QR codes are applied widely on the Internet and mobile devices in recent years.Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily.Also,the QR code does not ...QR codes are applied widely on the Internet and mobile devices in recent years.Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily.Also,the QR code does not have the ability of hiding information,which leads to everyone can get access to read the content in any QR code,including those hiding some secret content in the bytes of QR code.Therefore,in recent years,information tampering and information leakage cases caused by poor security of two-dimensional code occur frequently,especially in the financial field and multi-party verification scenarios.QR codes are almost impossible to use in these scenarios.Therefore,this paper proposes a distributed information sharing method based on information hiding QR code.This method can make secret code in QR code safer and robust,and the secret shared between receivers can be used for decryption and attacking detection.Therefore,on the one hand,the information hiding method can maximize the capacity of embedded secret information,on the other hand,it can prevent attacks by disguised attackers and recover hidden secret information through reconstruction.This paper illustrates the feasibility of this scheme through the form of theoretical proof.展开更多
An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted in...An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted into a character string as the watermark, and then the watermark will be embedded into the coordinate descriptions of the attribute file by the "0-bit value" programming method. This programming algorithm ensures that the accuracy is lossless and the graphics is unchanged for any vector map. Experiments show that the presented hiding scheme has stable robustness, the average similarity rate is 97.2% for fingerprints matching and the false non-match rate is 1.38% in the blocking test. In the opening test, the former reaches 84.46% and the latter reaches 5.56%.展开更多
<div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information tr...<div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information transmission and other fields. Driven by strong demand, digital image watermarking technology has aroused widespread research interest and has gradually developed into one of the most active research directions in information science. In this paper, we present a novel robust digital watermarking algorithm based on discrete radon transform tight frame in finite-set (FDRT). FDRT of the zero mean image is a tight frame, the frame boundary <em><strong>A</strong></em> = <em><strong>B</strong></em> = 1, the dual of the frame is itself. The decomposition and reconstruction of the FDRT tight frame will not cause the phenomenon of image distortion. The embedding of hidden watermark is to add a weak signal to the strong background of the original image. Watermark extraction is to effectively identify the embedded weak signal. The feasibility of the watermarking algorithm is analyzed from two aspects of information hiding and robustness. We select the independent Gaussian random vector as the watermark series, and the peak signal-to-noise ratio (PSNR) as the visual degradation criterion of the watermark image. Basing the FDRT compact stand dual operator, we derived the relationship among the strength parameter, square sum of watermark series, the PSNR. Using Checkmark system, the simulation results show that the algorithm is robust enough to some very important image processing attacks such as lossy compression, MAP, filtering, segmentation, edge enhancement, jitter, quadratic modulation and general geometric attack (scaling, rotation, shearing), etc. </div>展开更多
A digital watermarking algorithm based on the matrix multiplication secret sharing scheme is proposed. It partitions the field of the image into n shares, and also partitions the watermark into n shares correspondingl...A digital watermarking algorithm based on the matrix multiplication secret sharing scheme is proposed. It partitions the field of the image into n shares, and also partitions the watermark into n shares correspondingly. After the original image is divided, the digital watermark is embedded into the low frequency DCT domain and only needs part shares in the recovering course. Experimental results show that this algorithm has a good effect of hiding, anti-cutting and anti-compressing.展开更多
This study presents enhancing images authentication by securing watermarking hidden data via shares generated from counting-based secret sharing.The trustfulness of shares utilised secret-sharing as an applicable priv...This study presents enhancing images authentication by securing watermarking hidden data via shares generated from counting-based secret sharing.The trustfulness of shares utilised secret-sharing as an applicable privacy creation tool for the authentication of real-life complex platforms.This research adjusts embedding the watermarking data over the images by innovative redistribution of shares to be embedded spread over all the images.The anticipated watermarking technique guaranteed to scatter the share bits implanting at different least significant bits of image pixels as boosting up the trust overall authentication practicality.The paper experimentation performance analysis shows that this improved image watermarking authentication(capacity)is averagely better by 33%–67%than other related exclusive-OR oriented and octagon approaches.Interestingly,these measurement improvements did not degrade the robustness and security of the system,inspiring our research for opening novel track of related future counting-based secret-sharing authentication progresses to come.展开更多
Block-wise fragile watermarks can be used to reveal maliciously tampered areas in multimedia products. However a forged content containing a cloned fragile watermark can be constructed by using a series of watermarked...Block-wise fragile watermarks can be used to reveal maliciously tampered areas in multimedia products. However a forged content containing a cloned fragile watermark can be constructed by using a series of watermarked data. To defeat this type of counterfeit attack, a novel fragile watermarking technique is proposed in which different pseudo-random data are selected for different host products, and the generated fragile watermark is dependent upon the selected information. While inserting the fragile watermark, the pseudo-random information is also robustly embedded into the host data. Because of the difference between the selected information, different watermarked data cannot be used to forge illegal contents containing a valid fragile watermark.展开更多
Information security is one of the most important methods of protecting the confidentiality and privacy of internet users.The greater the volume of data,the more the need to increase the security methods for protectin...Information security is one of the most important methods of protecting the confidentiality and privacy of internet users.The greater the volume of data,the more the need to increase the security methods for protecting data from intruders.This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness.Protection of digital content is a major issue in maintaining the privacy and secrecy of data.Toward this end,digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark in an efficient manner.Recent methodologies in the research on digital watermarking result in data distortion after embedding the watermark.This scenario can reduce the efficiency of detecting watermarks as well as violate data confidentiality.This study adapts a robust reversible histogram shifting(HS)technique for textual data in relational databases.Furthermore,the study presents a digital watermarking scheme intended for document copyright protection and proof of ownership.The major advantage of the proposed watermarking scheme is that it can protect digital data and preserve data quality.To the best of our knowledge,this research methodology is promising for use in the HS expansion model for watermarking data on nonnumeric databases.In addition,the results showed that despite exposing the database to an insertion attacks at 50%and 75%of the watermark,the proposed algorithm can recovermore than half of the embedded watermark in all addition and alteration attacks cases.As a result,the watermark information can be retained and restored completely.展开更多
A novel lossless information hiding algorithm based on wavelet neural network for digital vector maps is introduced. Wavelet coefficients being manipulated are embedded into a vector map, which could be restored by ad...A novel lossless information hiding algorithm based on wavelet neural network for digital vector maps is introduced. Wavelet coefficients being manipulated are embedded into a vector map, which could be restored by adjusting the weights of neurons in the designed neural network. When extracting the watermark extraction, those coefficients would be extracted by wavelet decomposition. With the trained multilayer feed forward neural network, the watermark would be obtained finally by measuring the weights of neurons. Experimental results show that the average error coding rate is only 6% for the proposed scheme and compared with other classical algorithms on the same tests, it is indicated that the proposed algorithm hashigher robustness, better invisibility and less loss on precision.展开更多
In recent years,QR code has been widely used in the Internet and mobile devices.It is based on open standards and easy to generate a code,which lead to that anyone can generate their own QR code.Because the QR code do...In recent years,QR code has been widely used in the Internet and mobile devices.It is based on open standards and easy to generate a code,which lead to that anyone can generate their own QR code.Because the QR code does not have the ability of information hiding,any device can access the content in QR code.Thus,hiding the secret data in QR code becomes a hot topic.Previously,the information hiding methods based on QR code all use the way of information hiding based on image,mostly using digital watermarking technology,and not using the coding rules of QR code to hide information.Therefore,we propose a distributed information sharing method based on QR code information hiding.On the one hand,we can start from the coding rules of QR code and use the information hiding method to maximize the capacity of secret information embedded in QR code.On the other hand,the distributed information sharing method is used to decentralize.At the same time,experimental results and analysis show that the proposed scheme can prevent the attack of camouflage attacker,and finally recover hidden information by secret reconstruction.展开更多
基金This work was partially supported by the National Natural Science Foundation of China(61876089,61876185,61902281,61375121)the Opening Project of Jiangsu Key Laboratory of Data Science and Smart Software(No.2019DS301)+1 种基金the Engineering Research Center of Digital Forensics,Ministry of Education,the Science and Technology Program of Jiangsu Province Construction System(2020JH08)the Priority Academic Program Development of Jiangsu Higher Education Institutions。
文摘QR codes are applied widely on the Internet and mobile devices in recent years.Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily.Also,the QR code does not have the ability of hiding information,which leads to everyone can get access to read the content in any QR code,including those hiding some secret content in the bytes of QR code.Therefore,in recent years,information tampering and information leakage cases caused by poor security of two-dimensional code occur frequently,especially in the financial field and multi-party verification scenarios.QR codes are almost impossible to use in these scenarios.Therefore,this paper proposes a distributed information sharing method based on information hiding QR code.This method can make secret code in QR code safer and robust,and the secret shared between receivers can be used for decryption and attacking detection.Therefore,on the one hand,the information hiding method can maximize the capacity of embedded secret information,on the other hand,it can prevent attacks by disguised attackers and recover hidden secret information through reconstruction.This paper illustrates the feasibility of this scheme through the form of theoretical proof.
文摘An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted into a character string as the watermark, and then the watermark will be embedded into the coordinate descriptions of the attribute file by the "0-bit value" programming method. This programming algorithm ensures that the accuracy is lossless and the graphics is unchanged for any vector map. Experiments show that the presented hiding scheme has stable robustness, the average similarity rate is 97.2% for fingerprints matching and the false non-match rate is 1.38% in the blocking test. In the opening test, the former reaches 84.46% and the latter reaches 5.56%.
文摘<div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information transmission and other fields. Driven by strong demand, digital image watermarking technology has aroused widespread research interest and has gradually developed into one of the most active research directions in information science. In this paper, we present a novel robust digital watermarking algorithm based on discrete radon transform tight frame in finite-set (FDRT). FDRT of the zero mean image is a tight frame, the frame boundary <em><strong>A</strong></em> = <em><strong>B</strong></em> = 1, the dual of the frame is itself. The decomposition and reconstruction of the FDRT tight frame will not cause the phenomenon of image distortion. The embedding of hidden watermark is to add a weak signal to the strong background of the original image. Watermark extraction is to effectively identify the embedded weak signal. The feasibility of the watermarking algorithm is analyzed from two aspects of information hiding and robustness. We select the independent Gaussian random vector as the watermark series, and the peak signal-to-noise ratio (PSNR) as the visual degradation criterion of the watermark image. Basing the FDRT compact stand dual operator, we derived the relationship among the strength parameter, square sum of watermark series, the PSNR. Using Checkmark system, the simulation results show that the algorithm is robust enough to some very important image processing attacks such as lossy compression, MAP, filtering, segmentation, edge enhancement, jitter, quadratic modulation and general geometric attack (scaling, rotation, shearing), etc. </div>
文摘A digital watermarking algorithm based on the matrix multiplication secret sharing scheme is proposed. It partitions the field of the image into n shares, and also partitions the watermark into n shares correspondingly. After the original image is divided, the digital watermark is embedded into the low frequency DCT domain and only needs part shares in the recovering course. Experimental results show that this algorithm has a good effect of hiding, anti-cutting and anti-compressing.
文摘This study presents enhancing images authentication by securing watermarking hidden data via shares generated from counting-based secret sharing.The trustfulness of shares utilised secret-sharing as an applicable privacy creation tool for the authentication of real-life complex platforms.This research adjusts embedding the watermarking data over the images by innovative redistribution of shares to be embedded spread over all the images.The anticipated watermarking technique guaranteed to scatter the share bits implanting at different least significant bits of image pixels as boosting up the trust overall authentication practicality.The paper experimentation performance analysis shows that this improved image watermarking authentication(capacity)is averagely better by 33%–67%than other related exclusive-OR oriented and octagon approaches.Interestingly,these measurement improvements did not degrade the robustness and security of the system,inspiring our research for opening novel track of related future counting-based secret-sharing authentication progresses to come.
基金National Natual Science Foundation of China (Grant No.600722030)Key Disciplinary Development Program of Shanghai (Grant No. 2001 - 44)
文摘Block-wise fragile watermarks can be used to reveal maliciously tampered areas in multimedia products. However a forged content containing a cloned fragile watermark can be constructed by using a series of watermarked data. To defeat this type of counterfeit attack, a novel fragile watermarking technique is proposed in which different pseudo-random data are selected for different host products, and the generated fragile watermark is dependent upon the selected information. While inserting the fragile watermark, the pseudo-random information is also robustly embedded into the host data. Because of the difference between the selected information, different watermarked data cannot be used to forge illegal contents containing a valid fragile watermark.
文摘Information security is one of the most important methods of protecting the confidentiality and privacy of internet users.The greater the volume of data,the more the need to increase the security methods for protecting data from intruders.This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness.Protection of digital content is a major issue in maintaining the privacy and secrecy of data.Toward this end,digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark in an efficient manner.Recent methodologies in the research on digital watermarking result in data distortion after embedding the watermark.This scenario can reduce the efficiency of detecting watermarks as well as violate data confidentiality.This study adapts a robust reversible histogram shifting(HS)technique for textual data in relational databases.Furthermore,the study presents a digital watermarking scheme intended for document copyright protection and proof of ownership.The major advantage of the proposed watermarking scheme is that it can protect digital data and preserve data quality.To the best of our knowledge,this research methodology is promising for use in the HS expansion model for watermarking data on nonnumeric databases.In addition,the results showed that despite exposing the database to an insertion attacks at 50%and 75%of the watermark,the proposed algorithm can recovermore than half of the embedded watermark in all addition and alteration attacks cases.As a result,the watermark information can be retained and restored completely.
文摘A novel lossless information hiding algorithm based on wavelet neural network for digital vector maps is introduced. Wavelet coefficients being manipulated are embedded into a vector map, which could be restored by adjusting the weights of neurons in the designed neural network. When extracting the watermark extraction, those coefficients would be extracted by wavelet decomposition. With the trained multilayer feed forward neural network, the watermark would be obtained finally by measuring the weights of neurons. Experimental results show that the average error coding rate is only 6% for the proposed scheme and compared with other classical algorithms on the same tests, it is indicated that the proposed algorithm hashigher robustness, better invisibility and less loss on precision.
文摘In recent years,QR code has been widely used in the Internet and mobile devices.It is based on open standards and easy to generate a code,which lead to that anyone can generate their own QR code.Because the QR code does not have the ability of information hiding,any device can access the content in QR code.Thus,hiding the secret data in QR code becomes a hot topic.Previously,the information hiding methods based on QR code all use the way of information hiding based on image,mostly using digital watermarking technology,and not using the coding rules of QR code to hide information.Therefore,we propose a distributed information sharing method based on QR code information hiding.On the one hand,we can start from the coding rules of QR code and use the information hiding method to maximize the capacity of secret information embedded in QR code.On the other hand,the distributed information sharing method is used to decentralize.At the same time,experimental results and analysis show that the proposed scheme can prevent the attack of camouflage attacker,and finally recover hidden information by secret reconstruction.