期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A New Fragile Watermarking Scheme for Text Documents Authentication 被引量:1
1
作者 XIANG Huazheng SUN Xingming TANG Chengliang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1661-1666,共6页
Because there are different modification types of deleting characters and inserting characters in text documents, the algorithms for image authentication can not be used for text documents authentication directly. A t... Because there are different modification types of deleting characters and inserting characters in text documents, the algorithms for image authentication can not be used for text documents authentication directly. A text watermarking scheme for text document authentication is proposed in this paper. By extracting the features of character cascade together with the user secret key, the scheme combines the features of the text with the user information as a watermark which is embedded into the transformed text itself. The receivers can verify the integrity and the authentication of the text through the blind detection technique. A further research demonstrates that it can also localize the tamper, classify the type of modification, and recover part of modified text documents. The aforementioned conclusion has been proved by both our experiment results and analysis. 展开更多
关键词 fragile text watermarking character cascade tamper localization tamper type classification tamper recovery
下载PDF
Self-embedding Image Watermarking based on Combined Decision Using Pre-offset and Post-offset Blocks
2
作者 Daofu Gong Yan Chen +2 位作者 Haoyu Lu Zhenyu Li Yibing Han 《Computers, Materials & Continua》 SCIE EI 2018年第11期243-260,共18页
To detect and recover random tampering areas,a combined-decision-based self-embedding watermarking scheme is proposed herein.In this scheme,the image is first partitioned into 2×2 size blocks.Next,the high 5 bits... To detect and recover random tampering areas,a combined-decision-based self-embedding watermarking scheme is proposed herein.In this scheme,the image is first partitioned into 2×2 size blocks.Next,the high 5 bits of a block’s average value is embedded into its offset block.The tampering type of block is detected by comparing the watermarks of its pre-offset and post-offset blocks.The theoretical analysis and experiments demonstrate that the proposed scheme not only has a lower ratio of false detection but also better performance with regard to avoiding random tampering. 展开更多
关键词 Fragile watermarking SELF-EMBEDDING offset block tamper recovery random tampering
下载PDF
A self-recovery fragile watermarking scheme for image authentication with superior localization 被引量:7
3
作者 HE HongJie ZHANG JiaShu CHEN Fan 《Science in China(Series F)》 2008年第10期1487-1507,共21页
To address the problems of the inferior localization and high probability of false rejection in existing self-recovery fragile watermarking algorithms, this paper proposes a new self-recovery fragile watermarking sche... To address the problems of the inferior localization and high probability of false rejection in existing self-recovery fragile watermarking algorithms, this paper proposes a new self-recovery fragile watermarking scheme with superior localization, and further discusses the probability of false rejection (PFR) and the probability of false acceptance (PFA) of the proposed scheme. Moreover, four measurements are defined to evaluate the quality of a recovered image. In the proposed algorithm, the original image is divided into 2×2 blocks to improve localization precision and decrease PFR under occurrence of random tampering. The PFR under occurrence of region tampering can be effectively decreased by randomly embedding the watermark of each block in conjunction with a novel method of tamper detection. Compared with the current self-recovery fragile watermarking algorithms, the proposed scheme not only resolves the tamper detection problem of self-embedding watermarking, but also improves the robustness against the random tampering of self-embedding watermarking. In addition, the subjective measurements are provided to evaluate the performance of the self-recovery watermarking schemes for image authentication. 展开更多
关键词 digital watermarking tamper recovery probability of false rejection probability of false acceptance
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部