期刊文献+

基于Shamir门限和html标签id的网页水印方法 被引量:1

A Webpage Watermarking Method Based on the Shamir Threshold and Html Label Id
下载PDF
导出
摘要 html网页水印技术是信息隐藏技术的分支,目前虽已提出了一些方法,但相较其它水印技术,仍存在着水印的嵌入困难、容量有限和鲁棒性不强.针对于目前采用网页中单个标签或某个符号来表示单个水印位而使得嵌入容量有限的问题,提出了利用网页标签id来表示水印的思路,而网页标签id可用来表示多位水印值.方法中,首先是把网页中重要内容形成消息摘要并和表示版权的二值图像异或运算后,作为水印信息,然后经Shamir门限方案后分解,把其作为网页标签id值的方法来分存嵌入网页.经实验验证,该方案有较好的嵌入容量、鲁棒性和隐蔽性. Html webpage watermarking technology is a information hiding technology branch, at present several methods have been proposed, but compared to other watermark technology, there still exist problems about watermark embedding difficulties, limited capacity and weak robustness. Aiming at the limited embedding capacity question by using the single label or a symbol in webpage to indicate that a single watermark bit, a method is proposed to use the id value of label in webpage to represent watermark, and the id value of label in webpage can be used to express many watermarking bits. First in this method is to xor with the message digest of the important content in webpage and bits of binary image to represent copyright, and then by the Shamir threshold decomposition scheme, the watermark as the id value of label in webpage is deposited the webpage. Proved by experiments, the scheme has better capacity of embedding, robustness and invisibility.
出处 《计算机系统应用》 2013年第8期98-102,共5页 Computer Systems & Applications
基金 百色学院院级项目(2010KB13)
关键词 Shamir门限 网页标签标识符 网页水印 消息摘要 秘密共享 Shamir threshold webpage label identification webpage watermark message digest secret sharing
  • 相关文献

参考文献7

  • 1丁伟.基于Web网页的文本水印技术的研究[学位论文].武汉:武汉理工大学,2012.
  • 2傅瑜,王保保.文本水印附加空格编码方法的实现及其性能[J].长安大学学报(自然科学版),2002,22(3):85-87. 被引量:16
  • 3Low SH, Maxemchuk NF, Lapone AM. Document Identifica- tion for Copyright Protection using Centroid Detection. IEEE Trans Communications,1998,46(3):372-383.
  • 4万唯一.基于数字水印的网页防篡改技术研究[学位论文].成都:西南交通大学,2010.
  • 5Zhao QJ, Lu HT. A PCA-based watermarking scheme for tamper-proof of web pages.Pattern recognition,2005,38(8): 1321-1323.
  • 6雷红艳,邹汉斌.基于Shamir秘密共享的隐私保护分类算法[J].计算机工程与设计,2010,31(6):1271-1273. 被引量:3
  • 7Rivest IL The Md5 Message-Digest Algodthm.RFC. RFC Editor, 1992.

二级参考文献13

  • 1沈旭昌.保持隐私的关联规则挖掘[J].计算机工程与设计,2005,26(3):750-751. 被引量:2
  • 2杨晓元,季称利,秦晴,胡予濮.基于Shamir秘密共享的安全取证服务器方案[J].计算机工程与应用,2005,41(22):147-149. 被引量:4
  • 3祁传达,金晨辉.基于Shamir秘密共享的多重签名方案计算捷径[J].信阳师范学院学报(自然科学版),2006,19(2):230-232. 被引量:1
  • 4谢小林.基于ID3算法的道路客运行业信用评级模型[J].西华大学学报(自然科学版),2007,26(1):25-27. 被引量:3
  • 5Verykios VS,Bertino E,Fovino IN,et al.State-of-the-art in privacy preserving data mining[J].SIGMOD Record,2004,33 (1):50-57.
  • 6Evfimievski A.Randomization in privacy preserving data mining[J].SIGKDD Explorations,2002,4(2):43-48.
  • 7Agrawal S,Krishnan V,Haritsa JR.On addressing efficiency concerns in privacy-presetting mining[C].Proc of the 9th Int'l Conf on Database Systems for Advanced Applications.Jeju Island:Springer-Verlag,2004:113-124.
  • 8Wang Jin-long,Xu Cong-fu.Efficient mining of frequent itemsets in distorted databases[C].Proceedings of 19th Australian Conference on Artificial Intelligence.Hobart Australia:Springer,2006:352-361.
  • 9STEFAN K.Information Hiding Techniques for Ste-ganography and Digital Watermarking[M].Boston:Artech House,2000.
  • 10HARTUNG F,KUTTER M.Multimedia watermark-ing techniques[J].Proceedings of the IEEE,1999,87(7):1 079-1 107.

共引文献17

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部