PDF document
(confusion), followed by a permutation (diffusion). 2. Generate string of the header which contain the
For each 64-bit block of plaintext that DES processes, an publisher info and the parameters value (Expire date,
initial permutation is performed and the block is broken into Allow password, Allow print and Allow print screen)
two 32-bit halves, a left half ( Li ) and a right half ( Ri ) . then convert it into array of bytes then append last byte
that’s contain (Number of Header bytes)
The 16 rounds of substitutions and permutations, called
3. Read the work document (watermark included or not)
function f, are then performed. For each round, a DES round
into array of bytes then transposition the array of bytes
key ( K i ) of 48 bits and the current Ri are input into from Z to A into a new array of bytes
function f. The output of f is then XORed with the current 4. Create a new array of bytes that contain header bytes +
Li to give Ri +1 . The current Ri becomes Li +1 . After the 16 reverse bytes and one byte for the trailer which has
header length
rounds, the two halves are rejoined and a final permutation
5. To preserve the integrity of the digital watermark, an
is the last step. This process is shown in Fig.1
asymmetric cryptographic algorithm (DES) is
employed using public key hashed to create a unique
32 character (256-bit)
6. Write the all bytes into the KPDF document

(a)

Figure 1. The DES algorithm

In January 1999, a DES cracking contest was held by RSA


Data Security Inc. After only 22 hours and 15 minutes, the
DES encrypted message was cracked by an international
team consisting of a custom hardware DES cracking device
built by the Electronic Frontier Foundation (EFF) and a
group of distributed computing enthusiasts known as
distributed.net. The EFF hardware cost $250,000 U.S. to
design and build. Creating a second device would be much
cheaper. Distributed.net used the idle CPU time of the
members’ computers at no extra cost. With more money, a
DES cracking hardware device could be built to decrypt
messages within a small number of hours or even minutes.
(b)
In this paper we will use the DES algorithm to encrypt the Figure 2. (a) KPDF Creator without watermark Selection
PDF documents. (b) KPDF Creator with watermark Selection

5. The Proposed Scheme

5.1 Embed and encrypt PDF document


The goal is to protect the copyright of the PDF document
after releasing it. It is assumed that the owner published the
KPDF document and keeps the source of the PDF document
for himself. By showing the watermark and the owner
details, the owner can prove that copies of the released
102 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 10, 2010

• Embedded digital watermark into PDF documents


• Protect PDF documents by Encryption Key
• Distribute secure PDF documents that cannot be
copied
• Prevent Print screen
• Stop ALL screen capture software
• Password protect PDF documents
• Prevent printing of PDF documents
• Set an expiry date for PDF documents validated by
time server
• Prevent extraction of original images and resources
Figure 3. KPDF Creator flowchart
6. Conclusion AND FUTURE WORK
5.2. Decrypt document
The Portable Document Format is an almost universally
The KPDF viewer as shown in (Fig.4) and the flowchart is
supported file format. During the past sixteen years it has
shown in (Fig.5):
become a de facto standard for electronic document
1. Decrypt the KPDF document by the encryption key
distribution. Besides its portability, it provides its own
2. Get the last byte from the document that’s has the
security features such as encryption and digital signature
header byte length
and it is regarded as a secure document standard if com-
3. Convert the header array of bytes to a string of
pared to other popular document file formats.
publisher information and parameters value like exp
Portable Document Format is the most popular standard for
(Expire date, Allow password, Allow print and Allow
document exchange over the Internet .PDF files are
print screen)
supported on almost all platforms, from common general
4. Transposition the reverse array to its original form
purpose operating systems and web browsers to more exotic
then write the array into PDF document
platforms, such as mobile phones and printers.
5. Display the PDF document into PDF control into the
Such universal support is both a blessing and a burden. For
main viewer
example, without doubt it is a blessing for authors, who can
trust that a PDF document can be read practically anywhere
by anybody.
However, at the same time all of these machines share a
common surface that is exposed and can be exploited. Being
very complex to parse – the ISO standard document is over
700 pages long – it is also vulnerable as implementation
errors are likely to happen. This is clearly visible from the
vulnerability history of Adobe Reader, which is by no means
Adobe’s problem alone but concerns all other
implementations of PDF readers and writers as well.
Figure 4. KPDF Viewer
However, as
Adobe’s own Reader is likely to be the most common tool
for browsing PDF documents; it is also the one that is most
likely to be attacked.
We have presented a new method to digital watermarking of
PDF documents. Watermarking embeds ownership
information directly into the document, and it is proposed as
a ``last line of defense'' against unauthorized distribution of
digital media. Desirable properties of watermarks include
imperceptibility, robustness, and security. An application
showed how watermarking has been implemented for PDF
files with new algorithm. The success of these methods
encourages the development of more sophisticated
Figure 5 KPDF Viewer flowchart
watermarking algorithms as part of a larger system for
5.3. Discussion protecting valuable digital documents.
KPDF converts existing PDF files to copy protected format In this digital watermarking process the watermark is
where digital watermarking has been proposed as a last line protected from any attacks by both transposition cipher and
of defense to protect PDF files copyright through visible asymmetric cryptographic algorithm, other ciphers functions
watermarks in such files. As well as, to preserve the and asymmetric cryptographic algorithms should be
integrity of the digital watermark, an asymmetric evaluated for future study.
cryptographic algorithm (DES) is employed. The proposed A further study could be done to investigate how to make an
scheme shows that KPDF is generated by the software code online registration and request your PDF documents online.
for the following reasons:
(IJCNS) International Journal of Computer and Network Security, 103
Vol. 2, No. 10, 2010

References [15] Chao, H., Fan, J., 2004. Layout and Content Extraction
for PDF Documents. Lecture Notes in Computer
[1]Adobe Systems Incorporated, Portable Document Format Science LNCS 3163, 213–224.
Reference (space) Manual, version1.7,November2006, [16] Zhong, S., Cheng, X., Chen, T., 2007. Data hiding in a
/http://www.adobe.comS. kind of PDF texts for secret communication.
[2] W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques International Journal of Network Security 4 (1), 17–
for data hiding, IBM System Journal 35 (3, 4) 26.
(February 1996). [17] G.W. Braudaway, K.A. Magerlein, F.C. Mintzer,
[3] H.M. Meral, E. Sevinc, E. Unkar, B. Sankur, A.S. Protecting publicly available images with a visible
Ozsoy, T. Gungor, Syntactic tools for text image watermark, Proc. SPIE, Int. Conf. Electron.
watermarking, in: Proceedings of SPIE International Imaging 2659 (1996) 126–132.
Conference on Security, Steganography, and Water- [18] J. Meng, S.F. Chang, Embedding visible video
marking of Multimedia Contents, San Jose, CA, USA, watermarks in the compressed domain Proc, ICIP 1
January 29–February 1, 2007. (1998) 474–477.
[4] M. Topkara, U. Topkara, M.J. Atallah, Information [19] S.P. Mohanty, K.R. Ramakrishnan, M.S. Kankanhalli,
hiding through errors: a confusing approach, in: A dual watermarking technique for image, Proc. 7th
Proceedings of SPIE International Conference on ACM Int. Multimedia Conf. 2 (1999) 9–51.
Security, Steganography, and Watermarking of [20] P.M. Chen, A visible watermarking mechanism using a
Multimedia Contents, San Jose, CA, USA, January statistic approach, Proc. 5th Int. Conf. Signal Process.
29–February 1, 2007. 2 (2000) 910–913.
[5] S. Zhong, X. Cheng, T. Chen, Data hiding in a kind of [21] M.S. Kankanhalli, R. Lil, R. Ramakrishnan, Adaptive
PDF texts for secret communication, International visible watermarking of images, Proc. IEEE Int’l
Journal of Network Security 4 (1) (January 2007) 17– Conf. Multimedia Comput. Syst. (1999) 68–73.
26. [22] S.P. Mohanty, M.S. Kankanhalli, R. Ramakrishnan, A
[6]Castiglione, A., De Santis, A., Soriente, C., 2007. Taking DCT domain visible watermarking technique for
advantages of a disadvan- tage: digital forensics and image, Proc. IEEE Int. Conf Multimedia Expo 20
steganography using document metadata. Journal of (2000) 1029–1032.
Systems and Software, Elsevier 80, 750–764. [23] S.P. Mohanty, K.R. Ramakrishnan, M.S. Kankanhalli,
[7] Brassil, J., Low, S., Maxemchuk, N. and O'Gorman, L., A dual watermarking technique for image, Proc. 7th
Electronic marking and identification techniques to ACM Int. Multimedia Conf. 2 (1999) 9–51.
discourage document copying. Proceedings of IEEE [24] Y. Hu, S. Kwong, Wavelet domain adaptive visible
INFOCOM, `94, 1994, 3, 1278±1287. watermarking, Electron. Lett
[8] S. Voloshynovskiy, F. Deguillaume, O. Koval, T. Pun, 37 (20) (2001) 1219–1220.
Robust watermarking with channel state estimation, [25] Y. Hu, S. Kwong, An image fusion-based visible
Part I: theoretical analysis, Signal Processing: Security watermarking algorithm, in:
of Data Hiding Technologies, (Special Issue) 2003– Proc. Int’l Symp. Circuits Syst., IEEE Press, 2003, pp. 25–
2004, to appear. 28.
[9] S. Voloshynovskiy, F. Deguillaume, O. Koval, T. Pun, [26] L. Yong, L.Z. Cheng, Y. Wu, Z.H. Xu, Translucent
Robust watermarking with channel state estimation, digital watermark based on wavelets and error-correct
Part II: applied robust watermarking, Signal code, Chinese J. Comput. 27 (11) (2004) 533–1539.
Processing: Security of Data Hiding Technologies, [27] B.B. Huang, S.X. Tang, A contrast-sensitive visible
(Special Issue) 2003–2004, to appear. watermarking scheme, IEEE Multimedia 13 (2) (2006)
[10]Adobe SystemsInc.,2010.AdobePDFReferenceArchives. 0–66.
http://www.adobe. com/devnet/pdf/pdf reference [28] J.L. Mannos, D.J. Sakrison, The effects of a visual
archive.html (Last updatedJanuary2010). fidelity criterion on the encoding of images, IEEE
[11]Byers, S., 2004. Information leakage caused by hidden Trans. Info. Theory 20 (4) (1974) 25–536.
data in published documents. IEEE Security and [29] D. Levicky´ , P. For_is, Human Visual System Models
Privacy 2 (2), 23–27. in Digital Image Watermarking, Radio Eng. 13 (4)
[12]Wikipedia (2004) 38–43.
theOnlineEncyclopedia,2009.TheCalipariIncident. [30] A.P. Beegan, L.R. Iyer, A.E. Bell, Design and
http:// en.wikipedia.org/wiki/Nicola Calipari/, evaluation of perceptual masks forwavelet image
http://en.wikipedia.org/wiki/Rescue_of_Giuliana_Sgre compression, in: Proc. 10th IEEE Digital Signal
na/ (Last updatedDecember2009). Processing Workshop, 2002, pp. 88–93.
[13]King, J.C., 2004. A format design case study: PDF. In: [31] S. Voloshynovskiy, et al., A stochastic approach to
HYPERTEXT’04: Proceedings of the Fifteenth ACM content adaptive digital image watermarking, in: Proc.
Conference on Hypertext and Hypermedia. ACM 3rd Int. Workshop Information Hiding, Dresden,
Press, New York, NY, USA, pp. 95–97. Germany, 1999, pp. 211–236.
[14] Bagley, S.R., Brailsford, D.F., Ollis, J.A., 2007. [32] A.B. Watson, G.Y. Yang, J.A. Solomon, J. Villasenor,
Extracting reusable document com- ponents for Visibility of wavelet quantization noise, IEEE Trans.
variable data printing. In: DocEng’07: Proceedings of Image Proc. 6 (8) (1997) 1164–1175.
the ACM Symposium on Document Engineering.
ACM Press, New York, NY, USA, pp. 44–52.
104 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 10, 2010

[33] Iyer B, Mehrotra S, Mykletun E, Tsudik G, Wu Y. A


framework for efficient storage security in RDBMS.
Proceedings of EDBT, 2004, p. 147–64.
[34] Barbara D, Couto J, Jajodia S. ADAM: a testabed for
exploring the use of data mining in intrusion
detection. SIGMOD Record 2001;30(4):15–24.
[35] Bouganim L, Pucheral P. Chip-secured data access:
confidential data on untrusted servers. In: Proceedings
of very large databases (VLDB), 2002, Hong Kong
China.
[36] Rubin A, Greer D. A survey of the world wide web
security. IEEE Computer September 1998;31(9):34–
41.

Author’s Profile

Karim Shamekh received the B.S.


degree in Computer Science from High
Technology Institute in 2006. During
2007-2010, he is preparing the M.S.
degree in Computers and Information
Systems from the Arab Academy for
Science, Technology and Maritime
Transport. His interests are concerned
with Information Security, Web Mining
and Image processing.

Dr. Ashraf Darwish received his PhD


degree in computer science in 2006
from computer science department at
Saint Petersburg State University
(specialization in Artificial
Intelligence), and joined as lecturer
(assistant professor) at the computer
science department, Faculty of Science,
Helwan University in 25 June 2006.

Dr. Mohamed Kouta received the B.S.


degree in Electrical Engineering from
Military Technical College in 1972. He
received the M.S. and Ph.D. degrees in
computer science from Jons Hopkins
University and Clarkson University in 1982
and 1985, respectively. He is the Chairman
of Business information system(BIS)
Department (Cairo Branch),college of
management and technology, Arab academy
for science and technology (AAST) and the Vice Dean for
Education.

Das könnte Ihnen auch gefallen