期刊文献+

A New Fragile Watermarking Scheme for Text Documents Authentication 被引量:1

A New Fragile Watermarking Scheme for Text Documents Authentication
在线阅读 下载PDF
导出
摘要 Because there are different modification types of deleting characters and inserting characters in text documents, the algorithms for image authentication can not be used for text documents authentication directly. A text watermarking scheme for text document authentication is proposed in this paper. By extracting the features of character cascade together with the user secret key, the scheme combines the features of the text with the user information as a watermark which is embedded into the transformed text itself. The receivers can verify the integrity and the authentication of the text through the blind detection technique. A further research demonstrates that it can also localize the tamper, classify the type of modification, and recover part of modified text documents. The aforementioned conclusion has been proved by both our experiment results and analysis. Because there are different modification types of deleting characters and inserting characters in text documents, the algorithms for image authentication can not be used for text documents authentication directly. A text watermarking scheme for text document authentication is proposed in this paper. By extracting the features of character cascade together with the user secret key, the scheme combines the features of the text with the user information as a watermark which is embedded into the transformed text itself. The receivers can verify the integrity and the authentication of the text through the blind detection technique. A further research demonstrates that it can also localize the tamper, classify the type of modification, and recover part of modified text documents. The aforementioned conclusion has been proved by both our experiment results and analysis.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1661-1666,共6页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foun-dation of China (60373062 60573045)
关键词 fragile text watermarking character cascade tamper localization tamper type classification tamper recovery fragile text watermarking character cascade tamper localization tamper type classification tamper recovery
  • 相关文献

参考文献11

  • 1丁科,何晨,王宏霞.一种定位精确的混沌脆弱数字水印技术[J].电子学报,2004,32(6):1009-1012. 被引量:25
  • 2M.Atallah,C.McDonough,V.Raskin,S.Nirenburg."Natural language processing for information assurance and security:an overview and implementations,"[].Proceedings of the workshop on New security paradigms.2001
  • 3P. W. Wong.A public key watermark for image verification and authentication[].IEEE Inter Conf On Image Processing.1998
  • 4Kaicheng,Lu. Computer Cryptography . 1998
  • 5Kundur D,Hatzinakos D.Semi-blind Image Restoration Based on Telltale Watermarking[].Procofnd Asilomar Conference on SignalsSystemsand Computers.1998
  • 6Sun X M,Chen H W,Yang L H, et al.Mathematical Representation of a Chinese Character and its Applications[].International Journal of Pattern Recognition and Artificial Intelligence.2002
  • 7Barreto P S L M,Ki m HY,Rij men V.Toward Secure Pub- lic-Key Blockwise Fragile Authentication Watermarking[].IEEE Proc Vision Image and Signal Processing.2002
  • 8Lee J,Won CS.A Watermarking Sequence Using Parities of Error Control Coding for Image Authentication and Owner- ship Correction[].IEEE Transactions on Consumer Elec- tronics.2000
  • 9Jiri F,Miroslav G.Images with Self-Correcting Capabilities[].Proceedings ofthe IEEEInternational Conference on Image Processing.1999
  • 10Li C T,Yang F M,Lee C S.Oblivious Fragile Watermark- ing Scheme for Image Authentication[].Proc IEEE In- ternational Conference on Acoustics Speech and Signal Processing.2002

二级参考文献6

  • 1C S Lu, H Y Mark Liao. Multipurpose watermarking for image authentication and protection[J]. IEEE Trans on Image Processing,2001, 10(10):1579-1592.
  • 2M U Celik, G Sharma, E Saber, et al. Hierarchical watermarking for secure image authentication with localization[J]. IEEE Trans on Image Processing. 2002,11(6):585-595.
  • 3P W Wong. Public key watermark for image verification and authentication[A] .Proc of 1998 IEEE Int Con on Image Processing[C]. Chicago, IL, USA: IEEE, 1998,1:455-459.
  • 4D Kundur, D Hatzinakos. Digital watermarking for telltale tamper profing and authentication[J]. Proc of the IEEE, 1999, 87(7):1167-1180.
  • 5YWWang,JFDoherty,REVanDyck. Awavelet-basedwatermarking algorithm for ownership verification of digital images[J]. IEEE Trans on Image Processing.2002,1(2):77-88.
  • 6C Hang, S Sun. Chaotic frequency hopping sequence[J]. IEEE Trans on Communications, 1998,46(11):1433-1437.

共引文献24

同被引文献11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部