<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">15785</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2021.015785</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Text Analysis-Based Watermarking Approach for Tampering Detection of English Text</article-title>
<alt-title alt-title-type="left-running-head">Text Analysis-Based Watermarking Approach for Tampering Detection of English Text</alt-title>
<alt-title alt-title-type="right-running-head">Text Analysis-Based Watermarking Approach for Tampering Detection of English Text</alt-title>
</title-group>
<contrib-group content-type="authors">
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western">
<surname>Al-Wesabi</surname>
<given-names>Fahd N.</given-names>
</name>
<xref ref-type="aff" rid="aff-1">1</xref><xref ref-type="aff" rid="aff-2">2</xref>
<email>falwesabi@kku.edu.sa</email>
</contrib>
<aff id="aff-1"><label>1</label><institution>Department of Computer Science, King Khalid University</institution>, <addr-line>Muhayel Aseer</addr-line>, <country>Kingdom of Saudi Arabia</country></aff>
<aff id="aff-2"><label>2</label><institution>Faculty of Computer and IT, Sana&#x2019;a University</institution>, <addr-line>Sana&#x2019;a</addr-line>, <country>Yemen</country></aff>
</contrib-group>
<author-notes><corresp id="cor1">&#x002A;Corresponding Author: Fahd N. Al-Wesabi. Email: <email>falwesabi@kku.edu.sa</email></corresp></author-notes>
<pub-date pub-type="epub" date-type="pub" iso-8601-date="2021-01-25">
<day>25</day>
<month>01</month>
<year>2021</year>
</pub-date>
<volume>67</volume>
<issue>3</issue>
<fpage>3701</fpage>
<lpage>3719</lpage>
<history>
<date date-type="received">
<day>06</day>
<month>12</month>
<year>2020</year>
</date>
<date date-type="accepted">
<day>11</day>
<month>01</month>
<year>2021</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2021 Al-Wesabi</copyright-statement>
<copyright-year>2021</copyright-year>
<copyright-holder>Al-Wesabi</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_15785.pdf"></self-uri>
<abstract>
<p>Due to the rapid increase in the exchange of text information via internet networks, the security and the reliability of digital content have become a major research issue. The main challenges faced by researchers are authentication, integrity verification, and tampering detection of the digital contents. In this paper, text zero-watermarking and text feature-based approach is proposed to improve the tampering detection accuracy of English text contents. The proposed approach embeds and detects the watermark logically without altering the original English text document. Based on hidden Markov model (HMM), the fourth level order of the word mechanism is used to analyze the contents of the given English text to find the interrelationship between the contexts. The extracted features are used as watermark information and integrated with digital zero-watermarking techniques. To detect eventual tampering, the proposed approach has been implemented and validated with attacked English text. Experiments were performed using four standard datasets of varying lengths under multiple random locations of insertion, reorder, and deletion attacks. The experimental and simulation results prove the tampering detection accuracy of our method against all kinds of tampering attacks. Comparison results show that our proposed approach outperforms all the other baseline approaches in terms of tampering detection accuracy.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Text analysis</kwd>
<kwd>English language processing</kwd>
<kwd>hidden Markov model</kwd>
<kwd>zero-watermarking</kwd>
<kwd>content authentication</kwd>
<kwd>tampering detection</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>For the research community, the reliability and security of exchanged text through the internet is the most promising and challenging field. In communication technologies, authentication of content and automated text verification of honesty in different languages and formats are of great significance. Numerous applications for instance; e-Banking and e-commerce render information transferred via the internet the most difficult. In terms of content, structure, grammar, and semantics, much of the digital media transferred over the internet is in text form and is very susceptible to online transmission. During the transfer process, malicious attackers can temper such digital content [<xref ref-type="bibr" rid="ref-1">1</xref>].</p>
<p>For information security, many algorithms and techniques are available such as the authentication of content, verification of integrity, detection of tampering, access control, and copyright protection. To overcome these issues, steganography and automated methods of watermarking are commonly used. A technique of digital watermarking (DWM) which can be inserted into digital material through various details such as text, binary pictures, audio, and video [<xref ref-type="bibr" rid="ref-2">2</xref>,<xref ref-type="bibr" rid="ref-3">3</xref>]. A fine-grained text watermarking procedure is proposed based on replacing the white spaces and Latin symbols with homoglyph characters [<xref ref-type="bibr" rid="ref-4">4</xref>].</p>
<p>Several conventional methods and solutions for text watermarking were proposed [<xref ref-type="bibr" rid="ref-4">4</xref>] and categorized into different classifications such as linguistic, structure, and image-based and format-based binary images [<xref ref-type="bibr" rid="ref-5">5</xref>]. To insert the watermark information into the document, most of these solutions require certain upgrades or improvements to the original text in digital format material. Zero-watermarking without any alteration to the original digital material to embed the watermark information is a new technique with smart algorithms that can be used [<xref ref-type="bibr" rid="ref-3">3</xref>]. Several techniques have been proposed to improve the capacity of coverless information hidden in digital media based on various techniques such as anime characters [<xref ref-type="bibr" rid="ref-6">6</xref>], to represent and convey confidential information using unmodified natural stego-carriers [<xref ref-type="bibr" rid="ref-7">7</xref>], and to map the relationships constructed between the inherent features of the images and the secret information [<xref ref-type="bibr" rid="ref-8">8</xref>].</p>
<p>Restricted research has centered on the appropriate solutions to verify the credibility of critical digital media online [<xref ref-type="bibr" rid="ref-9">9</xref>&#x2013;<xref ref-type="bibr" rid="ref-11">11</xref>]. The verification of digital text and the identification of fraud in research earned great attention. Besides, text watermarking study has several researches concentrated on copyright protection in the last decade, but less interest and attention has been paid to integrity verification, identification of tampering, and authentication of content due to the existence of text content based on the natural language [<xref ref-type="bibr" rid="ref-12">12</xref>].</p>
<p>Proposing the most appropriate approaches and strategies for dissimilar formats and materials, especially in Arabic and English languages, is the most common challenge in this area [<xref ref-type="bibr" rid="ref-13">13</xref>,<xref ref-type="bibr" rid="ref-14">14</xref>]. Therefore, authentication of content, verification of honesty, and detection of sensitive text tampering are major issues in different systems that need critical solutions.</p>
<p>Some instances of such sensitive digital text content are Arabic interactive Holy Qur&#x2019;an, online, eChecks, tests, and marks. Different Arabic alphabet characteristics such as diacritics lengthened letters and extra symbols of Arabic make it simple to modify the key meaning of the text material by making basic changes such as modifying diacritic arrangements [<xref ref-type="bibr" rid="ref-11">11</xref>,<xref ref-type="bibr" rid="ref-15">15</xref>]. The most popular soft computation and natural language processing (NLP) technique that supported the analysis of the text is HMM.</p>
<p>This paper presents a hybrid text analysis and zero-watermarking approach (HTAZWA) for content authentication and tampering detection of English text. The proposed technique combines the Markov model and zero-watermarking. The fourth-order of the word mechanism of the Markov model has been used for text analysis to extract the interrelationships between contents of the given English text which consequently generates the watermark key. The generated watermark is logically embedded in the original English context without modifying the original text. After text transmission, the embedded watermark is used to detect any tamper that occurred on the received English text and ensures its authenticity.</p>
<p>The primary objective of the HTAZWA strategy is to meet the high accuracy of content authentication and identification of sensitive tampering attacks of English text which is transmitted through the Internet. Therefore, the key contributions of the proposed HTAZWA can be presented as follows.</p>
<list list-type="bullet">
<list-item><p>For the identification of English text, a novel hybrid text watermarking with NLP technique has been suggested for tampering.</p></list-item>
<list-item><p>Most modern information protection techniques combined NLP and tools of soft computing to enhance the robustness, sophistication, security issues of the watermark and to decrease the capability of the watermark and logically incorporate the watermark without making any modification to the original document.</p></list-item>
<list-item><p>Any random tamper can be detected with varying amounts and characters.</p></list-item>
<list-item><p>In terms of the scale, structure, and content documents of English-text, including character numbers, sets, and special symbols, the method was developed without prior assumptions.</p></list-item>
<list-item><p>Watermark capability has been decreased and the existing watermark key is eliminated as a result of processing the text analysis.</p></list-item>
</list>
<p>The rest of the paper has five more sections. Section 2 provides a literature review of the related work. Section 3 presents HTAZWA. Section 4 describes the implementation, simulation, and experimental details. Section 5 describes the comparison and results discussion, and Section 6 offers conclusions.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Literature Review</title>
<p>Natural language is the foundation of linguistic text watermarking approaches. The mechanism of those methods embedding the watermark is based on changes applied to the semantic and syntactic essence of plain text [<xref ref-type="bibr" rid="ref-1">1</xref>].</p>
<p>To enhance the capability and imperceptibility of Arabic text, a method of text watermarking suggested room dependent on the accessible words [<xref ref-type="bibr" rid="ref-16">16</xref>]. In this method, any word-space is used to mask the Boolean bit 0 or 1 that physically modifies the original text. A text steganography technique was proposed to hide information in the Arabic language [<xref ref-type="bibr" rid="ref-17">17</xref>]. The step of this approach considers Harakat&#x2019;s existence in Arabic diacritics such as Kasra, and Damma as well as reverses Fatha to cover the message.</p>
<p>Kashida-marks invisible method of watermarking [<xref ref-type="bibr" rid="ref-18">18</xref>], based on the features of frequent recurrence of document security and authentication characters, was proposed. The method is based on a predetermined watermark key with a Kashida placed for a bit 1 and a bit omitted. The method of steganography of the text was proposed to use Kashida extensions depending on the characters &#x2018;moon&#x2019; and &#x2018;sun&#x2019; to write digital contents of the Arabic language [<xref ref-type="bibr" rid="ref-19">19</xref>]. Also, Kashida characters are seen alongside with characters from Arabic to decide which hidden secret bits are kept by specific characters. In this form, four instances are included in the kashida characters: Moon characters representing &#x2018;00&#x2019;; sun characters representing &#x2018;01&#x2019;; sun characters representing &#x2018;10&#x2019;; and moon characters representing &#x2018;11&#x2019;.</p>
<p>A text steganographic approach [<xref ref-type="bibr" rid="ref-20">20</xref>] based on multilingual Unicode characters has been suggested to cover details in English scripts for the use of the English Unicode alphabet in other languages. Thirteen letters of the English alphabet have been chosen for this approach. It is important to embed dual bits in a timeframe using ASCII code for embedding 00. However, multilingual ones were used by Unicode to embed between 01, and 10, as well as 11. The algorithm of text watermarking is used to secure textual contents from malicious attacks according to Unicode extended characters [<xref ref-type="bibr" rid="ref-21">21</xref>]. The algorithm requires three main steps, the development, incorporation, and extraction of watermarks. The addition of watermarks is focused on the development of predefined coding tables. While scrambling strategies are often used in generation and removal, the watermarking key is safe.</p>
<p>The substitution attack method focused on preserving the position of words in the text document has been proposed [<xref ref-type="bibr" rid="ref-22">22</xref>]. This method depends on manipulating word transitions in the text document. Authentication of Chinese text documents based on the combination of the properties of sentences and text-based watermarking approaches have been suggested [<xref ref-type="bibr" rid="ref-23">23</xref>,<xref ref-type="bibr" rid="ref-24">24</xref>]. The proposed method is presented as follows: A text of the Chinese language is split into a group of sentences, and for each word, the code of a semantic has been obtained. The distribution of semantic codes influences sentence entropy.</p>
<p>A zero-watermarking method has been proposed to preserve the privacy of a person who relies on the Hurst exponent and the nullity of the frames [<xref ref-type="bibr" rid="ref-25">25</xref>]. For watermark embedding, the two steps are determined to evaluate the unvoiced frames. The process of the proposed approach is based on integrating an individual&#x2019;s identity without notifying any distortion in the signals of medical expression.</p>
<p>A zero-watermarking method was proposed to resolve the security issues of English language text-documents, such as verification of content and copyright protection [<xref ref-type="bibr" rid="ref-26">26</xref>]. A zero-watermarking approach has been suggested based on Markov-model authentication of the content of English text [<xref ref-type="bibr" rid="ref-27">27</xref>,<xref ref-type="bibr" rid="ref-28">28</xref>]. In this approach, to extract the safe watermark information, the probability characteristics of the English text are involved and stored to confirm the validity of the attacked text-document. The approach provides security against popular text attacks with a watermark distortion rate if, for all known attacks, it is greater than one. For the defense of English text copyright, based on the present rate of ASCII non-vowel letters and terms, the conventional watermark approach [<xref ref-type="bibr" rid="ref-29">29</xref>] has been suggested.</p>
</sec>
<sec id="s3">
<label>3</label>
<title>The Proposed Approach</title>
<p>This paper proposes a hybrid text analysis and the zero-watermarking approach by integrating zero-watermark technique and the Markov model as NLP technique in which there is no need to embed extra information such as a watermark key, or even to perform any modification on the original text.</p>
<p>The fourth-order of word mechanism of the Markov model has been used as NLP techniques to analyze the contents of the given English text and extract the interrelationships features of these text contents.</p>
<p>The following subsections explain in detail two main processes that should be performed in HTAZWA. The first process is called the watermark generation and embedding process, whereas, the second one is called the watermark extraction and detection process.</p>
<sec id="s3_1">
<label>3.1</label>
<title>Watermark Generation and Embedding Process</title>
<p>The core sub-processes consist of pre-processing, watermark embedding, and watermark generation algorithms as well as text analysis as illustrated in <xref ref-type="fig" rid="fig-1">Fig. 1</xref>.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>HTAZWA zero-watermark processes 
</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-1.png"/>
</fig>
<sec id="s3_1_1">
<label>3.1.1</label>
<title>Algorithm of Pre-Processing</title>
<p>The pre-processing of the original English text is one of the key steps in both the watermark generation and extraction processes to convert letter case from capital to small letter and remove extra spaces and newlines, and it will directly influence the tampering detection accuracy. The original English text (OET) is required as input for the Pre-processing process.</p>
</sec>
<sec id="s3_1_2">
<label>3.1.2</label>
<title>Algorithm of Watermark Generation</title>
<p>This algorithm involves the construction of the Markov matrix, the generation of watermarks, and the interpretation of the text.</p>
<list list-type="simple">
<list-item><label>&#x2b1b;</label><p><italic>Developing the Markov matrix</italic> is a core step in developing the HTAZWA approach. A Markov chain matrix must be constructed in this process to set up the Markov model environment and represent all available states and transitions. In this approach, each unique sequence of four words within a provided English-text represents a current state, and every single word corresponds to a conversion in the matrix of the Markov chain. When constructing the Markov chain matrix, zero values will be initialized for all states and transition positions. Those positions will be used later holding a record of the number of occurrences. Then, the ith unique sequence of four words is backed up through the jth single word and provided by English-text.</p></list-item>
</list>
<p>Pre-processing and building the Markov matrix algorithm is executed as presented in Algorithm 1.</p>
<p><bold>Algorithm 1.</bold> Algorithm of building Markov matrix using HTAZWA</p>
<fig id="fig-11">
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-11.png"/>
</fig>
<p>where,</p>
<p>OET: is the original English text, <italic>OET<sub>P</sub></italic>: is a pre-processed English text, ew4_mm: represents states and transitions matrix with zeros values for all cells, ps: refers to the current state, ns: refers to next state.</p>
<p>The length of <inline-formula id="ieqn-2"><alternatives><inline-graphic xlink:href="ieqn-2.png"/><tex-math id="tex-ieqn-2"><![CDATA[$\mathrm{ew}4\_\mathrm{mm} \left[i\right] \left[j\right]$]]></tex-math><mml:math id="mml-ieqn-2"><mml:mstyle mathvariant="normal"><mml:mi>e</mml:mi><mml:mi>w</mml:mi></mml:mstyle><mml:mn>4</mml:mn><mml:mstyle class="text"><mml:mtext>_</mml:mtext></mml:mstyle><mml:mstyle mathvariant="normal"><mml:mi>m</mml:mi><mml:mi>m</mml:mi></mml:mstyle><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mo>]</mml:mo></mml:mrow><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:math></alternatives></inline-formula> matrix of HTAZWA is dynamic, in which the size of the rows is equal to the total number of unique sequences of four words within the given English text. However, the column size is equal to the total number of unique single words within the given English text.</p>
<list list-type="simple">
<list-item><label>&#x2b1b;</label><p><italic>Watermark generation-based text analysis process</italic>: The proposed algorithm is performed as the second step of this process to perform English text analysis and extract the features of the given text and produce watermark information. Also, in this algorithm, there are several appearances of potential conversions for every present state of unique sequences of four words that will be computed as transition probabilities by <xref ref-type="disp-formula" rid="eqn-1">Eq. (1)</xref> below.</p></list-item>
</list>
<disp-formula id="eqn-1">
<label>(1)</label>
<alternatives>
<graphic mimetype="image" mime-subtype="png" xlink:href="eqn-1.png"/>
<tex-math id="tex-eqn-1"><![CDATA[$$\begin{equation}
ew4\_mm[ps][ns]= \sum_{i,\, j=1}^{n-4}\mathit{trans} \left[i\right] \left[j\right]
 \label{eqn-1}
\end{equation}$$]]></tex-math>
<mml:math id="mml-eqn-1" display="block"><mml:mi>e</mml:mi><mml:mi>w</mml:mi><mml:mn>4</mml:mn><mml:mstyle><mml:mtext>_</mml:mtext></mml:mstyle><mml:mi>m</mml:mi><mml:mi>m</mml:mi><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>p</mml:mi><mml:mi>s</mml:mi></mml:mrow><mml:mo>]</mml:mo></mml:mrow><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>n</mml:mi><mml:mi>s</mml:mi></mml:mrow><mml:mo>]</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mstyle displaystyle='true'><mml:mstyle displaystyle='true'><mml:munderover><mml:mrow><mml:mo>&#x2211;</mml:mo> </mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mspace width="0.3em"/><mml:mi>j</mml:mi><mml:mo lspace='0pt' rspace='0pt'>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>n</mml:mi><mml:mo lspace='0pt' rspace='0pt'>-</mml:mo><mml:mn>4</mml:mn></mml:mrow></mml:munderover></mml:mstyle></mml:mstyle><mml:mstyle mathvariant="italic"><mml:mi>t</mml:mi><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>s</mml:mi></mml:mstyle><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mo>]</mml:mo></mml:mrow><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:math></alternatives></disp-formula>
<p>where, <italic>n</italic>: is total number of states, <italic>i</italic>: is ith current state of unique sequence of four words, and <italic>j</italic>: is jth next state transition.</p>
<p>This example of the English version demonstrates how this methodology was used to introduce the phase of transformation from the current state to the next state.</p>
<boxed-text>
<p>&#x201C;The quick brown fox jumps over the brown fox who is slow jumps over the brown fox Who is dead.&#x201D; </p>
</boxed-text>
<p>When using the fourth level order of word mechanism of the hidden Markov model, every unique sequence of four words is a present state. However, each unique single word is a present transition. Text analysis is processed as the text is read to obtain the interrelationship between the present state and the next states. <xref ref-type="fig" rid="fig-2">Fig. 2</xref>. illustrates the available transitions and analysis results of the above sample of English text.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>States and their transitions representation of sample given English text using HTAZWA</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-2.png"/>
</fig>
<p>As shown in <xref ref-type="fig" rid="fig-2">Fig. 2</xref>, and as a result of states and transitions representation of a given English text sample using HTAZWA, the author finds 12 unique states and 10 unique transitions. The author assumes &#x201C;brown fox who is&#x201D; is a present state, and the available next transition(s) is &#x201C;slow&#x201D; and &#x201C;dead.&#x201D; The author also observed that &#x201C;who&#x201D; transition appears twice in the case of &#x201C;over the brown fox&#x201D; state in the given English text sample. The algorithm of text analysis and watermark generation based on the fourth-level order of the word mechanism of the Markov model proceeds as illustrated in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Text analysis and watermark generation of given English text sample using HTAZWA</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-3.png"/>
</fig>
<p>Text analysis and watermark generation algorithm is presented formally as illustrated in Algorithm 2.</p>
<p><bold>Algorithm 2.</bold> Watermark generation algorithm of HTAZWA</p>
<fig id="fig-12">
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-12.png"/>
</fig>
<p>where, psu4w: is a previous sequence of unique four words, csu4w: is a current sequence of unique four words, and TAM: is text analysis matrix.</p>
</sec>
<sec id="s3_1_3">
<label>3.1.3</label>
<title>Algorithm of Watermark Embedding</title>
<p>Watermark embedding has taken place logically in this method with no need to change the original text. The feature extraction of the given English-text is utilized as a watermark key and embedded logically by identifying all non-zero values in the Markov chain matrix. All these non-zero values are sequentially concatenated to form the original pattern of watermark <inline-formula id="ieqn-4"><alternatives><inline-graphic xlink:href="ieqn-4.png"/><tex-math id="tex-ieqn-4"><![CDATA[$\mathrm{DWM}_{\mathrm{O}}$]]></tex-math><mml:math id="mml-ieqn-4"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:mi>M</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>O</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula>, as defined in <xref ref-type="disp-formula" rid="eqn-2">Eq. (2)</xref> and shown in <xref ref-type="fig" rid="fig-4">Fig. 4</xref>.</p>
<p><disp-formula id="eqn-2">
<label>(2)</label>
<alternatives>
<graphic mimetype="image" mime-subtype="png" xlink:href="eqn-2.png"/>
<tex-math id="tex-eqn-2"><![CDATA[$$\begin{equation}
ew4\_DWM_{O}\& =ew4\_mm[ps][ns],\quad for~ i ,~ j = \text{non-zeros values resulted in ew4_mm}
 \label{eqn-2}
\end{equation}$$]]></tex-math>
<mml:math id="mml-eqn-2" display="block"><mml:mi>e</mml:mi><mml:mi>w</mml:mi><mml:mn>4</mml:mn><mml:mstyle><mml:mtext>_</mml:mtext></mml:mstyle><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:msub><mml:mrow><mml:mi>M</mml:mi></mml:mrow><mml:mrow><mml:mi>O</mml:mi></mml:mrow></mml:msub><mml:mi>&#x0026;</mml:mi><mml:mo>=</mml:mo><mml:mi>e</mml:mi><mml:mi>w</mml:mi><mml:mn>4</mml:mn><mml:mstyle><mml:mtext>_</mml:mtext></mml:mstyle><mml:mi>m</mml:mi><mml:mi>m</mml:mi><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>p</mml:mi><mml:mi>s</mml:mi></mml:mrow><mml:mo>]</mml:mo></mml:mrow><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>n</mml:mi><mml:mi>s</mml:mi></mml:mrow><mml:mo>]</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:mspace width="1em"/><mml:mi>f</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mspace width=".3em" /><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mspace width=".3em" /><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mstyle><mml:mtext>non-zeros&#x00A0;values&#x00A0;resulted&#x00A0;in&#x00A0;ew4_mm</mml:mtext></mml:mstyle></mml:math></alternatives></disp-formula></p>
<fig id="fig-4">
<label>Figure 4</label> 
<caption>
<title>The generated original pattern of watermark key ew4_<inline-formula id="ieqn-5"><alternatives><inline-graphic xlink:href="ieqn-5.png"/><tex-math id="tex-ieqn-5"><![CDATA[$\mathrm{DWM}_{\mathrm{O}}$]]></tex-math><mml:math id="mml-ieqn-5"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:mi>M</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>O</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula> using HTAZWA</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-4.png"/>
</fig>
<p>The generated ew4_<italic>DWM<sub>O</sub></italic> is stored in WM database beside information of the given English text.</p>
<p>The algorithm of watermark embedding based on the fourth-level order of the word mechanism of the Markov model is presented formally and executed as illustrated below in Algorithm 3.</p>
<p><bold>Algorithm 3.</bold> Watermark embedding algorithm of HTAZWA</p>
<fig id="fig-13">
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-13.png"/>
</fig>
</sec>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Algorithms of Watermark Extraction and Detection</title>
<p>Before the detection of the pre-proceed attacked English text (<inline-formula id="ieqn-7"><alternatives><inline-graphic xlink:href="ieqn-7.png"/><tex-math id="tex-ieqn-7"><![CDATA[$\mathrm{PET}_{\mathrm{A}}$]]></tex-math><mml:math id="mml-ieqn-7"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>P</mml:mi><mml:mi>E</mml:mi><mml:mi>T</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>A</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula>), attacked watermark patterns (ew4_<inline-formula id="ieqn-8"><alternatives><inline-graphic xlink:href="ieqn-8.png"/><tex-math id="tex-ieqn-8"><![CDATA[$\mathrm{DWM}_{\mathrm{A}}$]]></tex-math><mml:math id="mml-ieqn-8"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:mi>M</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>A</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula>) should be generated, and the matching rate of patterns and watermark distortion should be calculated by HTAZWA for detecting any tamper with the authentication of the given contents.</p>
<p>Two core algorithms are involved in this process, which are watermark extraction and watermark detection. However, ew4_<inline-formula id="ieqn-9"><alternatives><inline-graphic xlink:href="ieqn-9.png"/><tex-math id="tex-ieqn-9"><![CDATA[$\mathrm{DWM}_{\mathrm{A}}$]]></tex-math><mml:math id="mml-ieqn-9"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:mi>M</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>A</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula> will be extracted from the received (<inline-formula id="ieqn-10"><alternatives><inline-graphic xlink:href="ieqn-10.png"/><tex-math id="tex-ieqn-10"><![CDATA[$\mathrm{PET}_{\mathrm{A}}$]]></tex-math><mml:math id="mml-ieqn-10"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>P</mml:mi><mml:mi>E</mml:mi><mml:mi>T</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>A</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula>) and matched with ew4_<inline-formula id="ieqn-11"><alternatives><inline-graphic xlink:href="ieqn-11.png"/><tex-math id="tex-ieqn-11"><![CDATA[$\mathrm{DWM}_{\mathrm{O}}$]]></tex-math><mml:math id="mml-ieqn-11"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:mi>M</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>O</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula> by the detection algorithm. <inline-formula id="ieqn-12"><alternatives><inline-graphic xlink:href="ieqn-12.png"/><tex-math id="tex-ieqn-12"><![CDATA[$\mathrm{PET}_{\mathrm{A}}$]]></tex-math><mml:math id="mml-ieqn-12"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>P</mml:mi><mml:mi>E</mml:mi><mml:mi>T</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>A</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula> should be provided as the input for the proposed watermark extraction algorithm. The same process of watermark generation algorithm should be performed to obtain the watermark pattern for (<inline-formula id="ieqn-13"><alternatives><inline-graphic xlink:href="ieqn-13.png"/><tex-math id="tex-ieqn-13"><![CDATA[$\mathrm{PET}_{\mathrm{A}}$]]></tex-math><mml:math id="mml-ieqn-13"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>P</mml:mi><mml:mi>E</mml:mi><mml:mi>T</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>A</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula>) as illustrated in <xref ref-type="fig" rid="fig-5">Fig. 5</xref>.</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Zero-watermark HTAZWA processes of extraction and detection 
</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-5.png"/>
</fig>
<sec id="s3_2_1">
<label>3.2.1</label>
<title>Algorithm of Watermark Extraction</title>
<p><inline-formula id="ieqn-14"><alternatives><inline-graphic xlink:href="ieqn-14.png"/><tex-math id="tex-ieqn-14"><![CDATA[$\mathrm{PET}_{\mathrm{A}}$]]></tex-math><mml:math id="mml-ieqn-14"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>P</mml:mi><mml:mi>E</mml:mi><mml:mi>T</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>A</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula> is the main input required to run this algorithm. However, the output of this algorithm is ew4_<inline-formula id="ieqn-15"><alternatives><inline-graphic xlink:href="ieqn-15.png"/><tex-math id="tex-ieqn-15"><![CDATA[$\mathrm{DWM}_{\mathrm{A}}$]]></tex-math><mml:math id="mml-ieqn-15"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:mi>M</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>A</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula>. The watermark extraction algorithm is presented and executed as illustrated in Algorithm 4.</p>
<p><bold>Algorithm 4.</bold> Algorithm of watermark extraction based HTAZWA</p>
<fig id="fig-14">
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-14.png"/>
</fig>
<p>where, <inline-formula id="ieqn-17"><alternatives><inline-graphic xlink:href="ieqn-17.png"/><tex-math id="tex-ieqn-17"><![CDATA[$\mathrm{PET}_{\mathrm{A}}$]]></tex-math><mml:math id="mml-ieqn-17"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>P</mml:mi><mml:mi>E</mml:mi><mml:mi>T</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>A</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula>: pre-processed attacked English text and ew4_<inline-formula id="ieqn-18"><alternatives><inline-graphic xlink:href="ieqn-18.png"/><tex-math id="tex-ieqn-18"><![CDATA[$\mathrm{DWM}_{\mathrm{A}}$]]></tex-math><mml:math id="mml-ieqn-18"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:mi>M</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>A</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula>: Attacked digital watermark.</p>
</sec>
<sec id="s3_2_2">
<label>3.2.2</label>
<title>Algorithm of Watermark Detection</title>
<p>ew4_<inline-formula id="ieqn-19"><alternatives><inline-graphic xlink:href="ieqn-19.png"/><tex-math id="tex-ieqn-19"><![CDATA[$\mathrm{DWM}_{\mathrm{A}}$]]></tex-math><mml:math id="mml-ieqn-19"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:mi>M</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>A</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula> and ew4_<inline-formula id="ieqn-20"><alternatives><inline-graphic xlink:href="ieqn-20.png"/><tex-math id="tex-ieqn-20"><![CDATA[$\mathrm{DWM}_{\mathrm{O}}$]]></tex-math><mml:math id="mml-ieqn-20"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:mi>M</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>O</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula> are the main inputs required to run this algorithm, while the output of this algorithm is the notification English text status, which can be authentic or tampered. The detection process of an extracted watermark is achieved in two main phases:
<list list-type="bullet">
<list-item><p><italic>Primary matching</italic> is achieved for ew4_<inline-formula id="ieqn-21"><alternatives><inline-graphic xlink:href="ieqn-21.png"/><tex-math id="tex-ieqn-21"><![CDATA[$\mathrm{DWM}_{\mathrm{O}}$]]></tex-math><mml:math id="mml-ieqn-21"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:mi>M</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>O</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula> and ew4_<inline-formula id="ieqn-22"><alternatives><inline-graphic xlink:href="ieqn-22.png"/><tex-math id="tex-ieqn-22"><![CDATA[$\mathrm{DWM}_{\mathrm{A}}$]]></tex-math><mml:math id="mml-ieqn-22"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:mi>M</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>A</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula>. If these two patterns appear identical, then an alert will appear as &#x201C;English text is authentic, and no tampering occurred.&#x201D; Otherwise, the notification will be &#x201C;English text is tampered and not authentic,&#x201D; and then it continues to the next step.</p></list-item>
<list-item><p><italic>Secondary matching</italic> is achieved by matching the transition of each state in the whole generated pattern. This means ew4_<inline-formula id="ieqn-23"><alternatives><inline-graphic xlink:href="ieqn-23.png"/><tex-math id="tex-ieqn-23"><![CDATA[$\mathrm{DWM}_{\mathrm{A}}$]]></tex-math><mml:math id="mml-ieqn-23"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:mi>M</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>A</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula> of each state will be compared to the equivalent transition of ew4_<inline-formula id="ieqn-24"><alternatives><inline-graphic xlink:href="ieqn-24.png"/><tex-math id="tex-ieqn-24"><![CDATA[$\mathrm{DWM}_{\mathrm{O}}$]]></tex-math><mml:math id="mml-ieqn-24"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:mi>M</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>O</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula> as given by <xref ref-type="disp-formula" rid="eqn-3">Eqs. (3)</xref> and <xref ref-type="disp-formula" rid="eqn-4">(4)</xref>.</p></list-item>
</list></p>
<p><disp-formula id="eqn-3">
<label>(3)</label>
<alternatives>
<graphic mimetype="image" mime-subtype="png" xlink:href="eqn-3.png"/>
<tex-math id="tex-eqn-3"><![CDATA[$$\begin{align}
ew4\_TDA_{T} \left(i,\,j\right)&= \left| \frac{ew4\_DWM_{O} \left[i\right] \left[j\right]- \left(ew4\_DWM_{O} \left[i\right] \left[j\right]-ew4\_DWM_{A} \left[i\right] \left[j\right]\right)}{ew4\_DWM_{O} \left[i\right] \left[j\right]}\right|,\nonumber \\
&\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad for~ all~ i,~j~ states~
and~ transitions
 \label{eqn-3}
\end{align}$$]]></tex-math>
<mml:math id="mml-eqn-3" display="block"><mml:mtable columnalign="left" columnspacing="1pt"><mml:mtr><mml:mtd><mml:mi>e</mml:mi><mml:mi>w</mml:mi><mml:mn>4</mml:mn><mml:mstyle><mml:mtext>_</mml:mtext></mml:mstyle><mml:mi>T</mml:mi><mml:mi>D</mml:mi><mml:msub><mml:mrow><mml:mi>A</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mspace width="0.3em"/><mml:mi>j</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mtd><mml:mtd><mml:mo>=</mml:mo><mml:mrow><mml:mo>|</mml:mo><mml:mrow><mml:mstyle displaystyle='true'><mml:mfrac><mml:mrow><mml:mi>e</mml:mi><mml:mi>w</mml:mi><mml:mn>4</mml:mn><mml:mstyle><mml:mtext>_</mml:mtext></mml:mstyle><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:msub><mml:mrow><mml:mi>M</mml:mi></mml:mrow><mml:mrow><mml:mi>O</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mo>]</mml:mo></mml:mrow><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mo>]</mml:mo></mml:mrow><mml:mo>-</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>e</mml:mi><mml:mi>w</mml:mi><mml:mn>4</mml:mn><mml:mstyle><mml:mtext>_</mml:mtext></mml:mstyle><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:msub><mml:mrow><mml:mi>M</mml:mi></mml:mrow><mml:mrow><mml:mi>O</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mo>]</mml:mo></mml:mrow><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mo>]</mml:mo></mml:mrow><mml:mo>-</mml:mo><mml:mi>e</mml:mi><mml:mi>w</mml:mi><mml:mn>4</mml:mn><mml:mstyle><mml:mtext>_</mml:mtext></mml:mstyle><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:msub><mml:mrow><mml:mi>M</mml:mi></mml:mrow><mml:mrow><mml:mi>A</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mo>]</mml:mo></mml:mrow><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mi>e</mml:mi><mml:mi>w</mml:mi><mml:mn>4</mml:mn><mml:mstyle><mml:mtext>_</mml:mtext></mml:mstyle><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:msub><mml:mrow><mml:mi>M</mml:mi></mml:mrow><mml:mrow><mml:mi>O</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mo>]</mml:mo></mml:mrow><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:mrow></mml:mfrac></mml:mstyle></mml:mrow><mml:mo>|</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd></mml:mtd><mml:mtd><mml:mspace width="2em"/><mml:mspace width="2em"/><mml:mspace width="2em"/><mml:mspace width="2em"/><mml:mspace width="2em"/><mml:mspace width="2em"/><mml:mspace width="2em"/><mml:mspace width="2em"/><mml:mspace width="2em"/><mml:mi>f</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mspace width=".3em" /><mml:mi>a</mml:mi><mml:mi>l</mml:mi><mml:mi>l</mml:mi><mml:mspace width=".3em" /><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mspace width=".3em" /><mml:mi>j</mml:mi><mml:mspace width=".3em" /><mml:mi>s</mml:mi><mml:mi>t</mml:mi><mml:mi>a</mml:mi><mml:mi>t</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mspace width=".3em" /><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mspace width=".3em" /><mml:mi>t</mml:mi><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mi>o</mml:mi><mml:mi>n</mml:mi><mml:mi>s</mml:mi></mml:mtd></mml:mtr></mml:mtable></mml:math></alternatives></disp-formula></p>
<p>where,</p>
<list list-type="simple">
<list-item><label>&#x2014;</label><p>ew4_TDA<inline-formula id="ieqn-25"><alternatives><inline-graphic xlink:href="ieqn-25.png"/><tex-math id="tex-ieqn-25"><![CDATA[$_{\mathrm{T}}$]]></tex-math><mml:math id="mml-ieqn-25"><mml:msub><mml:mrow></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>T</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula>: represents tampering detection accuracy rate value in transition level, (0 &#x003c; ew4_<inline-formula id="ieqn-26"><alternatives><inline-graphic xlink:href="ieqn-26.png"/><tex-math id="tex-ieqn-26"><![CDATA[$\mathrm{TDA}_{\mathrm{T}}<= 1$]]></tex-math><mml:math id="mml-ieqn-26"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>T</mml:mi><mml:mi>D</mml:mi><mml:mi>A</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>T</mml:mi></mml:mstyle></mml:mrow></mml:msub><mml:mo>&#x003C;</mml:mo><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:math></alternatives></inline-formula>)</p></list-item>
<list-item><label>&#x2014;</label><p><inline-formula id="ieqn-27"><alternatives><inline-graphic xlink:href="ieqn-27.png"/><tex-math id="tex-ieqn-27"><![CDATA[$\mathrm{ew}4\_\mathrm{DWM}_{\mathrm{O}}$]]></tex-math><mml:math id="mml-ieqn-27"><mml:mstyle mathvariant="normal"><mml:mi>e</mml:mi><mml:mi>w</mml:mi></mml:mstyle><mml:mn>4</mml:mn><mml:mstyle class="text"><mml:mtext>_</mml:mtext></mml:mstyle><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:mi>M</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>O</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula>: refers to original watermark value in transition level.</p></list-item>
<list-item><label>&#x2014;</label><p><inline-formula id="ieqn-28"><alternatives><inline-graphic xlink:href="ieqn-28.png"/><tex-math id="tex-ieqn-28"><![CDATA[$\mathrm{ew}4\_\mathrm{DWM}_{\mathrm{A}}$]]></tex-math><mml:math id="mml-ieqn-28"><mml:mstyle mathvariant="normal"><mml:mi>e</mml:mi><mml:mi>w</mml:mi></mml:mstyle><mml:mn>4</mml:mn><mml:mstyle class="text"><mml:mtext>_</mml:mtext></mml:mstyle><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>D</mml:mi><mml:mi>W</mml:mi><mml:mi>M</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>A</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula>: refers to attacked watermark value in transition level.</p></list-item>
</list>
<disp-formula id="eqn-4">
<label>(4)</label>
<alternatives>
<graphic mimetype="image" mime-subtype="png" xlink:href="eqn-4.png"/>
<tex-math id="tex-eqn-4"><![CDATA[$$\begin{equation}
ew4\_TDA_{S} \left(i\right)= \left| \frac{\sum_{j=1}^{n-4} \left(ew4\_TDA_{T} \left(i,j\right)\right)}{\mathit{Total}\mathit{StatePatternCount} \left(i\right)}
\right|\quad for~all~ i
 \label{eqn-4}
\end{equation}$$]]></tex-math>
<mml:math id="mml-eqn-4" display="block"><mml:mi>e</mml:mi><mml:mi>w</mml:mi><mml:mn>4</mml:mn><mml:mstyle><mml:mtext>_</mml:mtext></mml:mstyle><mml:mi>T</mml:mi><mml:mi>D</mml:mi><mml:msub><mml:mrow><mml:mi>A</mml:mi></mml:mrow><mml:mrow><mml:mi>S</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mo>|</mml:mo><mml:mrow><mml:mfrac><mml:mrow><mml:mstyle displaystyle='true'><mml:mstyle displaystyle='true'><mml:msubsup><mml:mrow><mml:mo>&#x2211;</mml:mo> </mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mo lspace='0pt' rspace='0pt'>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>n</mml:mi><mml:mo lspace='0pt' rspace='0pt'>-</mml:mo><mml:mn>4</mml:mn></mml:mrow></mml:msubsup></mml:mstyle></mml:mstyle><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>e</mml:mi><mml:mi>w</mml:mi><mml:mn>4</mml:mn><mml:mstyle><mml:mtext>_</mml:mtext></mml:mstyle><mml:mi>T</mml:mi><mml:mi>D</mml:mi><mml:msub><mml:mrow><mml:mi>A</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mstyle mathvariant="italic"><mml:mi>T</mml:mi><mml:mi>o</mml:mi><mml:mi>t</mml:mi><mml:mi>a</mml:mi><mml:mi>l</mml:mi></mml:mstyle><mml:mstyle mathvariant="italic"><mml:mi>S</mml:mi><mml:mi>t</mml:mi><mml:mi>a</mml:mi><mml:mi>t</mml:mi><mml:mi>e</mml:mi><mml:mi>P</mml:mi><mml:mi>a</mml:mi><mml:mi>t</mml:mi><mml:mi>t</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mi>n</mml:mi><mml:mi>C</mml:mi><mml:mi>o</mml:mi><mml:mi>u</mml:mi><mml:mi>n</mml:mi><mml:mi>t</mml:mi></mml:mstyle><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac></mml:mrow><mml:mo>|</mml:mo></mml:mrow><mml:mspace width="1em"/><mml:mi>f</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mspace width=".3em" /><mml:mi>a</mml:mi><mml:mi>l</mml:mi><mml:mi>l</mml:mi><mml:mspace width=".3em" /><mml:mi>i</mml:mi></mml:math></alternatives></disp-formula>
<p>where, <inline-formula id="ieqn-29"><alternatives><inline-graphic xlink:href="ieqn-29.png"/><tex-math id="tex-ieqn-29"><![CDATA[$\mathrm{ew}4\_\mathrm{TDA}_{\mathrm{S}}$]]></tex-math><mml:math id="mml-ieqn-29"><mml:mstyle mathvariant="normal"><mml:mi>e</mml:mi><mml:mi>w</mml:mi></mml:mstyle><mml:mn>4</mml:mn><mml:mstyle class="text"><mml:mtext>_</mml:mtext></mml:mstyle><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>T</mml:mi><mml:mi>D</mml:mi><mml:mi>A</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>S</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula>: is value of tampering detection accuracy rate in state level, (0 &#x003c; ew4_<inline-formula id="ieqn-30"><alternatives><inline-graphic xlink:href="ieqn-30.png"/><tex-math id="tex-ieqn-30"><![CDATA[$\mathrm{TDA}_{\mathrm{S}} \leq 100$]]></tex-math><mml:math id="mml-ieqn-30"><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>T</mml:mi><mml:mi>D</mml:mi><mml:mi>A</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>S</mml:mi></mml:mstyle></mml:mrow></mml:msub><mml:mo>&#x2264;</mml:mo><mml:mn>100</mml:mn></mml:math></alternatives></inline-formula>).</p>
<p>After the tampering detection accuracy rate of every state has been produced; the weight of every state stored in the Markov matrix should be found as presented in <xref ref-type="disp-formula" rid="eqn-5">Eq. (5)</xref>.</p>
<p><disp-formula id="eqn-5">
<label>(5)</label>
<alternatives>
<graphic mimetype="image" mime-subtype="png" xlink:href="eqn-5.png"/>
<tex-math id="tex-eqn-5"><![CDATA[$$\begin{equation}
ew4\_{Sw}= \left| \frac{ ew4\_TDA_{S}(i)*\mathit{Transitions}~\mathit{frequency}(i)}{\mathit{total}~\mathit{number}~of~
\mathit{transitions}}\right|
 \label{eqn-5}
\end{equation}$$]]></tex-math>
<mml:math id="mml-eqn-5" display="block"><mml:mi>e</mml:mi><mml:mi>w</mml:mi><mml:mn>4</mml:mn><mml:mstyle><mml:mtext>_</mml:mtext></mml:mstyle><mml:mi>S</mml:mi><mml:mi>w</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>|</mml:mo><mml:mrow><mml:mfrac><mml:mrow><mml:mi>e</mml:mi><mml:mi>w</mml:mi><mml:mn>4</mml:mn><mml:mstyle><mml:mtext>_</mml:mtext></mml:mstyle><mml:mi>T</mml:mi><mml:mi>D</mml:mi><mml:msub><mml:mrow><mml:mi>A</mml:mi></mml:mrow><mml:mrow><mml:mi>S</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>*</mml:mo><mml:mstyle mathvariant="italic"><mml:mi>T</mml:mi><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mi>o</mml:mi><mml:mi>n</mml:mi><mml:mi>s</mml:mi></mml:mstyle><mml:mspace width=".3em" /><mml:mstyle mathvariant="italic"><mml:mi>f</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>q</mml:mi><mml:mi>u</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi><mml:mi>c</mml:mi><mml:mi>y</mml:mi></mml:mstyle><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mstyle mathvariant="italic"><mml:mi>t</mml:mi><mml:mi>o</mml:mi><mml:mi>t</mml:mi><mml:mi>a</mml:mi><mml:mi>l</mml:mi></mml:mstyle><mml:mspace width=".3em" /><mml:mstyle mathvariant="italic"><mml:mi>n</mml:mi><mml:mi>u</mml:mi><mml:mi>m</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi></mml:mstyle><mml:mspace width=".3em" /><mml:mi>o</mml:mi><mml:mi>f</mml:mi><mml:mspace width=".3em" /><mml:mstyle mathvariant="italic"><mml:mi>t</mml:mi><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mi>o</mml:mi><mml:mi>n</mml:mi><mml:mi>s</mml:mi></mml:mstyle></mml:mrow></mml:mfrac></mml:mrow><mml:mo>|</mml:mo></mml:mrow></mml:math></alternatives></disp-formula></p>
<p>where,</p>
<list list-type="simple">
<list-item><label>&#x2014;</label><p><inline-formula id="ieqn-31"><alternatives><inline-graphic xlink:href="ieqn-31.png"/><tex-math id="tex-ieqn-31"><![CDATA[$\mathrm{ew}4\_\mathrm{TDA}_{\mathrm{S}}$]]></tex-math><mml:math id="mml-ieqn-31"><mml:mstyle mathvariant="normal"><mml:mi>e</mml:mi><mml:mi>w</mml:mi></mml:mstyle><mml:mn>4</mml:mn><mml:mstyle class="text"><mml:mtext>_</mml:mtext></mml:mstyle><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>T</mml:mi><mml:mi>D</mml:mi><mml:mi>A</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>S</mml:mi></mml:mstyle></mml:mrow></mml:msub></mml:math></alternatives></inline-formula>: is the total tampering detection accuracy rate in state level for each unique sequence of four words.</p></list-item>
<list-item><label>&#x2014;</label><p><inline-formula id="ieqn-32"><alternatives><inline-graphic xlink:href="ieqn-32.png"/><tex-math id="tex-ieqn-32"><![CDATA[$\mathrm{i}\colon$]]></tex-math><mml:math id="mml-ieqn-32"><mml:mstyle mathvariant="normal"><mml:mi>i</mml:mi></mml:mstyle><mml:mo>:</mml:mo></mml:math></alternatives></inline-formula> is the count of all states in the given English text.</p></list-item>
</list>
<p>The final ew4_TDA of <italic>PET<sub>A</sub></italic> and <italic>OET<sub>P</sub></italic> are calculated by <xref ref-type="disp-formula" rid="eqn-6">Eq. (6)</xref>.</p>
<p><disp-formula id="eqn-6">
<label>(6)</label>
<alternatives>
<graphic mimetype="image" mime-subtype="png" xlink:href="eqn-6.png"/>
<tex-math id="tex-eqn-6"><![CDATA[$$\begin{equation}
ew4\_TDA= \left| \frac{\sum_{i=1}^{n-4}ew4\_TDA_{S}(i)}{N}\right|
 \label{eqn-6}
\end{equation}$$]]></tex-math>
<mml:math id="mml-eqn-6" display="block"><mml:mi>e</mml:mi><mml:mi>w</mml:mi><mml:mn>4</mml:mn><mml:mstyle><mml:mtext>_</mml:mtext></mml:mstyle><mml:mi>T</mml:mi><mml:mi>D</mml:mi><mml:mi>A</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>|</mml:mo><mml:mrow><mml:mfrac><mml:mrow><mml:mstyle displaystyle='true'><mml:mstyle displaystyle='true'><mml:msubsup><mml:mrow><mml:mo>&#x2211;</mml:mo> </mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo lspace='0pt' rspace='0pt'>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>n</mml:mi><mml:mo lspace='0pt' rspace='0pt'>-</mml:mo><mml:mn>4</mml:mn></mml:mrow></mml:msubsup></mml:mstyle></mml:mstyle><mml:mi>e</mml:mi><mml:mi>w</mml:mi><mml:mn>4</mml:mn><mml:mstyle><mml:mtext>_</mml:mtext></mml:mstyle><mml:mi>T</mml:mi><mml:mi>D</mml:mi><mml:msub><mml:mrow><mml:mi>A</mml:mi></mml:mrow><mml:mrow><mml:mi>S</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mi>N</mml:mi></mml:mrow></mml:mfrac></mml:mrow><mml:mo>|</mml:mo></mml:mrow></mml:math></alternatives></disp-formula></p>
<p>where,</p>
<list list-type="simple">
<list-item><label>&#x2014;</label><p><inline-formula id="ieqn-33"><alternatives><inline-graphic xlink:href="ieqn-33.png"/><tex-math id="tex-ieqn-33"><![CDATA[$\mathrm{ew}4\_\mathrm{TDA}$]]></tex-math><mml:math id="mml-ieqn-33"><mml:mstyle mathvariant="normal"><mml:mi>e</mml:mi><mml:mi>w</mml:mi></mml:mstyle><mml:mn>4</mml:mn><mml:mstyle class="text"><mml:mtext>_</mml:mtext></mml:mstyle><mml:mstyle mathvariant="normal"><mml:mi>T</mml:mi><mml:mi>D</mml:mi><mml:mi>A</mml:mi></mml:mstyle></mml:math></alternatives></inline-formula>: is the total tampering detection accuracy rate of a whole given text.</p></list-item>
<list-item><label>&#x2014;</label><p>N: represents the total number of non-zeros values in ew4_mm.</p></list-item>
</list>
<p>The rate of watermark distortion represents the amount of tampering attacks occurring on the contents of the attacked English context, which is denoted by ew4_WDR and calculated by <xref ref-type="disp-formula" rid="eqn-7">Eq. (7)</xref>.</p>
<p><disp-formula id="eqn-7">
<label>(7)</label>
<alternatives>
<graphic mimetype="image" mime-subtype="png" xlink:href="eqn-7.png"/>
<tex-math id="tex-eqn-7"><![CDATA[$$\begin{equation}
ew4\_WDR=1-ew4\_TDA*100
 \label{eqn-7}
\end{equation}$$]]></tex-math>
<mml:math id="mml-eqn-7" display="block"><mml:mi>e</mml:mi><mml:mi>w</mml:mi><mml:mn>4</mml:mn><mml:mstyle><mml:mtext>_</mml:mtext></mml:mstyle><mml:mi>W</mml:mi><mml:mi>D</mml:mi><mml:mi>R</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>-</mml:mo><mml:mi>e</mml:mi><mml:mi>w</mml:mi><mml:mn>4</mml:mn><mml:mstyle><mml:mtext>_</mml:mtext></mml:mstyle><mml:mi>T</mml:mi><mml:mi>D</mml:mi><mml:mi>A</mml:mi><mml:mo>*</mml:mo><mml:mn>100</mml:mn></mml:math></alternatives></disp-formula></p>
<p>The watermark detection algorithm is presented formally and executed as illustrated in Algorithm 5.</p>
<p><bold>Algorithm 5.</bold> Algorithm of watermark detection using HTAZWA</p>
<fig id="fig-15">
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-15.png"/>
</fig>
<p>where, ew4SW: refers to the weight value of states matched correctly and <inline-formula id="ieqn-35"><alternatives><inline-graphic xlink:href="ieqn-35.png"/><tex-math id="tex-ieqn-35"><![CDATA[$\mathrm{ew}4\_\mathrm{WDR}$]]></tex-math><mml:math id="mml-ieqn-35"><mml:mstyle mathvariant="normal"><mml:mi>e</mml:mi><mml:mi>w</mml:mi></mml:mstyle><mml:mn>4</mml:mn><mml:mstyle class="text"><mml:mtext>_</mml:mtext></mml:mstyle><mml:mstyle mathvariant="normal"><mml:mi>W</mml:mi><mml:mi>D</mml:mi><mml:mi>R</mml:mi></mml:mstyle></mml:math></alternatives></inline-formula>: refers to the value of watermark distortion rate (<inline-formula id="ieqn-36"><alternatives><inline-graphic xlink:href="ieqn-36.png"/><tex-math id="tex-ieqn-36"><![CDATA[$0 < \mathrm{ew4}\_\mathrm{WDR}_{\mathrm{S}} \leq 100$]]></tex-math><mml:math id="mml-ieqn-36"><mml:mn>0</mml:mn><mml:mo>&#x003C;</mml:mo><mml:mstyle mathvariant="normal"><mml:mi>e</mml:mi><mml:mi>w</mml:mi><mml:mn>4</mml:mn></mml:mstyle><mml:mstyle class="text"><mml:mtext>_</mml:mtext></mml:mstyle><mml:msub><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>W</mml:mi><mml:mi>D</mml:mi><mml:mi>R</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="normal"><mml:mi>S</mml:mi></mml:mstyle></mml:mrow></mml:msub><mml:mo>&#x2264;</mml:mo><mml:mn>100</mml:mn></mml:math></alternatives></inline-formula>).</p>
<p>The results of the watermark extraction and detection process are illustrated in <xref ref-type="fig" rid="fig-6">Fig. 6</xref>.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>Results of watermark extraction and detection process using HTAZWA 
</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-6.png"/>
</fig>
<p>As shown in <xref ref-type="fig" rid="fig-6">Fig. 6</xref>, TP1 represents 1st transition of non-zero in the given English text, TP2 represents 2nd transition, and so on. Some states have only one transition, which is shown in TP1. However, some states have more than one transition, which are represented in TP1, TP2, <inline-formula id="ieqn-37"><alternatives><inline-graphic xlink:href="ieqn-37.png"/><tex-math id="tex-ieqn-37"><![CDATA[$\ldots$]]></tex-math><mml:math id="mml-ieqn-37"><mml:mo>&#x2026;</mml:mo></mml:math></alternatives></inline-formula> etc. such as &#x201C;brown fox who is.&#x201D;</p>
</sec>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Implementation and Simulation</title>
<p>A variety of implementation and simulation are conducted to test the accuracy of HTAZWA output and tampering detection. This section outlines the settings for implementation and experimentation, conditions for experiments, typical dataset experimental scenarios, and a discussion of outcomes.</p>
<sec id="s4_1">
<label>4.1</label>
<title>Simulation and Implementation Environment</title>
<p>The self-developed software was developed to evaluate and assess the efficiency of HTAZWA. The HTAZWA implementing environment is: CPU: Intel Core i7-4650U/2.3 GHz, RAM: 8.0 GB, Windows 10&#x2013;64 bit, PHP VS Code IDE programming language.</p>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Simulation and Experimental Parameters</title>
<p><xref ref-type="table" rid="table-1">Tab. 1</xref> shows the experimental and simulation parameters and their associated values that were used to perform the experiments of the proposed HTAZWA approach.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Experimental and simulation parameters</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Parameters</th>
<th>Value</th>
</tr>
</thead>
<tbody>
<tr>
<td>English dataset size</td>
<td>[ESST, 179], [EMST, 421], [EHMST, 559] and [ELST, 2018]</td>
</tr>
<tr>
<td>Attack type</td>
<td>Insertion, deletion and rephrasing</td>
</tr>
<tr>
<td>Attack volumes</td>
<td>5%, 10%, 20% and 50%</td>
</tr>
<tr>
<td>Tampering detection accuracy</td>
<td>High with close to 100 Low with close to 0</td>
</tr>
<tr>
<td>ew4_TDA</td>
<td>(H if ew4_<inline-formula id="ieqn-38"><alternatives><inline-graphic xlink:href="ieqn-38.png"/><tex-math id="tex-ieqn-38"><![CDATA[$\mathrm{TDA}> 70$]]></tex-math><mml:math id="mml-ieqn-38"><mml:mstyle mathvariant="normal"><mml:mi>T</mml:mi><mml:mi>D</mml:mi><mml:mi>A</mml:mi></mml:mstyle><mml:mo>&#x003E;</mml:mo><mml:mn>70</mml:mn></mml:math></alternatives></inline-formula>, M if <inline-formula id="ieqn-39"><alternatives><inline-graphic xlink:href="ieqn-39.png"/><tex-math id="tex-ieqn-39"><![CDATA[$40 < \mathrm{ew4}$]]></tex-math><mml:math id="mml-ieqn-39"><mml:mn>40</mml:mn><mml:mo>&#x003C;</mml:mo><mml:mstyle mathvariant="normal"><mml:mi>e</mml:mi><mml:mi>w</mml:mi><mml:mn>4</mml:mn></mml:mstyle></mml:math></alternatives></inline-formula>_<inline-formula id="ieqn-40"><alternatives><inline-graphic xlink:href="ieqn-40.png"/><tex-math id="tex-ieqn-40"><![CDATA[$\mathrm{TDA}< 70$]]></tex-math><mml:math id="mml-ieqn-40"><mml:mstyle mathvariant="normal"><mml:mi>T</mml:mi><mml:mi>D</mml:mi><mml:mi>A</mml:mi></mml:mstyle><mml:mo>&#x003C;</mml:mo><mml:mn>70</mml:mn></mml:math></alternatives></inline-formula>, and L if ew4_<inline-formula id="ieqn-41"><alternatives><inline-graphic xlink:href="ieqn-41.png"/><tex-math id="tex-ieqn-41"><![CDATA[$\mathrm{TDA}< 40$]]></tex-math><mml:math id="mml-ieqn-41"><mml:mstyle mathvariant="normal"><mml:mi>T</mml:mi><mml:mi>D</mml:mi><mml:mi>A</mml:mi></mml:mstyle><mml:mo>&#x003C;</mml:mo><mml:mn>40</mml:mn></mml:math></alternatives></inline-formula>)</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4_3">
<label>4.3</label>
<title>Performance Metrics</title>
<p>The tampering detection accuracy refers to the performance of HTAZWA which is evaluated by the metrics below:
<list list-type="bullet">
<list-item><p>Precision for tampering identification (ew4_TDA) in all addressed assaults in all scenarios in English data size with many normal attack volumes of very low volume (5 percent), low volume (10 percent), medium volume (20 percent), and high volume (50 percent)</p></list-item>
<list-item><p>Accuracy of tampering detection refers to the performance and watermark fragility which its desired value is close to 100.</p></list-item>
<list-item><p>Diagnosis and outcome assessment of the influence of dataset size, the impact of attack types, and attack volume with the suggested HTAZWA method.</p></list-item>
</list></p>
</sec>
<sec id="s4_4">
<label>4.4</label>
<title>HTAZWA Simulation and Experiment Findings</title>
<p>In this portion, the author tests the accuracy of HTAZWA tampering detection. This dataset includes all English characters, numbers, spaces, and symbols. Experiments have been conducted with distinct dataset size and various kinds of frequency attacks as seen above in <xref ref-type="table" rid="table-1">Tab. 1</xref>.</p>
</sec>
<sec id="s4_5">
<label>4.5</label>
<title>Evaluation of Tampering Detection Accuracy (All Volumes)</title>
<p>To evaluate the accuracy of tampering detection of HTAZWA, scenarios of many studies are performed as shown in <xref ref-type="table" rid="table-2">Tab. 2</xref> for all forms of attacks and their volumes.</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Accuracy of tampering detection under all volumes</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Attack volume (%)</th>
<th>Insertion</th>
<th>Deletion</th>
<th>Reorder</th>
</tr>
</thead>
<tbody>
<tr>
<td>5</td>
<td>93.75</td>
<td>90.53</td>
<td>78.13</td>
</tr>
<tr>
<td>10</td>
<td>89.50</td>
<td>83.33</td>
<td>64.45</td>
</tr>
<tr>
<td>20</td>
<td>81.47</td>
<td>72.01</td>
<td>45.28</td>
</tr>
<tr>
<td>s50</td>
<td>64.49</td>
<td>40.65</td>
<td>20.52</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The results shown in <xref ref-type="table" rid="table-2">Tab. 2</xref> and <xref ref-type="fig" rid="fig-7">Fig. 7</xref> show the insertion attack outperforms deletion and reorder attacks  in all cases of attack volumes 5%, 10%, 20%, and 50%. Results show also deletion attack outperforms reorder attack in all cases of attack volumes. In other meaning, the low effect is detected under insertion and deletion attacks and the high effect is detected under reorder attack in all experimental scenarios under all attack volumes. This means that HTAZWA gives the best detection accuracy under insertion attack in all scenarios of attack volumes.</p>
<fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>Tampering impact under all attacks of many volumes</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-7.png"/>
</fig>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Comparison and Result Discussion</title>
<p>The tampering detection accuracy results were critically analysed. The study impact is investigated and comparisons between HTAZWA and baseline approaches ZWAFWMMM and HNLPZWA showed their effect under the major factors (i.e., dataset size, attack types, and volumes).</p>
<sec id="s5_1">
<label>5.1</label>
<title>Baseline Approaches</title>
<p>The efficiency and accuracy of HTAZWA were contrasted with HNLPZWA (an intelligent hybrid of natural language processing and zero-watermarking approach) [<xref ref-type="bibr" rid="ref-5">5</xref>] and ZWAFWMM (zero watermark approach based on the fourth Markov model order and Arabic word mechanism) [<xref ref-type="bibr" rid="ref-30">30</xref>]. Comparisons are made under all success indicators to assess which method has the best accuracy in the identification of tampering. The following sub-sections describe the basic methods and their operating parameters.</p>
</sec>
<sec id="s5_2">
<label>5.2</label>
<title>Comparison Results</title>
<p>This subdivision provides a comparison of HTAZWA, ZWAFWMMM and HNLPZWA approaches and analyses their results in conjunction with key affected variables i.e., scale of datasets, kinds of attacks, and volumes.</p>
<sec id="s5_2_1">
<label>5.2.1</label>
<title>Comparison Results of Dataset Size Impact</title>
<p>The comparative results shown in <xref ref-type="fig" rid="fig-8">Fig. 8</xref> reflect the tampering detection accuracy of HTAZWA approach. The results show that in the proposed HTAZWA approach, the highest effects of dataset size that lead to the best tampering detection accuracy with insertion and deletion attacks systematically are ordered as ESST, ELST, EMST, and EHMST, respectively. However, it is differing in the case of reordering attacks. This means that the tampering detection accuracy increased with decreasing document size and decreased with increasing document size. On the other hand, results show that HTAZWA approach outperforms both ZWAFWMMM and HNLPZWA approaches in terms of tampering detection accuracy under all scenarios of mid and large dataset size (EMST, EHMST, and ELST) except in the case of small dataset size (ESST).</p>
<fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>Dataset impact on tampering detection accuracy based on HTAZWA and other approaches</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-8.png"/>
</fig>
</sec>
<sec id="s5_2_2">
<label>5.2.2</label>
<title>Comparison Results of Attack Type Impact</title>
<p><xref ref-type="fig" rid="fig-9">Fig. 9</xref> shows how the tampering detection accuracy of HTAZWA, ZWAFWMMM, and HNLPZWA approaches are influenced by the type of tampering attacks. In all cases of insertion, deletion, and reorder attacks, HTAZWA outperforms ZWAFWMMM and HNLPZWA approaches with a high rate of tampering detection accuracy. This means that the proposed HTAZWA approach is strongly recommended and applicable for content authentication and tampering detection of English text under all attack types.</p>
<fig id="fig-9">
<label>Figure 9</label>
<caption>
<title>Attack impact on tampering detection accuracy based on HTAZWA and baseline approaches</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-9.png"/>
</fig>
</sec>
<sec id="s5_2_3">
<label>5.2.3</label>
<title>Comparison Results of Attack Volume Impact</title>
<p><xref ref-type="fig" rid="fig-10">Fig. 10</xref> shows how the tampering detection accuracy is influenced by low, mid, and high attack volumes. In all cases of HTAZWA, ZWAFWMMM, and HNLPZWA approaches, it has been seen that if the attack volume increases, the tampering detection accuracy also increases. However, if the attack volume decreases, the tampering detection accuracy also decreases. In all cases of low, mid, and high attack volumes, it has been seen HTAZWA outperforms ZWAFWMMM and HNLPZWA approaches in terms of tampering detection accuracy in all scenarios of low, mid, and high volumes of all attacks. This means that HTAZWA approach is strongly recommended and applicable for content authentication and tampering detection of English text documents under all volumes of all attacks.</p>
<fig id="fig-10">
<label>Figure 10</label>
<caption>
<title>Attack rates impact on tampering detection accuracy of HTAZWA and baseline approaches 
</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-10.png"/>
</fig>
</sec>
</sec>
</sec>
<sec id="s6">
<label>6</label>
<title>Conclusion</title>
<p>HTAZWA approach is implemented in PHP programming language using VS code IDE. The experiments are performed on various standard datasets under different volumes of insertion, deletion, and reorder attacks. HTAZWA has been compared with ZWAFWMMM and HNLPZWA approaches. The comparison results show that HTAZWA outperforms ZWAFWMMM and HNLPZWA approaches in terms of the accuracy of tampering detection. The results also show that HTAZWA applies to all English alphabetic letters, special characters, numbers, and spaces. For future work, the improvement of detection accuracy should be considered for all kinds of attacks.</p>
</sec>
</body>
<back>
<fn-group><fn fn-type="other"><p><bold>Funding Statement:</bold> The author extends his appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number (R. G. P. 2/55/40 /2019), Received by Fahd N. Al-Wesabi. <uri xlink:href="www.kku.edu.sa">www.kku.edu.sa</uri>.</p></fn>
<fn fn-type="conflict"><p><bold>Conflicts of Interest:</bold> The author declares that he has no conflicts of interest to report regarding the present study.</p></fn></fn-group>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F. N.</given-names> <surname>Al-Wesabi</surname></string-name></person-group>, &#x201C;<article-title>A smart English text zero-watermarking approach based on third-level order and word mechanism of Markov model</article-title>,&#x201D; <source>Computers, Materials &#x0026; Continua</source>, vol. <volume>65</volume>, no. <issue>2</issue>, pp. <fpage>1137</fpage>&#x2013;<lpage>1156</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Abd-Eldayem</surname></string-name></person-group>, &#x201C;<article-title>A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine</article-title>,&#x201D; <source>Egyptian Informatics Journal</source>, vol. <volume>14</volume>, no. <issue>1</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>13</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F. N.</given-names> <surname>Al-Wesabi</surname></string-name></person-group>, &#x201C;<article-title>A hybrid intelligent approach for content authentication and tampering detection of Arabic text transmitted via Internet</article-title>,&#x201D; <source>Computers, Materials &#x0026; Continua</source>, vol. <volume>66</volume>, no. <issue>1</issue>, pp. <fpage>195</fpage>&#x2013;<lpage>2011</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. G.</given-names> <surname>Rizzo</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Bertini</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Montesi</surname></string-name></person-group>, &#x201C;<article-title>Fine-grain watermarking for intellectual property protection</article-title>,&#x201D; <source>EURASIP Journal on Information Security</source>, vol. <volume>10</volume>, no. <issue>1</issue>, pp. <fpage>804</fpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F. N.</given-names> <surname>Al-Wesabi</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Mahmood</surname></string-name> and <string-name><given-names>N.</given-names> <surname>Nemri</surname></string-name></person-group>, &#x201C;<article-title>A zero watermarking approach for content authentication and tampering detection of Arabic text based on fourth level order and word mechanism of Markov model</article-title>,&#x201D; <source>Journal of Information Security and Applications</source>, vol. <volume>52</volume>, no. <issue>1</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>15</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Cao</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Zhou</surname></string-name>, <string-name><given-names>Q.</given-names> <surname>Wu</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Yuan</surname></string-name> and <string-name><given-names>X.</given-names> <surname>Sun</surname></string-name></person-group>, &#x201C;<article-title>Coverless information hiding based on the generation of anime characters</article-title>,&#x201D; <source>EURASIP Journal on Image and Video Processing</source>, vol. <volume>36</volume>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Cao</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Zhou</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Sun</surname></string-name> and <string-name><given-names>C.</given-names> <surname>Gao</surname></string-name></person-group>, &#x201C;<article-title>Coverless information hiding based on the molecular structure images of material</article-title>,&#x201D; <source>Computers, Materials and Continua</source>, vol. <volume>54</volume>, no. <issue>2</issue>, pp. <fpage>197</fpage>&#x2013;<lpage>207</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Cao</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Zhou</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Yang</surname></string-name> and <string-name><given-names>X.</given-names> <surname>Sun</surname></string-name></person-group>, &#x201C;<article-title>Dynamic content selection framework applied to coverless information hiding</article-title>,&#x201D; <source>Journal of Internet Technology</source>, vol. <volume>19</volume>, no. <issue>4</issue>, pp. <fpage>1179</fpage>&#x2013;<lpage>1186</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Qin</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Chang</surname></string-name> and <string-name><given-names>T.</given-names> <surname>Hsu</surname></string-name></person-group>, &#x201C;<article-title>Fragile watermarking for image authentication with high-quality recovery capability</article-title>,&#x201D; <source>KSII Transactions on Internet and Information Systems</source>, vol. <volume>7</volume>, no. <issue>11</issue>, pp. <fpage>2941</fpage>&#x2013;<lpage>2956</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Parah</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Sheikh</surname></string-name> and <string-name><given-names>G.</given-names> <surname>Bhat</surname></string-name></person-group>, <source>StegNmark: A Joint Stego-watermark Approach for Early Tamper Detection</source>. Vol. <volume>660</volume>. <publisher-loc>Switzerland</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>, pp. <fpage>427</fpage>&#x2013;<lpage>452</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Hakak</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Kamsin</surname></string-name>, <string-name><given-names>O.</given-names> <surname>Tayan</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Yamani</surname></string-name> and <string-name><given-names>G.</given-names> <surname>Gilkar</surname></string-name></person-group>, &#x201C;<article-title>Approaches for preserving content integrity of sensitive online Arabic content</article-title>,&#x201D; <source>Information Processing and Management</source>, vol. <volume>56</volume>, no. <issue>2</issue>, pp. <fpage>367</fpage>&#x2013;<lpage>380</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Taleby</surname></string-name>, <string-name><given-names>Q.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Zhu</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Alazab</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title> A Novel intelligent text watermarking technique for forensic identification of information on social media</article-title>,&#x201D; <source>Computers and Security</source>, vol. <volume>90</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>14</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Parah</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Sheikh</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Akhoon</surname></string-name> and <string-name><given-names>N.</given-names> <surname>Loan</surname></string-name></person-group>, &#x201C;<article-title>Electronic health record hiding in images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication</article-title>,&#x201D; <source>Future Generation Computer Systems</source>, vol. <volume>108</volume>, no. <issue>6</issue>, pp. <fpage>935</fpage>&#x2013;<lpage>949</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Ahmed</surname></string-name> and <string-name><given-names>L.</given-names> <surname>Elrefaei</surname></string-name></person-group>, &#x201C;<article-title>Arabic text watermarking: A review</article-title>,&#x201D; <source>International Journal of Artificial Intelligence &#x0026; Applications</source>, vol. <volume>6</volume>, no. <issue>4</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>16</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Hameed</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Khan</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Ahmed</surname></string-name> and <string-name><given-names>A. G.</given-names> <surname>Reddy</surname></string-name></person-group>, &#x201C;<article-title>Towards a formally verified zero watermarking scheme for data integrity in the internet of things based-wireless sensor networks</article-title>,&#x201D; <source>Future Generation Computer Systems</source>, vol. <volume>167</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>16</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Alotaibi</surname></string-name> and <string-name><given-names>L.</given-names> <surname>Elrefaei</surname></string-name></person-group>, &#x201C;<article-title>Improved capacity text watermarking methods based on open word space</article-title>,&#x201D; <source>Journal of King Saud University&#x2014;Computer and Information Sciences</source>, vol. <volume>30</volume>, no. <issue>2</issue>, pp. <fpage>236</fpage>&#x2013;<lpage>248</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Memon</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Shah</surname></string-name></person-group>, &#x201C;<article-title>A novel text steganography technique to Arabic language using reverse fat5th5ta</article-title>,&#x201D; <source>Pakistan Journal of Engineering, Technology and Sciences</source>, vol. <volume>1</volume>, no. <issue>2</issue>, pp. <fpage>106</fpage>&#x2013;<lpage>113</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Alginahi</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Kabir</surname></string-name> and <string-name><given-names>O.</given-names> <surname>Tayan</surname></string-name></person-group>, &#x201C;<article-title>An enhanced Kashida-based watermarking approach for increased protection in Arabic text-documents based on frequency recurrence of characters</article-title>,&#x201D; <source>International Journal of Computer and Electrical Engineering</source>, vol. <volume>6</volume>, no. <issue>5</issue>, pp. <fpage>381</fpage>&#x2013;<lpage>392</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Shaker</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Ridzuan</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Pitchay</surname></string-name></person-group>, &#x201C;<article-title>Text steganography using extensions Kashida based on moon and sun letters</article-title>,&#x201D; <source>International Journal of Advanced Computer Science and Applications</source>, vol. <volume>8</volume>, no. <issue>8</issue>, pp. <fpage>286</fpage>&#x2013;<lpage>290</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Rahma</surname></string-name>, <string-name><given-names>W.</given-names> <surname>Bhaya</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Al-Nasrawi</surname></string-name></person-group>, &#x201C;<article-title>Text steganography based on unicode of characters in multilingual</article-title>,&#x201D; <source>Journal of Engineering Research and Applications</source>, vol. <volume>3</volume>, no. <issue>4</issue>, pp. <fpage>1153</fpage>&#x2013;<lpage>1165</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Al-maweri</surname></string-name>, <string-name><given-names>W.</given-names> <surname>Adnan</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Rahman</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Khair</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Syed</surname></string-name></person-group>, &#x201C;<article-title>Robust digital text watermarking algorithm based on unicode characters</article-title>,&#x201D; <source>Indian Journal of Science and Technology</source>, vol. <volume>9</volume>, no. <issue>48</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>14</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Bashardoost</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Rahim</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Saba</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Rehman</surname></string-name></person-group>, &#x201C;<article-title>Replacement attack: A new zero text watermarking attack</article-title>,&#x201D; <source>3D Research</source>, vol. <volume>8</volume>, no. <issue>1</issue>, <year>2017</year>. <uri xlink:href="https://doi.org/10.1007/s13319-017-0118-y">https://doi.org/10.1007/s13319-017-0118-y</uri>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Liu</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Zhu</surname></string-name> and <string-name><given-names>G.</given-names> <surname>Xin</surname></string-name></person-group>, &#x201C;<article-title>A zero-watermarking algorithm based on merging features of sentences for Chinese text</article-title>,&#x201D; <source>Journal of the Chinese Institute of Engineers</source>, vol. <volume>38</volume>, no. <issue>3</issue>, pp. <fpage>391</fpage>&#x2013;<lpage>398</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Zhu</surname></string-name>, <string-name><given-names>W.</given-names> <surname>Song</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Zhang</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Tao</surname></string-name></person-group>, &#x201C;<article-title>A text zero watermarking algorithm based on Chinese phonetic alphabets</article-title>,&#x201D; <source>Wuhan University Journal of Natural Sciences</source>, vol. <volume>21</volume>, no. <issue>4</issue>, pp. <fpage>277</fpage>&#x2013;<lpage>282</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Z.</given-names> <surname>Ali</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Shamim</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Muhammad</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Aslam</surname></string-name></person-group>, &#x201C;<article-title>New zero-watermarking algorithm using hurst exponent for protection of privacy in telemedicine</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>6</volume>, pp. <fpage>7930</fpage>&#x2013;<lpage>7940</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>O.</given-names> <surname>Tayan</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Alginahi</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Kabir</surname></string-name></person-group>, &#x201C;<article-title>An adaptive zero-watermarking approach for text documents protection</article-title>,&#x201D; <source>International Journal of Image Processing Techniques</source>, vol. <volume>1</volume>, no. <issue>1</issue>, pp. <fpage>33</fpage>&#x2013;<lpage>36</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Ghilan</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Ba-Alwi</surname></string-name> and <string-name><given-names>F. N.</given-names> <surname>Al-Wesabi</surname></string-name></person-group>, &#x201C;<article-title>Combined Markov model and zero watermarking to enhance authentication of Arabic text</article-title>,&#x201D; <source>Journal of Computational Linguistics Research</source>, vol. <volume>5</volume>, no. <issue>1</issue>, pp. <fpage>26</fpage>&#x2013;<lpage>42</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F. N.</given-names> <surname>Al-Wesabi</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Alsakaf</surname></string-name> and <string-name><given-names>K. U.</given-names> <surname>Vasantrao</surname></string-name></person-group>, &#x201C;<article-title>A zero text watermarking algorithm based on the probabilistic patterns for content authentication of text documents</article-title>,&#x201D; <source>International Journal of Computer Engineering &#x0026; Technology</source>, vol. <volume>4</volume>, no. <issue>1</issue>, pp. <fpage>284</fpage>&#x2013;<lpage>300</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Ahmed</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Khodher</surname></string-name></person-group>, &#x201C;<article-title>Comparison of eight proposed security methods using linguistic steganography text</article-title>,&#x201D; <source>Journal of Computing &#x0026; Information Sciences</source>, vol. <volume>12</volume>, no. <issue>2</issue>, pp. <fpage>243</fpage>&#x2013;<lpage>251</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F. N.</given-names> <surname>Al-Wesabi</surname></string-name></person-group>, &#x201C;<article-title>Proposing high-smart approach for content authentication and tampering detection of Arabic text transmitted via Internet</article-title>,&#x201D; <source>IEICE transactions in Information Systems</source>, vol. <volume>E103</volume>, no. <issue>10</issue>, <year>2020</year>.</mixed-citation></ref>
</ref-list>
</back>
</article>