Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 17 , Issue 2 , PP: 23-33, 2026 | Cite this article as | XML | Html | PDF | Full Length Article

Integration of Crayfish Optimization with Watermarking Scheme for Automated Tampering Text Detection

Hanan T. Halawani 1 *

  • 1 Department of Computer Science, College of Computer Science and Information Systems, Najran University, Najran, 61441, Saudi Arabia - (Hthalawani@nu.edu.sa)
  • Doi: https://doi.org/10.54216/JCIM.170203

    Received: April 02, 2025 Revised: June 24, 2025 Accepted: August 13, 2025
    Abstract

    Digital text document serves as the essence of existing communication but still pose major safety concerns on their vulnerability to tampering. Digital text watermarking acts as a powerful tool to secure the reliability of textual data. Presenting a hidden layer of safety and accountability enables organizations and individuals to make sure of the truth behind each file and trust the written word. Watermarking detects tampering by checking the embedded signature for changes or distortions. The Watermark model is capable of mechanically repairing and classifying themselves once tampered with, enhancing document resilience. Watermarking is an effective mechanism to identify tampering attacks in digital documents. The specialized process of embedding imperceptible and strong watermarks in document creation or distribution detects alterations. This study proposes the Crayfish Optimization with a Watermarking Scheme for Automated Tampering Text Detection (CFOWS-ATTD) technique. The major purpose of the CFOWS-ATTD technique is to accomplish the security of English text using content authentication and tampering detection. In the CFOWS-ATTD technique, two-stage processes are involved. Moreover, the CFOWS-ATTD technique generates a watermark from the text document and performs extraction to verify text authenticity. Furthermore, the CFO approach optimally places the watermark to ensure it remains robust and imperceptible to tampering. The experimentation of the CFOWS-ATTD approach is performed under the ELST, ESST, EHMST, and EMST datasets. The results implied that the CFOWS-ATTD approach obtains optimum performance over other techniques.

    Keywords :

    Digital Watermarking , Tampering Text Detection , Crayfish Optimization , Text Authentication , Embedding

    References

    [1]       Singh and M. K. Sharma, "Tamper detection technique for document images using zero watermarking in the wavelet domain," Comput. Electr. Eng., vol. 89, Jan. 2021, Art. no. 106925.

     

    [2]       Y. Liu, Z. Wang, and H. Zhang, "Robust text watermarking based on semantic analysis and syntactic transformation," IEEE Trans. Inf. Forensics Security, vol. 16, pp. 4568-4582, 2021, doi: 10.1109/TIFS.2021.3107462.

     

    [3]       X. Wang and Y. Jin, "A high-capacity text watermarking method based on geometric micro-distortion," in Proc. 26th Int. Conf. Pattern Recognit. (ICPR), Aug. 2022, pp. 1749-1755.

     

    [4]       S. Abdelnabi and M. Fritz, "Adversarial watermarking transformer: Towards tracing text provenance with data hiding," in Proc. IEEE Symp. Secur. Privacy (SP), May 2021, pp. 121-140.

     

    [5]       K. Chen, L. Wang, and X. Li, "A zero-watermarking scheme for Chinese text documents based on stroke modulation," J. Inf. Secur. Appl., vol. 55, p. 102647, 2020, doi: 10.1016/j.jisa.2020.102647.

     

    [6]       S. Parah, J. Sheikh, J. Akhoon, and N. Loan, "Electronic health record hiding in images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication," Future Gener. Comput. Syst., vol. 108, pp. 935-949, 2020.

     

    [7]       N. Mir and M. A. U. Khan, "Copyright protection for online text information: Using watermarking and cryptography," in Proc. 3rd Int. Conf. Comput. Appl. Inf. Secur. (ICCAIS), Mar. 2020, pp. 1-4.

     

    [8]       M. Abd-Eldayem, "A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine," Egypt. Inform. J., vol. 14, no. 1, pp. 1-13, 2013.

     

    [9]       Y. Chou, K. Anggriani, N. Wu, and M. Hwang, "Research on E-book text copyright protection and anti-tampering technology," Int. J. Netw. Secur., vol. 23, no. 5, pp. 739-749, 2021.

     

    [10]    Qu et al., "Towards robust tampered text detection in document image: New dataset and new solution," in Proc. IEEE/CVF Conf. Comput. Vis. Pattern Recognit., 2023, pp. 5937-5946.

     

    [11]    M. A. Alohali et al., "Digital text document watermarking based tampering attack detection via Internet," Comput. Syst. Sci. Eng., vol. 48, no. 3, 2024.

     

    [12]    M. Jana, B. Jana, and S. Joardar, "Local feature-based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic," J. King Saud Univ.-Comput. Inf. Sci., vol. 34, no. 10, pp. 9822-9835, 2022.

     

    [13]    K. Sahu, M. Sahu, P. Patro, G. Sahu, and S. R. Nayak, "Dual image-based reversible fragile watermarking scheme for tamper detection and localization," Pattern Anal. Appl., vol. 26, no. 2, pp. 571-590, 2023.

     

    [14]    Palani and A. Loganathan, "Semi-blind watermarking using convolutional attention-based turtle shell matrix for tamper detection and recovery of medical images," Expert Syst. Appl., vol. 238, p. 121903, 2024.

     

    [15]    H. Shi, K. Yan, J. Geng, and Y. Ren, "A cross-embedding based medical image tamper detection and self-recovery watermarking scheme," Multimedia Tools Appl., pp. 1-42, 2023.

     

    [16]    H. Rhayma, R. Ejbali, and H. Hamam, "Auto-authentication watermarking scheme based on CNN and perceptual hash function in the wavelet domain," Multimedia Tools Appl., pp. 1-23, 2024.

     

    [17]    M. Alamgeer et al., "Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text, Comput” Mater. Continua, vol. 71, no. 2, 2022.

     

    [18]    S. Bhalerao, I. A. Ansari, and A. Kumar, "A reversible medical image watermarking for ROI tamper detection and recovery," Circuits, Syst., Signal Process., vol. 42, no. 11, pp. 6701-6725, 2023.

     

    [19]    L. Ma, B. Xie, F. Liu, and L. Ma, "A Method of Applying Virtual Reality Converged Remote Platform Based on Crawfish Optimization Algorithm to Improve ESN Network," EAI Endorsed Trans. Scalable Inf. Syst., vol. 11, no. 3, 2024.

     

    [20]    N. Al-Wesabi, "Text analysis-based watermarking approach for tampering detection of English text, Comput” Mater. Continua, vol. 67, no. 3, pp. 3701-3719, 2021.

     

    [21]    N. Al-Wesabi et al., "Heuristic Optimization Algorithm Based Watermarking on Content Authentication and Tampering Detection for English Text," IEEE Access, 2023.

     

    [22]    M. Zhang, R. Yang, and W. Huang, "Digital document protection using optimized watermarking with tamper localization and recovery," Multimedia Tools Appl., vol. 79, no. 35, pp. 25891-25912, 2020, doi: 10.1007/s11042-020-09176-w.

    Cite This Article As :
    T., Hanan. Integration of Crayfish Optimization with Watermarking Scheme for Automated Tampering Text Detection. Journal of Cybersecurity and Information Management, vol. , no. , 2026, pp. 23-33. DOI: https://doi.org/10.54216/JCIM.170203
    T., H. (2026). Integration of Crayfish Optimization with Watermarking Scheme for Automated Tampering Text Detection. Journal of Cybersecurity and Information Management, (), 23-33. DOI: https://doi.org/10.54216/JCIM.170203
    T., Hanan. Integration of Crayfish Optimization with Watermarking Scheme for Automated Tampering Text Detection. Journal of Cybersecurity and Information Management , no. (2026): 23-33. DOI: https://doi.org/10.54216/JCIM.170203
    T., H. (2026) . Integration of Crayfish Optimization with Watermarking Scheme for Automated Tampering Text Detection. Journal of Cybersecurity and Information Management , () , 23-33 . DOI: https://doi.org/10.54216/JCIM.170203
    T. H. [2026]. Integration of Crayfish Optimization with Watermarking Scheme for Automated Tampering Text Detection. Journal of Cybersecurity and Information Management. (): 23-33. DOI: https://doi.org/10.54216/JCIM.170203
    T., H. "Integration of Crayfish Optimization with Watermarking Scheme for Automated Tampering Text Detection," Journal of Cybersecurity and Information Management, vol. , no. , pp. 23-33, 2026. DOI: https://doi.org/10.54216/JCIM.170203