In this note,the tampered failure rate model is generalized from the step-stress accelerated life testing setting to the progressive stress accelerated life testing for the first time.For the parametric setting where ...In this note,the tampered failure rate model is generalized from the step-stress accelerated life testing setting to the progressive stress accelerated life testing for the first time.For the parametric setting where the scale parameter satisfying the equation of the inverse power law is Weibull,maximum likelihood estimation is investigated.展开更多
As image manipulation technology advances rapidly,the malicious use of image tampering has alarmingly escalated,posing a significant threat to social stability.In the realm of image tampering localization,accurately l...As image manipulation technology advances rapidly,the malicious use of image tampering has alarmingly escalated,posing a significant threat to social stability.In the realm of image tampering localization,accurately localizing limited samples,multiple types,and various sizes of regions remains a multitude of challenges.These issues impede the model’s universality and generalization capability and detrimentally affect its performance.To tackle these issues,we propose FL-MobileViT-an improved MobileViT model devised for image tampering localization.Our proposed model utilizes a dual-stream architecture that independently processes the RGB and noise domain,and captures richer traces of tampering through dual-stream integration.Meanwhile,the model incorporating the Focused Linear Attention mechanism within the lightweight network(MobileViT).This substitution significantly diminishes computational complexity and resolves homogeneity problems associated with traditional Transformer attention mechanisms,enhancing feature extraction diversity and improving the model’s localization performance.To comprehensively fuse the generated results from both feature extractors,we introduce the ASPP architecture for multi-scale feature fusion.This facilitates a more precise localization of tampered regions of various sizes.Furthermore,to bolster the model’s generalization ability,we adopt a contrastive learning method and devise a joint optimization training strategy that leverages fused features and captures the disparities in feature distribution in tampered images.This strategy enables the learning of contrastive loss at various stages of the feature extractor and employs it as an additional constraint condition in conjunction with cross-entropy loss.As a result,overfitting issues are effectively alleviated,and the differentiation between tampered and untampered regions is enhanced.Experimental evaluations on five benchmark datasets(IMD-20,CASIA,NIST-16,Columbia and Coverage)validate the effectiveness of our proposed model.The meticulously calibrated FL-MobileViT model consistently outperforms numerous existing general models regarding localization accuracy across diverse datasets,demonstrating superior adaptability.展开更多
Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Mo...Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Most of these images are insignificant images containing only personal information.However, in many fields such as banking, finance, public institutions,and educational institutions, the images of many valuable objects like IDcards, photographs, credit cards, and transaction receipts are stored andtransmitted to the digital environment. These images are very significantand must be secured. A valuable image can be maliciously modified by anattacker. The modification of an image is sometimes imperceptible even by theperson who stored the image. In this paper, an active image forgery detectionmethod that encodes and decodes image edge information is proposed. Theproposed method is implemented by designing an interface and applied on atest image which is frequently used in the literature. Various tampering attacksare simulated to test the fidelity of the method. The method not only notifieswhether the image is forged or not but also marks the tampered region ofthe image. Also, the proposed method successfully detected tampered regionsafter geometric attacks, even on self-copy attacks. Also, it didn’t fail on JPEGcompression.展开更多
Online ballot box system has the advantages of high efficiency and environmental protection,but the existing network voting technology still has a lot of matter.Almost all electronic voting system could be proved to b...Online ballot box system has the advantages of high efficiency and environmental protection,but the existing network voting technology still has a lot of matter.Almost all electronic voting system could be proved to be intrusion.The administrator of the system could tamper with the data for benefit,and the system may be attacked by hackers.The safety and fairness of the existing network voting system depend entirely on the safety and credibility of the website itself,but these cannot guarantee the fairness of voting.Make full use of blockchain technology,so that voting,even if there are malicious participants,but also to ensure the correctness and safety of the vote.The introduction of block chain technology,block chain has decentralized,data tampering and other characteristics.P2P network is applied in the block chain layer to construct a distributed database,digital signature algorithm and encryption technology are used to ensure that the data cannot be tampered with,consensus network algorithm is used to ensure the consistency of the data in the network,and timestamp technology is applied to save the data blocks in a chain structure connected end to end.It paper focuses on the implementation of P2P network networking mode,node block synchronization,data and block verification mechanism and consensus mechanism to ensure data consistency in the network layer of block chain layer.Using time stamp,Merkle tree,asymmetric encryption and other technologies to design data blocks and use chain structure to store data blocks.Combined with the characteristics of blockchain,a fair and transparent voting system is constructed.Model aims to apply the block chain technology to the voting scenario and design a secure block chain voting architecture.It system is designed and developed based on the block chain system.It makes full use of its decentralization,removes the dependence of electronic voting on trusted third parties,and protects the privacy of voters and candidates.Data cannot be tampered with.Once the data are stored in the block chain,it cannot be tampered with.It provides a real and credible database.展开更多
Text information is principally dependent on the natural languages.Therefore,improving security and reliability of text information exchanged via internet network has become the most difficult challenge that researche...Text information is principally dependent on the natural languages.Therefore,improving security and reliability of text information exchanged via internet network has become the most difficult challenge that researchers encounter.Content authentication and tampering detection of digital contents have become a major concern in the area of communication and information exchange via the Internet.In this paper,an intelligent text Zero-Watermarking approach SETZWMWMM(Smart English Text Zero-Watermarking Approach Based on Mid-Level Order and Word Mechanism of Markov Model)has been proposed for the content authentication and tampering detection of English text contents.The SETZWMWMM approach embeds and detects the watermark logically without altering the original English text document.Based on Hidden Markov Model(HMM),Third level order of word mechanism is used to analyze the interrelationship between contexts of given English texts.The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,SETZWMWMM has been implemented and validated with attacked English text.Experiments were performed on four datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results show that our method is more sensitive and efficient for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods.展开更多
In this paper,a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authenticati...In this paper,a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authentication and tampering detection of Arabic text contents.The proposed approach known as Second order of Alphanumeric Mechanism of Markov model and Zero-Watermarking Approach(SAMMZWA).Second level order of alphanumeric mechanism based on hidden Markov model is integrated with text zero-watermarking techniques to improve the overall performance and tampering detection accuracy of the proposed approach.The SAMMZWA approach embeds and detects the watermark logically without altering the original text document.The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,SAMMZWA has been implemented and validated with attacked Arabic text.Experiments were performed on four datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results show that our method is more sensitive for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods.展开更多
In this paper,a new approach is proposed to determine whether the content of an image is authentic or modified with a focus on detecting complex image tampering.Detecting image tampering without any prior information ...In this paper,a new approach is proposed to determine whether the content of an image is authentic or modified with a focus on detecting complex image tampering.Detecting image tampering without any prior information of the original image is a challenging problem since unknown diverse manipulations may have different characteristics and so do various formats of images.Our principle is that image processing,no matter how complex,may affect image quality,so image quality metrics can be used to distinguish tampered images.In particular,based on the alteration of image quality in modified blocks,the proposed method can locate the tampered areas.Referring to four types of effective no-reference image quality metrics,we obtain 13 features to present an image.The experimental results show that the proposed method is very promising on detecting image tampering and locating the locally tampered areas especially in realistic scenarios.展开更多
The digital text media is the most common media transferred via the internet for various purposes and is very sensitive to transfer online with the possibility to be tampered illegally by the tampering attacks.Therefo...The digital text media is the most common media transferred via the internet for various purposes and is very sensitive to transfer online with the possibility to be tampered illegally by the tampering attacks.Therefore,improving the security and authenticity of the text when it is transferred via the internet has become one of the most difcult challenges that researchers face today.Arabic text is more sensitive than other languages due to Harakat’s existence in Arabic diacritics such as Kasra,and Damma in which making basic changes such as modifying diacritic arrangements can lead to change the text meaning.In this paper,an intelligent hybrid solution is proposed with highly sensitive detection for any tampering on Arabic text exchanged via the internet.Natural language processing,entropy,and watermarking techniques have been integrated into this method to improve the security and reliability of Arabic text without limitations in text nature or size,and type or volumes of tampering attack.The proposed scheme is implemented,simulated,and validated using four standard Arabic datasets of varying lengths under multiple random locations of insertion,reorder,and deletion attacks.The experimental and simulation results prove the accuracy of tampering detection of the proposed scheme against all kinds of tampering attacks.Comparison results show that the proposed approach outperforms all of the other baseline approaches in terms of tampering detection accuracy.展开更多
This paper proposes a multi-scale self-recovery(MSSR)approach to protect images against content forgery.The main idea is to provide more resistance against image tampering while enabling the recovery process in a mult...This paper proposes a multi-scale self-recovery(MSSR)approach to protect images against content forgery.The main idea is to provide more resistance against image tampering while enabling the recovery process in a multi-scale quality manner.In the proposed approach,the reference data composed of several parts and each part is protected by a channel coding rate according to its importance.The first part,which is used to reconstruct a rough approximation of the original image,is highly protected in order to resist against higher tampering rates.Other parts are protected with lower rates according to their importance leading to lower tolerable tampering rate(TTR),but the higher quality of the recovered images.The proposed MSSR approach is an efficient solution for the main disadvantage of the current methods,which either recover a tampered image in low tampering rates or fails when tampering rate is above the TTR value.The simulation results on 10000 test images represent the efficiency of the multi-scale self-recovery feature of the proposed approach in comparison with the existing methods.展开更多
In this paper,a combined approach CAZWNLP(a combined approach of zero-watermarking and natural language processing)has been developed for the tampering detection of English text exchanged through the Internet.The thir...In this paper,a combined approach CAZWNLP(a combined approach of zero-watermarking and natural language processing)has been developed for the tampering detection of English text exchanged through the Internet.The third gram of alphanumeric of the Markov model has been used with text-watermarking technologies to improve the performance and accuracy of tampering detection issues which are limited by the existing works reviewed in the literature of this study.The third-grade level of the Markov model has been used in this method as natural language processing technology to analyze an English text and extract the textual characteristics of the given contexts.Moreover,the extracted features have been utilized as watermark information and then validated with the attacked English text to detect any suspected tampering occurred on it.The embedding mechanism of CAZWNLP method will be achieved logically without effects or modifying the original text document to embed a watermark key.CAZWNLP has been implemented using VS code IDE with PHP.The experimental and simulation results using standard datasets of varying lengths show that the proposed approach can obtain high robustness and better detection accuracy of tampering common random insertion,reorder,and deletion attacks,e.g.,Comparison results with baseline approaches also show the advantages of the proposed approach.展开更多
Because there are different modification types of deleting characters and inserting characters in text documents, the algorithms for image authentication can not be used for text documents authentication directly. A t...Because there are different modification types of deleting characters and inserting characters in text documents, the algorithms for image authentication can not be used for text documents authentication directly. A text watermarking scheme for text document authentication is proposed in this paper. By extracting the features of character cascade together with the user secret key, the scheme combines the features of the text with the user information as a watermark which is embedded into the transformed text itself. The receivers can verify the integrity and the authentication of the text through the blind detection technique. A further research demonstrates that it can also localize the tamper, classify the type of modification, and recover part of modified text documents. The aforementioned conclusion has been proved by both our experiment results and analysis.展开更多
The text of the Quran is principally dependent on the Arabic language.Therefore,improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difcult...The text of the Quran is principally dependent on the Arabic language.Therefore,improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difcult challenges that researchers face today.Consequently,the diacritical marks in the Holy Quran which represent Arabic vowels(i,j.s)known as the kashida(or“extended letters”)must be protected from changes.The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio(PSNR),and Normalized Cross-Correlation(NCC);thus,the location for tamper detection accuracy is low.The gap addressed in this paper to improve the security of Arabic text in the Holy Quran by using vowels with kashida.To enhance the watermarking scheme of the text of the Quran based on hybrid techniques(XOR and queuing techniques)of the purposed scheme.The methodology propose scheme consists of four phases:The rst phase is pre-processing.This is followed by the second phase where an embedding process takes place to hide the data after the vowel letters wherein if the secret bit is“1”,it inserts the kashida but does not insert the kashida if the bit is“0”.The third phase is an extraction process and the last phase is to evaluate the performance of the proposed scheme by using PSNR(for the imperceptibility),and NCC(for the security of the watermarking).Experiments were performed on three datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results were revealed the improvement of the NCC by 1.76%,PSNR by 9.6%compared to available current schemes.展开更多
Due to the rapid increase in the exchange of text information via internet networks,the security and the reliability of digital content have become a major research issue.The main challenges faced by researchers are a...Due to the rapid increase in the exchange of text information via internet networks,the security and the reliability of digital content have become a major research issue.The main challenges faced by researchers are authentication,integrity verication,and tampering detection of the digital contents.In this paper,text zero-watermarking and text feature-based approach is proposed to improve the tampering detection accuracy of English text contents.The proposed approach embeds and detects the watermark logically without altering the original English text document.Based on hidden Markov model(HMM),the fourth level order of the word mechanism is used to analyze the contents of the given English text to nd the interrelationship between the contexts.The extracted features are used as watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,the proposed approach has been implemented and validated with attacked English text.Experiments were performed using four standard datasets of varying lengths under multiple random locations of insertion,reorder,and deletion attacks.The experimental and simulation results prove the tampering detection accuracy of our method against all kinds of tampering attacks.Comparison results show that our proposed approach outperforms all the other baseline approaches in terms of tampering detection accuracy.展开更多
Blind forensics of JPEG image tampering as a kind of digital image blind forensics technology is gradually becoming a new research hotspot in the field of image security. Firstly, the main achievements of domestic and...Blind forensics of JPEG image tampering as a kind of digital image blind forensics technology is gradually becoming a new research hotspot in the field of image security. Firstly, the main achievements of domestic and foreign scholars in the blind forensic technology of JPEG image tampering were briefly described. Then, according to the different methods of tampering and detection, the current detection was divided into two types: double JPEG compression detection and block effect inconsistency detection. This paper summarized the existing methods of JPEG image blind forensics detection, and analyzed the two methods. Finally, the existing problems and future research trends were analyzed and prospected to provide further theoretical support for the research of JPEG image blind forensics technology.展开更多
Technology has no limits today;we have lots of software available in the market by which we can alter any image. People usually copies image from the internet and after some changes they claim that these are their own...Technology has no limits today;we have lots of software available in the market by which we can alter any image. People usually copies image from the internet and after some changes they claim that these are their own properties. Insuring digital image integrity has therefore become a major issue. Over the past few years, watermarking has emerged as the leading candidate to solve problems of ownership and content authentications for digital multimedia documents. To protect authenticity of images semi fragile watermarking is very concerned by researchers because of its important function in multimedia content authentication. The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication using semifragile watermarking. In present paper comprehensive overview of insertion and extraction methods used in different semi fragile water marking algorithm are studied using image parameters, potential application, different algorithms are described and focus is on their comparison according to the properties cited above and future directions for developing a better image authentication algorithm are suggested.展开更多
To detect and recover random tampering areas,a combined-decision-based self-embedding watermarking scheme is proposed herein.In this scheme,the image is first partitioned into 2×2 size blocks.Next,the high 5 bits...To detect and recover random tampering areas,a combined-decision-based self-embedding watermarking scheme is proposed herein.In this scheme,the image is first partitioned into 2×2 size blocks.Next,the high 5 bits of a block’s average value is embedded into its offset block.The tampering type of block is detected by comparing the watermarks of its pre-offset and post-offset blocks.The theoretical analysis and experiments demonstrate that the proposed scheme not only has a lower ratio of false detection but also better performance with regard to avoiding random tampering.展开更多
In recent years,with the rapid development of deep learning technologies,some neural network models have been applied to generate fake media.DeepFakes,a deep learning based forgery technology,can tamper with the face ...In recent years,with the rapid development of deep learning technologies,some neural network models have been applied to generate fake media.DeepFakes,a deep learning based forgery technology,can tamper with the face easily and generate fake videos that are difficult to be distinguished by human eyes.The spread of face manipulation videos is very easy to bring fake information.Therefore,it is important to develop effective detection methods to verify the authenticity of the videos.Due to that it is still challenging for current forgery technologies to generate all facial details and the blending operations are used in the forgery process,the texture details of the fake face are insufficient.Therefore,in this paper,a new method is proposed to detect DeepFake videos.Firstly,the texture features are constructed,which are based on the gradient domain,standard deviation,gray level co-occurrence matrix and wavelet transform of the face region.Then,the features are processed by the feature selection method to form a discriminant feature vector,which is finally employed to SVM for classification at the frame level.The experimental results on the mainstream DeepFake datasets demonstrate that the proposed method can achieve ideal performance,proving the effectiveness of the proposed method for DeepFake videos detection.展开更多
A color-intensity feature extraction method is proposed aimed at supplementing conventional image hashing algorithms that only consider intensity of the image. An image is mapped to a set of blocks represented by thei...A color-intensity feature extraction method is proposed aimed at supplementing conventional image hashing algorithms that only consider intensity of the image. An image is mapped to a set of blocks represented by their dominant colors and average intensities. The dominant color is defined by hue and saturation with the hue value adjusted to make the principal colors more uniformly distributed. The average intensity is extracted from the Y component in the YCbCr space. By quantizing the color and intensity components, a feature vector is formed in a cylindrical coordinate system for each image block, which may be used to generate an intermediate hash. Euclidean distance is modified and a similarity metric introduced to measure the degree of similarity between images in terms of the color-intensity features. This is used to validate effectiveness of the proposed feature vector. Experiments show that the color-intensity feature is robust to normal image processing while sensitive to malicious alteration, in particular, color modification.展开更多
In this paper,the text analysis-based approach RTADZWA(Reliable Text Analysis and Digital Zero-Watermarking Approach)has been proposed for transferring and receiving authentic English text via the internet.Second leve...In this paper,the text analysis-based approach RTADZWA(Reliable Text Analysis and Digital Zero-Watermarking Approach)has been proposed for transferring and receiving authentic English text via the internet.Second level order of alphanumeric mechanism of hidden Markov model has been used in RTADZWA approach as a natural language processing to analyze the English text and extracts the features of the interrelationship between contexts of the text and utilizes the extracted features as watermark information and then validates it later with attacked English text to detect any tampering occurred on it.Text analysis and text zero-watermarking techniques have been integrated by RTADZWA approach to improving the performance,accuracy,capacity,and robustness issues of the previous literature proposed by the researchers.The RTADZWA approach embeds and detects the watermark logically without altering the original text document to embed a watermark.RTADZWA has been implemented using PHP with VS code IDE.The experimental and simulation results using standard datasets of varying lengths show that the proposed approach can obtain high robustness and better detection accuracy of tampering common random insertion,reorder,and deletion attacks,e.g.,Comparison results with baseline approaches also show the advantages of the proposed approach.展开更多
Themost common digital media exchanged via the Internet is in text form.The Arabic language is considered one of themost sensitive languages of content modification due to the presence of diacritics that can cause a c...Themost common digital media exchanged via the Internet is in text form.The Arabic language is considered one of themost sensitive languages of content modification due to the presence of diacritics that can cause a change in the meaning.In this paper,an intelligent scheme is proposed for improving the reliability and security of the text exchanged via the Internet.The core mechanism of the proposed scheme depends on integrating the hidden Markov model and zero text watermarking techniques.The watermark key will be generated by utilizing the extracted features of the text analysis process using the third order and word level of the Markov model.The Embedding and detection processes of the proposed scheme will be performed logically without the effect of the original text.The proposed scheme is implemented using PHP with VS code IDE.The simulation results,using varying sizes of standard datasets,show that the proposed scheme can obtain high reliability and provide better accuracy of the common illegal tampering attacks.Comparison results with other baseline techniques show the added value of the proposed scheme.展开更多
基金This research is by the National Natural Science Foundation of China(69971016, 10271079) the Science and Technology Development Foundation of Shanghai(00JC14507) the Major Branch of Learning Foundation of Shanghai.
文摘In this note,the tampered failure rate model is generalized from the step-stress accelerated life testing setting to the progressive stress accelerated life testing for the first time.For the parametric setting where the scale parameter satisfying the equation of the inverse power law is Weibull,maximum likelihood estimation is investigated.
基金This study was funded by the Science and Technology Project in Xi’an(No.22GXFW0123)this work was supported by the Special Fund Construction Project of Key Disciplines in Ordinary Colleges and Universities in Shaanxi Province,the authors would like to thank the anonymous reviewers for their helpful comments and suggestions.
文摘As image manipulation technology advances rapidly,the malicious use of image tampering has alarmingly escalated,posing a significant threat to social stability.In the realm of image tampering localization,accurately localizing limited samples,multiple types,and various sizes of regions remains a multitude of challenges.These issues impede the model’s universality and generalization capability and detrimentally affect its performance.To tackle these issues,we propose FL-MobileViT-an improved MobileViT model devised for image tampering localization.Our proposed model utilizes a dual-stream architecture that independently processes the RGB and noise domain,and captures richer traces of tampering through dual-stream integration.Meanwhile,the model incorporating the Focused Linear Attention mechanism within the lightweight network(MobileViT).This substitution significantly diminishes computational complexity and resolves homogeneity problems associated with traditional Transformer attention mechanisms,enhancing feature extraction diversity and improving the model’s localization performance.To comprehensively fuse the generated results from both feature extractors,we introduce the ASPP architecture for multi-scale feature fusion.This facilitates a more precise localization of tampered regions of various sizes.Furthermore,to bolster the model’s generalization ability,we adopt a contrastive learning method and devise a joint optimization training strategy that leverages fused features and captures the disparities in feature distribution in tampered images.This strategy enables the learning of contrastive loss at various stages of the feature extractor and employs it as an additional constraint condition in conjunction with cross-entropy loss.As a result,overfitting issues are effectively alleviated,and the differentiation between tampered and untampered regions is enhanced.Experimental evaluations on five benchmark datasets(IMD-20,CASIA,NIST-16,Columbia and Coverage)validate the effectiveness of our proposed model.The meticulously calibrated FL-MobileViT model consistently outperforms numerous existing general models regarding localization accuracy across diverse datasets,demonstrating superior adaptability.
文摘Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Most of these images are insignificant images containing only personal information.However, in many fields such as banking, finance, public institutions,and educational institutions, the images of many valuable objects like IDcards, photographs, credit cards, and transaction receipts are stored andtransmitted to the digital environment. These images are very significantand must be secured. A valuable image can be maliciously modified by anattacker. The modification of an image is sometimes imperceptible even by theperson who stored the image. In this paper, an active image forgery detectionmethod that encodes and decodes image edge information is proposed. Theproposed method is implemented by designing an interface and applied on atest image which is frequently used in the literature. Various tampering attacksare simulated to test the fidelity of the method. The method not only notifieswhether the image is forged or not but also marks the tampered region ofthe image. Also, the proposed method successfully detected tampered regionsafter geometric attacks, even on self-copy attacks. Also, it didn’t fail on JPEGcompression.
文摘Online ballot box system has the advantages of high efficiency and environmental protection,but the existing network voting technology still has a lot of matter.Almost all electronic voting system could be proved to be intrusion.The administrator of the system could tamper with the data for benefit,and the system may be attacked by hackers.The safety and fairness of the existing network voting system depend entirely on the safety and credibility of the website itself,but these cannot guarantee the fairness of voting.Make full use of blockchain technology,so that voting,even if there are malicious participants,but also to ensure the correctness and safety of the vote.The introduction of block chain technology,block chain has decentralized,data tampering and other characteristics.P2P network is applied in the block chain layer to construct a distributed database,digital signature algorithm and encryption technology are used to ensure that the data cannot be tampered with,consensus network algorithm is used to ensure the consistency of the data in the network,and timestamp technology is applied to save the data blocks in a chain structure connected end to end.It paper focuses on the implementation of P2P network networking mode,node block synchronization,data and block verification mechanism and consensus mechanism to ensure data consistency in the network layer of block chain layer.Using time stamp,Merkle tree,asymmetric encryption and other technologies to design data blocks and use chain structure to store data blocks.Combined with the characteristics of blockchain,a fair and transparent voting system is constructed.Model aims to apply the block chain technology to the voting scenario and design a secure block chain voting architecture.It system is designed and developed based on the block chain system.It makes full use of its decentralization,removes the dependence of electronic voting on trusted third parties,and protects the privacy of voters and candidates.Data cannot be tampered with.Once the data are stored in the block chain,it cannot be tampered with.It provides a real and credible database.
基金The author extends his appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number(R.G.P.2/55/40/2019),Received by Fahd N.Al-Wesabi.www.kku.edu.sa。
文摘Text information is principally dependent on the natural languages.Therefore,improving security and reliability of text information exchanged via internet network has become the most difficult challenge that researchers encounter.Content authentication and tampering detection of digital contents have become a major concern in the area of communication and information exchange via the Internet.In this paper,an intelligent text Zero-Watermarking approach SETZWMWMM(Smart English Text Zero-Watermarking Approach Based on Mid-Level Order and Word Mechanism of Markov Model)has been proposed for the content authentication and tampering detection of English text contents.The SETZWMWMM approach embeds and detects the watermark logically without altering the original English text document.Based on Hidden Markov Model(HMM),Third level order of word mechanism is used to analyze the interrelationship between contexts of given English texts.The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,SETZWMWMM has been implemented and validated with attacked English text.Experiments were performed on four datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results show that our method is more sensitive and efficient for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods.
基金the Deanship of Scientific Research at King Khalid University for funding this work under grant number(R.G.P.2/55/40/2019),Received by Fahd N.Al-Wesabi.www.kku.edu.sa。
文摘In this paper,a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authentication and tampering detection of Arabic text contents.The proposed approach known as Second order of Alphanumeric Mechanism of Markov model and Zero-Watermarking Approach(SAMMZWA).Second level order of alphanumeric mechanism based on hidden Markov model is integrated with text zero-watermarking techniques to improve the overall performance and tampering detection accuracy of the proposed approach.The SAMMZWA approach embeds and detects the watermark logically without altering the original text document.The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,SAMMZWA has been implemented and validated with attacked Arabic text.Experiments were performed on four datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results show that our method is more sensitive for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods.
基金Sponsored by the National Natural Science Foundation of China(Grant No.60971095 and No.61172109)Artificial Intelligence Key Laboratory of Sichuan Province(Grant No.2012RZJ01)the Fundamental Research Funds for the Central Universities(Grant No.DUT13RC201)
文摘In this paper,a new approach is proposed to determine whether the content of an image is authentic or modified with a focus on detecting complex image tampering.Detecting image tampering without any prior information of the original image is a challenging problem since unknown diverse manipulations may have different characteristics and so do various formats of images.Our principle is that image processing,no matter how complex,may affect image quality,so image quality metrics can be used to distinguish tampered images.In particular,based on the alteration of image quality in modified blocks,the proposed method can locate the tampered areas.Referring to four types of effective no-reference image quality metrics,we obtain 13 features to present an image.The experimental results show that the proposed method is very promising on detecting image tampering and locating the locally tampered areas especially in realistic scenarios.
基金The author extends his appreciation to the Deanship of Scientic Research at King Khalid University for funding this work under Grant Number(R.G.P.2/55/40/2019),Received by Fahd N.Al-Wesabi.www.kku.edu.sa。
文摘The digital text media is the most common media transferred via the internet for various purposes and is very sensitive to transfer online with the possibility to be tampered illegally by the tampering attacks.Therefore,improving the security and authenticity of the text when it is transferred via the internet has become one of the most difcult challenges that researchers face today.Arabic text is more sensitive than other languages due to Harakat’s existence in Arabic diacritics such as Kasra,and Damma in which making basic changes such as modifying diacritic arrangements can lead to change the text meaning.In this paper,an intelligent hybrid solution is proposed with highly sensitive detection for any tampering on Arabic text exchanged via the internet.Natural language processing,entropy,and watermarking techniques have been integrated into this method to improve the security and reliability of Arabic text without limitations in text nature or size,and type or volumes of tampering attack.The proposed scheme is implemented,simulated,and validated using four standard Arabic datasets of varying lengths under multiple random locations of insertion,reorder,and deletion attacks.The experimental and simulation results prove the accuracy of tampering detection of the proposed scheme against all kinds of tampering attacks.Comparison results show that the proposed approach outperforms all of the other baseline approaches in terms of tampering detection accuracy.
文摘This paper proposes a multi-scale self-recovery(MSSR)approach to protect images against content forgery.The main idea is to provide more resistance against image tampering while enabling the recovery process in a multi-scale quality manner.In the proposed approach,the reference data composed of several parts and each part is protected by a channel coding rate according to its importance.The first part,which is used to reconstruct a rough approximation of the original image,is highly protected in order to resist against higher tampering rates.Other parts are protected with lower rates according to their importance leading to lower tolerable tampering rate(TTR),but the higher quality of the recovered images.The proposed MSSR approach is an efficient solution for the main disadvantage of the current methods,which either recover a tampered image in low tampering rates or fails when tampering rate is above the TTR value.The simulation results on 10000 test images represent the efficiency of the multi-scale self-recovery feature of the proposed approach in comparison with the existing methods.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number(R.G.P.2/55/40/2019)Received by Fahd N.Al-Wesabi.www.kku.edu.sa。
文摘In this paper,a combined approach CAZWNLP(a combined approach of zero-watermarking and natural language processing)has been developed for the tampering detection of English text exchanged through the Internet.The third gram of alphanumeric of the Markov model has been used with text-watermarking technologies to improve the performance and accuracy of tampering detection issues which are limited by the existing works reviewed in the literature of this study.The third-grade level of the Markov model has been used in this method as natural language processing technology to analyze an English text and extract the textual characteristics of the given contexts.Moreover,the extracted features have been utilized as watermark information and then validated with the attacked English text to detect any suspected tampering occurred on it.The embedding mechanism of CAZWNLP method will be achieved logically without effects or modifying the original text document to embed a watermark key.CAZWNLP has been implemented using VS code IDE with PHP.The experimental and simulation results using standard datasets of varying lengths show that the proposed approach can obtain high robustness and better detection accuracy of tampering common random insertion,reorder,and deletion attacks,e.g.,Comparison results with baseline approaches also show the advantages of the proposed approach.
基金Supported by the National Natural Science Foun-dation of China (60373062 60573045)
文摘Because there are different modification types of deleting characters and inserting characters in text documents, the algorithms for image authentication can not be used for text documents authentication directly. A text watermarking scheme for text document authentication is proposed in this paper. By extracting the features of character cascade together with the user secret key, the scheme combines the features of the text with the user information as a watermark which is embedded into the transformed text itself. The receivers can verify the integrity and the authentication of the text through the blind detection technique. A further research demonstrates that it can also localize the tamper, classify the type of modification, and recover part of modified text documents. The aforementioned conclusion has been proved by both our experiment results and analysis.
基金funded by MOHE(FRGS:R.K130000.7856.5F026),Received by Nilam Nur Amir Sjarif.
文摘The text of the Quran is principally dependent on the Arabic language.Therefore,improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difcult challenges that researchers face today.Consequently,the diacritical marks in the Holy Quran which represent Arabic vowels(i,j.s)known as the kashida(or“extended letters”)must be protected from changes.The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio(PSNR),and Normalized Cross-Correlation(NCC);thus,the location for tamper detection accuracy is low.The gap addressed in this paper to improve the security of Arabic text in the Holy Quran by using vowels with kashida.To enhance the watermarking scheme of the text of the Quran based on hybrid techniques(XOR and queuing techniques)of the purposed scheme.The methodology propose scheme consists of four phases:The rst phase is pre-processing.This is followed by the second phase where an embedding process takes place to hide the data after the vowel letters wherein if the secret bit is“1”,it inserts the kashida but does not insert the kashida if the bit is“0”.The third phase is an extraction process and the last phase is to evaluate the performance of the proposed scheme by using PSNR(for the imperceptibility),and NCC(for the security of the watermarking).Experiments were performed on three datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results were revealed the improvement of the NCC by 1.76%,PSNR by 9.6%compared to available current schemes.
基金The author extends his appreciation to the Deanship of Scientic Research at King Khalid University for funding this work under grant number(R.G.P.2/55/40/2019),Received by Fahd N.Al-Wesabi.www.kku.edu.sa.
文摘Due to the rapid increase in the exchange of text information via internet networks,the security and the reliability of digital content have become a major research issue.The main challenges faced by researchers are authentication,integrity verication,and tampering detection of the digital contents.In this paper,text zero-watermarking and text feature-based approach is proposed to improve the tampering detection accuracy of English text contents.The proposed approach embeds and detects the watermark logically without altering the original English text document.Based on hidden Markov model(HMM),the fourth level order of the word mechanism is used to analyze the contents of the given English text to nd the interrelationship between the contexts.The extracted features are used as watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,the proposed approach has been implemented and validated with attacked English text.Experiments were performed using four standard datasets of varying lengths under multiple random locations of insertion,reorder,and deletion attacks.The experimental and simulation results prove the tampering detection accuracy of our method against all kinds of tampering attacks.Comparison results show that our proposed approach outperforms all the other baseline approaches in terms of tampering detection accuracy.
文摘Blind forensics of JPEG image tampering as a kind of digital image blind forensics technology is gradually becoming a new research hotspot in the field of image security. Firstly, the main achievements of domestic and foreign scholars in the blind forensic technology of JPEG image tampering were briefly described. Then, according to the different methods of tampering and detection, the current detection was divided into two types: double JPEG compression detection and block effect inconsistency detection. This paper summarized the existing methods of JPEG image blind forensics detection, and analyzed the two methods. Finally, the existing problems and future research trends were analyzed and prospected to provide further theoretical support for the research of JPEG image blind forensics technology.
文摘Technology has no limits today;we have lots of software available in the market by which we can alter any image. People usually copies image from the internet and after some changes they claim that these are their own properties. Insuring digital image integrity has therefore become a major issue. Over the past few years, watermarking has emerged as the leading candidate to solve problems of ownership and content authentications for digital multimedia documents. To protect authenticity of images semi fragile watermarking is very concerned by researchers because of its important function in multimedia content authentication. The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication using semifragile watermarking. In present paper comprehensive overview of insertion and extraction methods used in different semi fragile water marking algorithm are studied using image parameters, potential application, different algorithms are described and focus is on their comparison according to the properties cited above and future directions for developing a better image authentication algorithm are suggested.
基金This work was supported in part by the National Natural Science Foundation of China(No.61401512,61602508,61772549,6141512 and U1636219)the National Key R&D Program of China(No.2016YFB0801303 and 2016QY01W0105)+1 种基金the Key Technologies R&D Program of Henan Province(No.162102210032)the Key Science and Technology Research Project of Henan Province(No.152102210005).
文摘To detect and recover random tampering areas,a combined-decision-based self-embedding watermarking scheme is proposed herein.In this scheme,the image is first partitioned into 2×2 size blocks.Next,the high 5 bits of a block’s average value is embedded into its offset block.The tampering type of block is detected by comparing the watermarks of its pre-offset and post-offset blocks.The theoretical analysis and experiments demonstrate that the proposed scheme not only has a lower ratio of false detection but also better performance with regard to avoiding random tampering.
基金supported by the National Natural Science Foundation of China(Nos.U2001202,62072480,U1736118)the National Key R&D Program of China(Nos.2019QY2202,2019QY(Y)0207)+1 种基金the Key Areas R&D Program of Guangdong(No.2019B010136002)the Key Scientific Research Program of Guangzhou(No.201804020068).
文摘In recent years,with the rapid development of deep learning technologies,some neural network models have been applied to generate fake media.DeepFakes,a deep learning based forgery technology,can tamper with the face easily and generate fake videos that are difficult to be distinguished by human eyes.The spread of face manipulation videos is very easy to bring fake information.Therefore,it is important to develop effective detection methods to verify the authenticity of the videos.Due to that it is still challenging for current forgery technologies to generate all facial details and the blending operations are used in the forgery process,the texture details of the fake face are insufficient.Therefore,in this paper,a new method is proposed to detect DeepFake videos.Firstly,the texture features are constructed,which are based on the gradient domain,standard deviation,gray level co-occurrence matrix and wavelet transform of the face region.Then,the features are processed by the feature selection method to form a discriminant feature vector,which is finally employed to SVM for classification at the frame level.The experimental results on the mainstream DeepFake datasets demonstrate that the proposed method can achieve ideal performance,proving the effectiveness of the proposed method for DeepFake videos detection.
基金Project supported by the National Natural Science Foundation of China (Grant Nos.60773079, 60872116, 60832010)the National High-Technology Research and Development Program of China (Grant No.2007AA01Z477)
文摘A color-intensity feature extraction method is proposed aimed at supplementing conventional image hashing algorithms that only consider intensity of the image. An image is mapped to a set of blocks represented by their dominant colors and average intensities. The dominant color is defined by hue and saturation with the hue value adjusted to make the principal colors more uniformly distributed. The average intensity is extracted from the Y component in the YCbCr space. By quantizing the color and intensity components, a feature vector is formed in a cylindrical coordinate system for each image block, which may be used to generate an intermediate hash. Euclidean distance is modified and a similarity metric introduced to measure the degree of similarity between images in terms of the color-intensity features. This is used to validate effectiveness of the proposed feature vector. Experiments show that the color-intensity feature is robust to normal image processing while sensitive to malicious alteration, in particular, color modification.
基金The author extends his appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(R.G.P.2/25/42),Received by Fahd N.Al-Wesabi.www.kku.edu.sa.
文摘In this paper,the text analysis-based approach RTADZWA(Reliable Text Analysis and Digital Zero-Watermarking Approach)has been proposed for transferring and receiving authentic English text via the internet.Second level order of alphanumeric mechanism of hidden Markov model has been used in RTADZWA approach as a natural language processing to analyze the English text and extracts the features of the interrelationship between contexts of the text and utilizes the extracted features as watermark information and then validates it later with attacked English text to detect any tampering occurred on it.Text analysis and text zero-watermarking techniques have been integrated by RTADZWA approach to improving the performance,accuracy,capacity,and robustness issues of the previous literature proposed by the researchers.The RTADZWA approach embeds and detects the watermark logically without altering the original text document to embed a watermark.RTADZWA has been implemented using PHP with VS code IDE.The experimental and simulation results using standard datasets of varying lengths show that the proposed approach can obtain high robustness and better detection accuracy of tampering common random insertion,reorder,and deletion attacks,e.g.,Comparison results with baseline approaches also show the advantages of the proposed approach.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(GRP/14/42),Received by Fahd N.Al-Wesabi.www.kku.edu.sa.This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program.
文摘Themost common digital media exchanged via the Internet is in text form.The Arabic language is considered one of themost sensitive languages of content modification due to the presence of diacritics that can cause a change in the meaning.In this paper,an intelligent scheme is proposed for improving the reliability and security of the text exchanged via the Internet.The core mechanism of the proposed scheme depends on integrating the hidden Markov model and zero text watermarking techniques.The watermark key will be generated by utilizing the extracted features of the text analysis process using the third order and word level of the Markov model.The Embedding and detection processes of the proposed scheme will be performed logically without the effect of the original text.The proposed scheme is implemented using PHP with VS code IDE.The simulation results,using varying sizes of standard datasets,show that the proposed scheme can obtain high reliability and provide better accuracy of the common illegal tampering attacks.Comparison results with other baseline techniques show the added value of the proposed scheme.