期刊文献+

一种脆弱型数字水印技术研究与应用

An Application and Research of Fragile Text Watermarking
下载PDF
导出
摘要 该文提出了字移编码和CRC校验技术的文本内容认证的脆弱型文本数字水印方案。通过使文本行内字符发生平移,即利用字间距的变化嵌入需要的水印信息。采用这种编码,首先是利用循环冗余检测技术(CRC)来求得该字符串的特征,然后是利用相邻字符之间的距离可以各不相同来得以实现。在水印检测时,通过重新计算CRC的余式,可以检测到文本是否遭受篡改。通过进一步的研究还可以发现,该方案不但可以以很高的精度检测到文本发生的篡改并能进行高精确度的定位,而且该方案还能将篡改进行分类:增加、删除和修改。 It is proposed a fragile text watermarking scheme for text content identification based on words movement coding and CR, C techniques in this paper. The watermark required is embedded into the target documents in way of moving the words within a line, which is used by changing the distances of difference words. It is a tvechnique implemented firstly by obtaining the characteristics of a string with CR, C techniques, and then by embedding the characteristics in a mean of coding into the different distances among variant words of the documents, The documents can be detected for tamper by recalculating the residue of CRC while check the watermark of document, With further research, the solution proposed can be capable of either detecting and locating tamper very precisely and exactly, or classifying the tamper in terms of insert, deletion, or update.
出处 《计算机安全》 2008年第7期55-57,共3页 Network & Computer Security
基金 高等学校博士学科点专项科研基金(20060533084)
关键词 文本文档水印 篡改检测 篡改定位 篡改恢复 text documents watermarking tamper detection tamper localization tamper recovery
  • 相关文献

参考文献5

二级参考文献28

  • 1李静,汤光明,孙怡峰,刘胜利.一种基于数字水印和PKI的电子签章系统[J].微计算机信息,2005,21(12X):62-63. 被引量:9
  • 2徐蕾,黄玉军,汤光明.利用数字水印技术验证文本信息的篡改[J].微计算机信息,2005,21(12X):64-65. 被引量:7
  • 3W Bender,D Gruhl,N Morimoto et al.Techniques for data hiding[J].IBM Systems Journal,1996;35:332~335
  • 4van Schyndel R G,Tirkel A Z,Osborne CF.A digital watermark[C].In:Proceedings of the 1994 IEEE International Conference on Image Processing,1994-02:86~89
  • 5S H Low,N F Maxemchuk.Performance Comparison of two text marking methods[J].IEEE Journal on Selected Areas in Communications,1998; 16:561~572
  • 6Atallah M J,V Raskin,M Crogan et al.Natural Language Watermarking:Design,Analysis,and a Proof-of-Concept Implementation[C].In:I S Moskowitz ed.Information Hiding:4th InternationalWorkshop,IH 2001,Pittsburgh,PA,USA,Proceedings,Berlin:Springer,2001-04:185~199
  • 7卢开澄.计算机密码学[M](第2版)[M].北京:清华大学出版社,1998..
  • 8N F Maxemachuk. Electronic Document Distribution[J].AT&T Technical Journal, 1994; 73 ( 5 ): 73~80.
  • 9Jack T Brassil,Steven Low,Nicholas F Maxemchuk et al. Electronic Marking and Identification Techniques to Discourage Document Copying [J].IEEE Journal on Selectedareas in Communications, 1995; 13(8).
  • 10N F Maxemchuk ,S Low. Marking Text Document[C].In:International Conference on Image Processing,Santa Barbara,Calif, 1997-10: 26~29.

共引文献128

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部