Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Document marking and identification using both line and word shifting
INFOCOM '95 Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies (Vol. 2)-Volume - Volume 2
PCA-based web page watermarking
Pattern Recognition
Performance comparison of two text marking methods
IEEE Journal on Selected Areas in Communications
Electronic marking and identification techniques to discourage document copying
IEEE Journal on Selected Areas in Communications
Integrity for the In-flight web page based on a fragile watermarking chain scheme
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
IAAS: an integrity assurance service for web page via a fragile watermarking chain module
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.00 |
With the development of the Internet, more and more people concern the protection of web pages. Fragile watermarking technique is an effective method for solving the tamper-proof of web pages. In this paper, a fragile watermarking scheme based on singular value decomposition (SVD) for web pages is proposed. First of all, a model utilizing the frequency of letters is used to denote a web page, and the web page is expressed as a matrix through this model. Afterwards, we take SVD transformation on the matrix and extract its singular values to generate watermarks. Finally, the watermarks are embedded into the letters of HTML tags by altering the upper and lower cases of letters, simultaneously, they are embedded into the embedding locations controlled by a secret key. In the detection procedure, whether a web page has been tampered or not can be judged effectively only by comparing the generated watermarks with the extracted watermarks. The experiment shows that the proposed scheme has stronger abilities to identify the types of modifications and to locate the locations of modifications.