Research Article

A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

Table 2

Comparison of features and benefits between watermarking methods.

Concept/metricTraditional watermark approachesZero-watermarking approach [1]Zero-watermarking approach [35]Zero-watermarking approach [34]Zero-watermarking approach [33, 36]Proposed watermarking method

Overhead (additional)Proportional to embedded key sizeNoneNoneNoneNoneNone

Embedding modeFormat-encodingLogical: zero-watermark encodingLogical: zero-watermark encodingLogical: zero-watermark encodingLogical: zero-watermark encodingLogical: zero-watermark encoding

Location of watermark message ()Embedded in Embedded in Embedded in Embedded in Embedded in Embedded in

Processing and embedding decisionBased on searching through text for candidate words, lines, and spacesBased on double-letter words in English languageBased on sentence entropyBased on the first letter with specific word lengthsBased on comparing Unicode summations Based on comparing Unicode summations and logical operations

Compatible with various formats?LimitedYes, only English character support neededSupports Chinese language onlySupports English language onlyYes, host-document language character support/Unicode neededYes, host-document language character support/Unicode needed

Language-dependentNo Yes YesYesNoNo

Document- authenticity verificationNoYesYesYesYesYes

Tamper-detection and identification capabilitiesNoNoNoYesNoYes

Integrity robustnessWeakStrong Strong Strong Strong Strong

Perceptibility performanceLow-mediumHighHighHighHighHigh

Capacity ratio performance Inversely proportional to perceptual similarityHighHighHighHighHigh

Capability to extract publishers watermark logoNoYesNoNoNoYes