The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The tamper-proof of web pages schemes mainly includes two aspects, one is the generation algorithm on pre-embedded watermarking, and the other is the program on the watermarking embedded. In this paper, a novel web page watermark scheme is proposed for detecting and locating tampered web-page. Proposed scheme realize the location of the target HTML page tampered. PCA digital watermarking and ULC (Upper-Lower...
This paper starts from security needs of electronic notes in the present situation of e-commerce and discusses the application of information hiding technology and relative concepts. Then it presents a algorithm of information hiding technology that applies in the electronic notes system, including embedded hidden information algorithm and hidden information extraction algorithm, and describes the...
The following topics are dealt with:software watermarking algorithm; register allocation; fuzzy principal component analysis; gait recognition; intrusion detection; BIBD code; anticollision fingerprint; artificial neural network; information hiding algorithm; color image; logistics distribution simulation; Web mining; support vector machines; pseudo random sequence; DS-CDMA signals; fuzzy set theory;...
Digital watermarking technology is a frontier research field, and it serves an important role in information security. According to the analysis of the definition and basic characteristics of digital watermarking technology, the system model of digital watermarking is given. The system consists of two modules which are watermark embedding module and watermark detection and extraction module. In view...
A bi-watermarking algorithm basing on Contourlet transform is proposed in this paper. The algorithm adopts different methods to insert watermark into the low frequency and high frequency of the host image respectively. Firstly, perform Contourlet transform to the host image, then choose the low frequency to embed the watermark combined with Singular Value Decomposition(SVD), finally, putting coefficients...
The following topics are dealt with: multimedia computing; information networking; information security; communication security; network security; cultural heritage environment security; information privacy; social network; watermarking; multimedia search; multimedia mining; mobile Internet; wireless network security; network steganography; service-oriented architecture; services computing; and multimedia...
Secure multicasting is used in a wide range of multicast applications such as commercial pay-per-view video multicast and pay-per view digital library. The multicast protocol used must be secure with copyright protection to prevent the users from leaking the information. This paper focuses on the problem of leaker identification using a swarm intelligence (Ant Colony Optimization) based approach....
In this paper, we proposed an efficient dual watermark scheme for image tamper detection and recovery. In the proposed watermarking algorithm each block in the image contains watermark of other two blocks, i.e. two copies of watermark of the whole image is maintained and second chance for block recovery is provided in case one copy is destroyed. The algorithm proposed by Lee and Shinfeng is unable...
Pixel value differencing (PVD) is a steganographic method which embeds secret data in images based on spatial information. PVD has relatively high capacity but its effectiveness has been questioned by variety of steganalysis attacks. These attacks use the difference histogram quantization to reveal existence of secret data in a stego image. In this paper, we propose some modifications to PVD method...
Steganography is the art of hiding message in order to have a secure communication. In this paper, we present a novel technique for wave steganography for covert communication. The basic idea proposed in this paper is replacement of the bits according to the distortion afforded, with lossy or lossless hiding and recovery. Numbers of bits of the samples in cover file are replaced in accordance with...
The important role information hiding technology plays in the network information security system has been illustrated in paper on the basis of the information hiding principle, the characteristics and its key technologies. Then, the feature and effect of hiding information in network environment were discussed, as well as several hiding technique and detecting technique.
The proposed system in this paper gives the invisible watermarking which is performed by using Discrete Wavelet Transform. To get the invisible watermarking the alternate pixel value of the host video is replaced by the pixel value of watermark video/image. This type of watermarking provides a means of forensic analysis for combating media piracy. Video watermarking provides robustness to geometric...
In this paper, we present a technique of secure data transmission through hiding of data in audio file by replacing it's one of the higher 4th layer LSB bit. The. watermarked bit embedded into audio signal increases the robustness against noise.
The following topics are dealt with: neural networks; equalisation; mobile and cellular communications; optical communications; data security; human factors in communications; coding and modulation; optical networks; database and optimisation; time-frequency analysis; computer vision and recognition; audio and speech processing; wireless networks; watermarking; digital filters; network coding and...
Wireless sensor networks have spread widely in the recent years. They have a very wide range of applications such as environment monitoring and military applications like battlefield monitoring. Sensors and their data are vulnerable to various attacks, like data injection, deletion, modification or even node replacement. Because of the resource limitation, security mechanisms that are based on traditional...
In this paper, an extension of CPT scheme (CPTE for short) is introduced. In watermarking area, this is a block-based approach. Given a binary image B, in each block F of a size m??n of B, by CPT scheme, ones can embed r = Round(log2(m.n+1)) bits by changing at most two entries of F. In our CPTE scheme, r = Round(log2(m.n)) + 1 bits can be embedded by changing at most two entries of F, too. That means,...
The conventional audio watermarking methods have the following deficiencies: 1) the embedded watermarking signal bits are too less; 2) the embedded image watermarking is directly reduced to one-dimensional space and then embedded in audio signals, so the watermarking pre-process is too simple which reduce the security. To address these problems, a novel Audio watermark pre-process Algorithm is proposed...
Digital image histogram is an important global feature, in this paper, histogram will be used to embed binary watermark in the space domain. In the watermark embedding process, firstly, the corresponding histogram of image is generated according to the original images' characteristics, which shows the probability of the corresponding pixel in gray scale; Secondly, the distances between adjacent elements...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.