Contents & References of Protection of unauthorized copying (copyright) of digital texts using the method of concealing the distance between carrier lines and comparing the position of the key in the text.
List:
Chapter One: General Research
1-1- Introduction .. 3
1-2- Definition of cryptography. 4
1-2-1- Terminology in cryptography. 5
1-2-2- History of cryptography. 5
1-3- Definition of cryptography. 8
1-4- The difference between encryption and encryption. 8
1-5- Definition of cryptography. 10
1-5-1- The history of cryptography. 11
1-5-2- The difference between cryptography and cryptography. 11
1-5-3- Host environment. 11
1-6- Outline of encryption algorithms. 12
1-7- Necessary analyzes to choose the encryption method. 12
1-8-Evaluation parameters of encryption algorithms. 13
1-9-The basis of cryptography methods. 14
1-10- Typography. 14
1-11- Stegaanalysis or covert detection. 15
1-12- Encryption attacks. 17
1-13- practical applications of digital cryptography. 17
1-14- Copyright signs. 19
1-15- Digital encryption in the text. 20
1-16- Types of encryption methods in the text in general. 21
1-16-1- The method of inserting space. 21
1-16-2-Meaning method. 22
1-16-3- Content method. 22
1-16-4- Based on the characteristics. 23
Chapter Two: Review of Literature and Research Background
2-1- Review of several encryption methods in digital texts. 24
2-2- Point insertion method. 24
2-2-1- General description of the method. 24
2-2-2- Conclusion .. 26
2-3- The method of changing the shape of letters. 28
2-3-1- Description of the method .. 28
2-3-2- Conclusion. 30
2-4 insertion of stretch character between characters of words. 31
2-4-1 Description of the method .. 31
2-4-2- Conclusion. 33
2-5- The developed method of inserting the stretch character between the characters of the words. 33
2-5-1 Description of the method .. 33
2-5-2- Conclusion .. 34
2-6- Improved method "La". 35
2-6-1- Description of the method. 35
2-6-2- Conclusion. 36
2-7- Method of inserting characters without length between words. 36
2-7-1-Description of the method. 36
2-7-2- Conclusion. 37
2-8- Block encryption method between words. 38
2-8-1- Description of the method. 38
2-8-2- Conclusion.. 39
2-9- Text character grouping method (NP-UniCh). 40
2-9-1- Description of the method. 40
2-9-2- Conclusion. 41
2-10- Method of two-bit grouping of text characters. 42
2-10-1- Description of the method. 42
2-10-2- Conclusion. 42
2-11- Using other forms of characters in different fonts. 43
2-11-1- Description of the method .. 43
2-11-2- Conclusion. 45
2-12- Cryptography based on changing the angle of words. 45
2-12-1 Description of the method.. 45
2-12-2- Conclusion. 47
2-13- Insertion of invisible characters in Latin texts. 47
2-13-1- Description of the method..47
2-13-2- Conclusion. 49
2-14- Inserting special spaces in different positions. 50
2-14-1- Description of the method .. 50
2-14-2 Conclusion .. 51
Chapter Two: Research implementation method
3-1- Generalities of the proposed method 53
3-2- An overview of the Unicode standard. 54
3-2-1- Determination of character codes. 54
3-2-2- types of encoding forms. 55
3-2-3- Farsi/Arabic Unicode. 55
3-2-4- Unicode control characters. 56
3-3- The general process of encryption and message extraction in this treatise. 56
3-4- The description of the secret writing method in this treatise. 58
3-4-1-converting the code message into binary equivalent. 58
3-4-2 inserting and marking the code message. 59
3-4-3 discovering and extracting the code message. 60
Chapter Four: Data Analysis
4-1- Check the tests of the proposed algorithm. 62
4-2-Results and discussion on the results. 62
4-3- Investigating encryption parameters based on the results of the algorithm execution. 63
4-3-1-Resistance against change attacks. 63
4-3-2- Encrypted capacity. 64
4-3-3- Encrypted file size. 65
4-3-4- Transparency (compatibility with the host file). 65
4-3-5- vulnerability to attacks. 66
4-3-6- limitations and shortcomings. 67
4-4- review of the method algorithm. 67
4-4-1- cryptography algorithm. 67
4-4-2- time complexity calculation67
4-4-2- Calculation of the time complexity of the encryption algorithm. 68
4-4-3- Message recovery algorithm. 68
4-4-4- Time complexity calculation of the message recovery algorithm. 68
4-5- The diagram of the application of the cryptographic message encryption operation. 69
4-6-The application diagram of password message recovery operation. 70
Chapter Five: Conclusions and Suggestions
5-1- Summary of the research. 72
5-2- Conclusion. 73
List of English sources. 74
Appendix
Appendix 1: Algorithm class proposed in this research. 81
English abstract. 87
Source:
1. Nicholas F. Maxemchuk, Steven H. Low, Aleta M. Lapone, (MARCH 1998), "Document Identification for Copyright Protection Using Centroid Detection", IEEE TRANSACTIONS ON COMMUNICATIONS, pp. 372-383.
2. Hardikkumar, Pacheri Beri (December 2012), "Steganography, Cryptography, Watermarking: A Comparative Study", Journal of Global Research in Computer Science (JGRCS), pp. 33-35.
3. N. Proros and P. Honeyman, (2003), "Hide and seek: An Introduction to Steganography", IEEE: security & Privacy, vol. 10, pp. 32-44.
4.Polymnia, J. M. Dent & Sons,) 1992( , »Herodotus, The Histories«, chap. 5 - The fifth book entitled Terpsichore, 7 - The seventh book entitled, Ltd.
5. Ms. Monika Patel, (November 1, 2012), "Analytical Study of Line-Shift Text watermarking Technique", International Journal of Computer Applications & Information Technology (IJCAIT), pp. 84-87. 6. R. Prasad and K. Alla, (2004), "Steganography And Digital Watermarking", Jonathan Cummins, Samuel Lau and Robert Parlett, School of Computer Science. WATERMARKING, International Journal of Research in IT & Management, pp. 1-12.
8. A. Manikandan and Dr. T. Meyyappan, (June 2012), "WATERMARKING TECHNIQUES", International Journal of Computers & Technology (IJCT), vol 2. pp. 122-124.
9. Yusuf Perwej, Firoj Parwej, Asif Perwej, (April 2012), "An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection", The International Journal of Multimedia & Its Applications (IJMA), pp. 21-38.
10. Mr. Mali Makarand Lotan, Mr. Suryavanshi Hitendra Eknath and Mr. Nitin N Patil, (April 2012), "Angle based digital watermarking of text document", National Conference on Emerging Trends in Information Technology (NCETIT), pp. 171-175.
11. Zunera Jalil and Anwar M. Mirza, December 2009, "A Review of Digital Watermarking Techniques for Text Documents", International Conference on Information and Multimedia Technology (ICIMT) IEEE, pp.330-334.
12. Xinmin Zhou, Weidong Zhao, Zhicheng Wang, Li Pan. Mohammad Shirali-Shahreza2, (December 2009), »ARABIC/PERSIAN TEXT STEGANOGRAPHY UTILIZING SIMILAR LETTERS WITH DIFFERENT CODES«, The Arabian Journal for Science and Engineering, Volume 35, pp.213-222.
15. Nikita Pande, Sayani Nandy, Shelly Sinha Choudhury, (October 2012), "Alternative Shift Algorithm for Digital Watermarking on Text «, International Journal of Scientific and Research Publications.
16. Xinmin Zhou, Zhicheng Wang, Weidong Zhao, Sichun Wang, Jianping Yu, (November 2009), »Performance Analysis and Evaluation of TextWatermarking«, IEEE TRANSACTIONS.
17. Zunera Jalil, Anwar M. Mirza, Maria Sabir, (2010), "Content based Zero-Watermarking Algorithm for Text Documents". (IJCSIS) International Journal of Computer Science and Information Security, pp.212-217.
18. David J.