Revealing Weaknesses in Text Watermarking Through Self-Information Rewrite Attacks