Watermarking for Authentication of LZ-77 Compressed Documents

  • Yanfang Du
  • Jing Zhang
  • Yuting Su
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5041)


Fragile Watermarking by exploiting the multiplicity of encoding of a file using LZ77- based compressed method (we called“LZS-77”), has been proposed recently as a new method of document authentication. It allows one to hide enough information within the compressed document to warrant its authenticity. However, the watermark embedding will degrade the compression performance. In this paper, some variations have been made to the LZS-77 algorithm to reduce the compression degradation. The experimental results show that our algorithm (we called“LZSC-77”), compared to the LZS-77 algorithm, can improve compression rates on many files of the Cargary corpus and Canterbury corpus.


LZ77 algorithm document authentication fragile watermark 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Gailly, J.L., Adler, M.: The GZIP Compressor,
  2. 2.
    Atallah, M.J., Lonardi, S.: Authentication of LZ-77 Compressed Data. In: Proceedings of the 18th ACM Symposium on Applied Computing, Melbourne, Florida, pp. 282–287 (2003)Google Scholar
  3. 3.
    Ziv, J., Lempel, A.: A Universal Algorithm for Sequential Data Compression. IEEE Transactions on Information Theory 23(3), 337–343 (1977)MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Blelloch, G.E.: Introduction to Data Compression. Computer Science Department, Carnegie Mellon University (2001)Google Scholar
  5. 5.
    Dube, D., Beaudoin, V.: Recycling bits in LZ77-based compression. In: Proceedings of the Conference of Sciences Electroniques, Technologies of Information and Telecommunications, Sousse, Tunisia (2005)Google Scholar
  6. 6.
    Dube, D., Beaudoin, V.: Improving LZ77 Data Compression using Bit Recycling. In: Proceedings of the International Symposium on Information Theory and its applications, Seoul, Korea (2006)Google Scholar
  7. 7.
    Yoshioka, K., Sonoda, K., Takizawa, O., Matsumoto, T.: Information Hiding on Lossless Data Compression. In: Proceedings of the International Conference on Intelligent Information Hiding and Multimedia, Pasadena, California, pp. 15–18 (2006)Google Scholar
  8. 8.
    Witten, I.H., Bell, T.C.: The Calgary/Canterbury Text Compression Corpus (1990),

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Yanfang Du
    • 1
  • Jing Zhang
    • 1
  • Yuting Su
    • 1
  1. 1.School of Electronic Information EngineeringTianjin UniversityTianjinChina

Personalised recommendations