期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
A Hybrid Intelligent Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet 被引量:10
1
作者 Fahd N.Al-Wesabi 《Computers, Materials & Continua》 SCIE EI 2021年第1期195-211,共17页
In this paper,a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authenticati... In this paper,a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authentication and tampering detection of Arabic text contents.The proposed approach known as Second order of Alphanumeric Mechanism of Markov model and Zero-Watermarking Approach(SAMMZWA).Second level order of alphanumeric mechanism based on hidden Markov model is integrated with text zero-watermarking techniques to improve the overall performance and tampering detection accuracy of the proposed approach.The SAMMZWA approach embeds and detects the watermark logically without altering the original text document.The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,SAMMZWA has been implemented and validated with attacked Arabic text.Experiments were performed on four datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results show that our method is more sensitive for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods. 展开更多
关键词 HMM NLP text analysis ZERO-WATERMARKING tampering detection
下载PDF
Image Tampering Detection Using No-Reference Image Quality Metrics 被引量:3
2
作者 Ying Li Bo Wang +1 位作者 Xiang-Wei Kong Yan-Qing Guo 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期51-56,共6页
In this paper,a new approach is proposed to determine whether the content of an image is authentic or modified with a focus on detecting complex image tampering.Detecting image tampering without any prior information ... In this paper,a new approach is proposed to determine whether the content of an image is authentic or modified with a focus on detecting complex image tampering.Detecting image tampering without any prior information of the original image is a challenging problem since unknown diverse manipulations may have different characteristics and so do various formats of images.Our principle is that image processing,no matter how complex,may affect image quality,so image quality metrics can be used to distinguish tampered images.In particular,based on the alteration of image quality in modified blocks,the proposed method can locate the tampered areas.Referring to four types of effective no-reference image quality metrics,we obtain 13 features to present an image.The experimental results show that the proposed method is very promising on detecting image tampering and locating the locally tampered areas especially in realistic scenarios. 展开更多
关键词 image forensics tampering detection NO-REFERENCE image quality metrics tampering localization
下载PDF
Text Analysis-Based Watermarking Approach for Tampering Detection of English Text 被引量:1
3
作者 Fahd N.Al-Wesabi 《Computers, Materials & Continua》 SCIE EI 2021年第6期3701-3719,共19页
Due to the rapid increase in the exchange of text information via internet networks,the security and the reliability of digital content have become a major research issue.The main challenges faced by researchers are a... Due to the rapid increase in the exchange of text information via internet networks,the security and the reliability of digital content have become a major research issue.The main challenges faced by researchers are authentication,integrity verication,and tampering detection of the digital contents.In this paper,text zero-watermarking and text feature-based approach is proposed to improve the tampering detection accuracy of English text contents.The proposed approach embeds and detects the watermark logically without altering the original English text document.Based on hidden Markov model(HMM),the fourth level order of the word mechanism is used to analyze the contents of the given English text to nd the interrelationship between the contexts.The extracted features are used as watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,the proposed approach has been implemented and validated with attacked English text.Experiments were performed using four standard datasets of varying lengths under multiple random locations of insertion,reorder,and deletion attacks.The experimental and simulation results prove the tampering detection accuracy of our method against all kinds of tampering attacks.Comparison results show that our proposed approach outperforms all the other baseline approaches in terms of tampering detection accuracy. 展开更多
关键词 Text analysis English language processing hidden Markov model ZERO-WATERMARKING content authentication tampering detection
下载PDF
Securing Arabic Contents Algorithm for Smart Detecting of Illegal Tampering Attacks
4
作者 Mesfer Al Duhayyim Manal Abdullah Alohali +3 位作者 Fahd N.Al-Wesabi Anwer Mustafa Hilal Mohammad Medani Manar Ahmed Hamza 《Computers, Materials & Continua》 SCIE EI 2022年第2期2879-2894,共16页
Themost common digital media exchanged via the Internet is in text form.The Arabic language is considered one of themost sensitive languages of content modification due to the presence of diacritics that can cause a c... Themost common digital media exchanged via the Internet is in text form.The Arabic language is considered one of themost sensitive languages of content modification due to the presence of diacritics that can cause a change in the meaning.In this paper,an intelligent scheme is proposed for improving the reliability and security of the text exchanged via the Internet.The core mechanism of the proposed scheme depends on integrating the hidden Markov model and zero text watermarking techniques.The watermark key will be generated by utilizing the extracted features of the text analysis process using the third order and word level of the Markov model.The Embedding and detection processes of the proposed scheme will be performed logically without the effect of the original text.The proposed scheme is implemented using PHP with VS code IDE.The simulation results,using varying sizes of standard datasets,show that the proposed scheme can obtain high reliability and provide better accuracy of the common illegal tampering attacks.Comparison results with other baseline techniques show the added value of the proposed scheme. 展开更多
关键词 tampering detection ZERO-WATERMARKING soft computing text analysis hidden Markov model
下载PDF
DeepFake Videos Detection Based on Texture Features
5
作者 Bozhi Xu Jiarui Liu +2 位作者 Jifan Liang Wei Lu Yue Zhang 《Computers, Materials & Continua》 SCIE EI 2021年第7期1375-1388,共14页
In recent years,with the rapid development of deep learning technologies,some neural network models have been applied to generate fake media.DeepFakes,a deep learning based forgery technology,can tamper with the face ... In recent years,with the rapid development of deep learning technologies,some neural network models have been applied to generate fake media.DeepFakes,a deep learning based forgery technology,can tamper with the face easily and generate fake videos that are difficult to be distinguished by human eyes.The spread of face manipulation videos is very easy to bring fake information.Therefore,it is important to develop effective detection methods to verify the authenticity of the videos.Due to that it is still challenging for current forgery technologies to generate all facial details and the blending operations are used in the forgery process,the texture details of the fake face are insufficient.Therefore,in this paper,a new method is proposed to detect DeepFake videos.Firstly,the texture features are constructed,which are based on the gradient domain,standard deviation,gray level co-occurrence matrix and wavelet transform of the face region.Then,the features are processed by the feature selection method to form a discriminant feature vector,which is finally employed to SVM for classification at the frame level.The experimental results on the mainstream DeepFake datasets demonstrate that the proposed method can achieve ideal performance,proving the effectiveness of the proposed method for DeepFake videos detection. 展开更多
关键词 DeepFake video tampering tampering detection texture feature
下载PDF
An Optimal Text Watermarking Method for Sensitive Detecting of Illegal Tampering Attacks
6
作者 Anwer Mustafa Hilal Fahd N.Al-Wesabi +3 位作者 Mohammed Alamgeer Manar Ahmed Hamza Mohammad Mahzari Murad A.Almekhlafi 《Computers, Materials & Continua》 SCIE EI 2022年第3期5583-5600,共18页
Due to the rapid increase in the exchange of text information via internet networks,the security and authenticity of digital content have become a major research issue.The main challenges faced by researchers are how ... Due to the rapid increase in the exchange of text information via internet networks,the security and authenticity of digital content have become a major research issue.The main challenges faced by researchers are how to hide the information within the text to use it later for authentication and attacks tampering detection without effects on the meaning and size of the given digital text.In this paper,an efficient text-based watermarking method has been proposed for detecting the illegal tampering attacks on theArabic text transmitted online via an Internet network.Towards this purpose,the accuracy of tampering detection and watermark robustness has been improved of the proposed method as compared with the existing approaches.In the proposed method,both embedding and extracting of the watermark are logically implemented,which causes no change in the digital text.This is achieved by using the third level and alphanumeric strategy of the Markov model as a text analysis technique for analyzing the Arabic contents to obtain its features which are considered as the digital watermark.This digital watermark will be used later to detecting any tampering of illegal attack on the received Arabic text.An extensive set of experiments using four data sets of varying lengths proves the effectiveness of our approach in terms of detection accuracy,robustness,and effectiveness under multiple random locations of the common tampering attacks. 展开更多
关键词 Text analysis text-watermarking tampering detection text authentication
下载PDF
Deep Learning Based Image Forgery Detection Methods
7
作者 Liang Xiu-jian Sun He 《Journal of Cyber Security》 2022年第2期119-133,共15页
Increasingly advanced image processing technology has made digital image editing easier and easier.With image processing software at one’s fingertips,one can easily alter the content of an image,and the altered image... Increasingly advanced image processing technology has made digital image editing easier and easier.With image processing software at one’s fingertips,one can easily alter the content of an image,and the altered image is so realistic that it is illegible to the naked eye.These tampered images have posed a serious threat to personal privacy,social order,and national security.Therefore,detecting and locating tampered areas in images has important practical significance,and has become an important research topic in the field of multimedia information security.In recent years,deep learning technology has been widely used in image tampering localization,and the achieved performance has significantly surpassed traditional tampering forensics methods.This paper mainly sorts out the relevant knowledge and latest methods in the field of image tampering detection based on deep learning.According to the two types of tampering detection based on deep learning,the detection tasks of the method are detailed separately,and the problems and future prospects in this field are discussed.It is quite different from the existing work:(1)This paper mainly focuses on the problem of image tampering detection,so it does not elaborate on various forensic methods.(2)This paper focuses on the detectionmethod of image tampering based on deep learning.(3)This paper is driven by the needs of tampering targets,so it pays more attention to sorting out methods for different tampering detection tasks. 展开更多
关键词 Digital image forensics image tampering detection deep learning image splicing detection copy-move detection
下载PDF
An Overview of Image Tamper Detection
8
作者 Xingyu Chen 《Journal of Information Hiding and Privacy Protection》 2022年第2期103-113,共11页
With the popularization of high-performance electronic imaging equipment and the wide application of digital image editing software,the threshold of digital image editing becomes lower and lower.Thismakes it easy to t... With the popularization of high-performance electronic imaging equipment and the wide application of digital image editing software,the threshold of digital image editing becomes lower and lower.Thismakes it easy to trick the human visual system with professionally altered images.These tampered images have brought serious threats to many fields,including personal privacy,news communication,judicial evidence collection,information security and so on.Therefore,the security and reliability of digital information has been increasingly concerned by the international community.In this paper,digital image tamper detection methods are classified according to the clues that they rely on,detection methods based on image content and detection methods based on double JPEG compression traces.This paper analyzes and discusses the important algorithms in several classification methods,and summarizes the problems existing in various methods.Finally,this paper predicts the future development trend of tamper detection. 展开更多
关键词 Image forensics image tampering traces image tampering detection
下载PDF
Entropy-Based Watermarking Approach for Sensitive Tamper Detection of Arabic Text 被引量:4
9
作者 Fahd N.Al-Wesabi 《Computers, Materials & Continua》 SCIE EI 2021年第6期3635-3648,共14页
The digital text media is the most common media transferred via the internet for various purposes and is very sensitive to transfer online with the possibility to be tampered illegally by the tampering attacks.Therefo... The digital text media is the most common media transferred via the internet for various purposes and is very sensitive to transfer online with the possibility to be tampered illegally by the tampering attacks.Therefore,improving the security and authenticity of the text when it is transferred via the internet has become one of the most difcult challenges that researchers face today.Arabic text is more sensitive than other languages due to Harakat’s existence in Arabic diacritics such as Kasra,and Damma in which making basic changes such as modifying diacritic arrangements can lead to change the text meaning.In this paper,an intelligent hybrid solution is proposed with highly sensitive detection for any tampering on Arabic text exchanged via the internet.Natural language processing,entropy,and watermarking techniques have been integrated into this method to improve the security and reliability of Arabic text without limitations in text nature or size,and type or volumes of tampering attack.The proposed scheme is implemented,simulated,and validated using four standard Arabic datasets of varying lengths under multiple random locations of insertion,reorder,and deletion attacks.The experimental and simulation results prove the accuracy of tampering detection of the proposed scheme against all kinds of tampering attacks.Comparison results show that the proposed approach outperforms all of the other baseline approaches in terms of tampering detection accuracy. 展开更多
关键词 ENTROPY text features tamper detection arabic text NLP
下载PDF
Tamper Detection and Localization for Quranic Text Watermarking Scheme Based on Hybrid Technique 被引量:1
10
作者 Ali A.R.Alkhafaji Nilam Nur Amir Sjarif +3 位作者 M.A.Shahidan Nurulhuda Firdaus Mohd Azmi Haslina Md Sarkan Suriayati Chuprat 《Computers, Materials & Continua》 SCIE EI 2021年第7期77-102,共26页
The text of the Quran is principally dependent on the Arabic language.Therefore,improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difcult... The text of the Quran is principally dependent on the Arabic language.Therefore,improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difcult challenges that researchers face today.Consequently,the diacritical marks in the Holy Quran which represent Arabic vowels(i,j.s)known as the kashida(or“extended letters”)must be protected from changes.The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio(PSNR),and Normalized Cross-Correlation(NCC);thus,the location for tamper detection accuracy is low.The gap addressed in this paper to improve the security of Arabic text in the Holy Quran by using vowels with kashida.To enhance the watermarking scheme of the text of the Quran based on hybrid techniques(XOR and queuing techniques)of the purposed scheme.The methodology propose scheme consists of four phases:The rst phase is pre-processing.This is followed by the second phase where an embedding process takes place to hide the data after the vowel letters wherein if the secret bit is“1”,it inserts the kashida but does not insert the kashida if the bit is“0”.The third phase is an extraction process and the last phase is to evaluate the performance of the proposed scheme by using PSNR(for the imperceptibility),and NCC(for the security of the watermarking).Experiments were performed on three datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results were revealed the improvement of the NCC by 1.76%,PSNR by 9.6%compared to available current schemes. 展开更多
关键词 Text watermarking tamper detection AUTHENTICATION quranic text exclusive-or operation queuing technique
下载PDF
A Smart English Text Zero-Watermarking Approach Based on Third-Level Order and Word Mechanism of Markov Model 被引量:9
11
作者 Fahd N.Al-Wesabi 《Computers, Materials & Continua》 SCIE EI 2020年第11期1137-1156,共20页
Text information is principally dependent on the natural languages.Therefore,improving security and reliability of text information exchanged via internet network has become the most difficult challenge that researche... Text information is principally dependent on the natural languages.Therefore,improving security and reliability of text information exchanged via internet network has become the most difficult challenge that researchers encounter.Content authentication and tampering detection of digital contents have become a major concern in the area of communication and information exchange via the Internet.In this paper,an intelligent text Zero-Watermarking approach SETZWMWMM(Smart English Text Zero-Watermarking Approach Based on Mid-Level Order and Word Mechanism of Markov Model)has been proposed for the content authentication and tampering detection of English text contents.The SETZWMWMM approach embeds and detects the watermark logically without altering the original English text document.Based on Hidden Markov Model(HMM),Third level order of word mechanism is used to analyze the interrelationship between contexts of given English texts.The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,SETZWMWMM has been implemented and validated with attacked English text.Experiments were performed on four datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results show that our method is more sensitive and efficient for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods. 展开更多
关键词 Content authentication hidden Markov model ZERO-WATERMARKING NLP tampering detection.
下载PDF
A Reliable NLP Scheme for English Text Watermarking Based on Contents Interrelationship 被引量:3
12
作者 Fahd N.Al-Wesabi Saleh Alzahrani +3 位作者 Fuad Alyarimi Mohammed Abdul Nadhem Nemri Mohammed M.Almazah 《Computer Systems Science & Engineering》 SCIE EI 2021年第6期297-311,共15页
In this paper,a combined approach CAZWNLP(a combined approach of zero-watermarking and natural language processing)has been developed for the tampering detection of English text exchanged through the Internet.The thir... In this paper,a combined approach CAZWNLP(a combined approach of zero-watermarking and natural language processing)has been developed for the tampering detection of English text exchanged through the Internet.The third gram of alphanumeric of the Markov model has been used with text-watermarking technologies to improve the performance and accuracy of tampering detection issues which are limited by the existing works reviewed in the literature of this study.The third-grade level of the Markov model has been used in this method as natural language processing technology to analyze an English text and extract the textual characteristics of the given contexts.Moreover,the extracted features have been utilized as watermark information and then validated with the attacked English text to detect any suspected tampering occurred on it.The embedding mechanism of CAZWNLP method will be achieved logically without effects or modifying the original text document to embed a watermark key.CAZWNLP has been implemented using VS code IDE with PHP.The experimental and simulation results using standard datasets of varying lengths show that the proposed approach can obtain high robustness and better detection accuracy of tampering common random insertion,reorder,and deletion attacks,e.g.,Comparison results with baseline approaches also show the advantages of the proposed approach. 展开更多
关键词 NLP text analysis English text watermarking ROBUSTNESS tampering detection
下载PDF
An Optimized English Text Watermarking Method Based on Natural Language Processing Techniques
13
作者 Fahd N.Al-Wesabi 《Computers, Materials & Continua》 SCIE EI 2021年第11期1519-1536,共18页
In this paper,the text analysis-based approach RTADZWA(Reliable Text Analysis and Digital Zero-Watermarking Approach)has been proposed for transferring and receiving authentic English text via the internet.Second leve... In this paper,the text analysis-based approach RTADZWA(Reliable Text Analysis and Digital Zero-Watermarking Approach)has been proposed for transferring and receiving authentic English text via the internet.Second level order of alphanumeric mechanism of hidden Markov model has been used in RTADZWA approach as a natural language processing to analyze the English text and extracts the features of the interrelationship between contexts of the text and utilizes the extracted features as watermark information and then validates it later with attacked English text to detect any tampering occurred on it.Text analysis and text zero-watermarking techniques have been integrated by RTADZWA approach to improving the performance,accuracy,capacity,and robustness issues of the previous literature proposed by the researchers.The RTADZWA approach embeds and detects the watermark logically without altering the original text document to embed a watermark.RTADZWA has been implemented using PHP with VS code IDE.The experimental and simulation results using standard datasets of varying lengths show that the proposed approach can obtain high robustness and better detection accuracy of tampering common random insertion,reorder,and deletion attacks,e.g.,Comparison results with baseline approaches also show the advantages of the proposed approach. 展开更多
关键词 Text analysis NLP hidden markov model ZERO-WATERMARKING content authentication tampering detection
下载PDF
A New Fragile Watermark for Image
14
作者 陆唯杰 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2003年第2期146-149,共4页
Fragile watermarking is a method to verify the integrity and authenticity of multimedia data. A new fragile watermark for image was proposed, which can be used in image verification applications. The paper first descr... Fragile watermarking is a method to verify the integrity and authenticity of multimedia data. A new fragile watermark for image was proposed, which can be used in image verification applications. The paper first described the above two techniques, some of which will be used in the method. Then it described the embedding and authentication process and also analyzed the method to show how it can survive some attacks. The experimental results show that the proposed method doesn’t need the watermark or original image on authentication side. It provides more security against attack, and can localize where the tempering has occurred. 展开更多
关键词 WATERMARK image autentication tampering detection
下载PDF
Semi-Fragile Audio Watermarking Algorithm in DWT Domain 被引量:3
15
作者 LEI Min YANG Yu +1 位作者 LUO Shoushan NIU Xinxin 《China Communications》 SCIE CSCD 2010年第4期71-75,共5页
A novel semi-fragile audio watermarking algorithm in DWT domain is proposed in this paper.This method transforms the original audio into 3-layer wavelet domain and divides approximation wavelet coefficients into many ... A novel semi-fragile audio watermarking algorithm in DWT domain is proposed in this paper.This method transforms the original audio into 3-layer wavelet domain and divides approximation wavelet coefficients into many groups.Through computing mean quantization of per group,this algorithm embeds the watermark signal into the average value of the wavelet coefficients.Experimental results show that our semi-fragile audio watermarking algorithm is not only inaudible and robust against various common images processing,but also fragile to malicious modification.Especially,it can detect the tampered regions effectively. 展开更多
关键词 Semi-fragile Watermarking Wavelet Transform Mean Quantization Tamper detection
下载PDF
Extraction of color-intensity feature towards image authentication
16
作者 刘婷婷 王朔中 +1 位作者 张新鹏 郁志鸣 《Journal of Shanghai University(English Edition)》 CAS 2010年第5期337-342,共6页
A color-intensity feature extraction method is proposed aimed at supplementing conventional image hashing algorithms that only consider intensity of the image. An image is mapped to a set of blocks represented by thei... A color-intensity feature extraction method is proposed aimed at supplementing conventional image hashing algorithms that only consider intensity of the image. An image is mapped to a set of blocks represented by their dominant colors and average intensities. The dominant color is defined by hue and saturation with the hue value adjusted to make the principal colors more uniformly distributed. The average intensity is extracted from the Y component in the YCbCr space. By quantizing the color and intensity components, a feature vector is formed in a cylindrical coordinate system for each image block, which may be used to generate an intermediate hash. Euclidean distance is modified and a similarity metric introduced to measure the degree of similarity between images in terms of the color-intensity features. This is used to validate effectiveness of the proposed feature vector. Experiments show that the color-intensity feature is robust to normal image processing while sensitive to malicious alteration, in particular, color modification. 展开更多
关键词 feature extraction color space image hash tamper detection AUTHENTICATION
下载PDF
A Parametric Autoregressive Model for the Extraction of Electric Network Frequency Fluctuations in Audio Forensic Authentication
17
作者 Tarek E. Gemayel Martin Bouchard 《Journal of Energy and Power Engineering》 2016年第8期504-512,共9页
This paper proposes a new method for extracting ENF (electric network frequency) fluctuations from digital audio recordings for the purpose of forensic authentication. It is shown that the extraction of ENF componen... This paper proposes a new method for extracting ENF (electric network frequency) fluctuations from digital audio recordings for the purpose of forensic authentication. It is shown that the extraction of ENF components from audio recordings is realizable by applying a parametric approach based on an AR (autoregressive) model. The proposed method is compared to the existing STFT (short-time Fourier transform) based ENF extraction method. Experimental results from recorded electrical grid signals and recorded audio signals show that the proposed approach can improve the time resolution in the extracted ENF fluctuations and improve the detection of tampering with short alterations in longer audio recordings. 展开更多
关键词 Audio forensic authentication electric network frequency fluctuations autoregressive modeling tampering anddiscontinuity detection.
下载PDF
Active Approach for Tamper Detection with Robustness to Lossy Compression
18
作者 李剑 李生红 郑旭平 《Journal of Shanghai Jiaotong university(Science)》 EI 2013年第4期385-393,共9页
Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression,... Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression, fragile to malicious tampering and capable of recovery. We embed the watermark bits in the direct current value of energy concentration transform domain coefficients. Let the original watermark bits be content dependent and apply error correction coding to them before embedded to the image. While indicating the tam- pered area, the extracted bits from a suspicious image can be further decoded and then used to roughly recover the corresponding area. We also theoretically study the image quality and bit error rate. ExperimentM results demonstrate the effectiveness of the proposed scheme. 展开更多
关键词 active tamper detection energy concentration transform error correction code semi-fragile water- marking
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部