Abstract
The Internet is the most popular and convenient mode of communication for people. An incredible amount of information and many services are provided through the Internet. However, many famous websites often suffer from tampering. Therefore, website security has become an important issue. Recently, Zhao and Lu proposed a PCA-based watermark scheme for web pages, claiming that their process would make web pages tamper-proof and more efficient. However, the PCA algorithm is time-consuming in processing the features of the web page. Therefore, we design a fast fragile watermark for web pages based on hash functions, because hash functions can generate rapidly a digest for the web page. According to our experimental results, our scheme is up to 100 times faster than the PCA algorithm, and, at the same time, our scheme improves case insensitivity and the malfunctions of HTML tags that are drawbacks of Zhao and Lu’s scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chang, C.C., Chan, C.S.: A Watermarking Scheme Based on Principal Component Analysis Technique. Informatica 14(4), 431–444 (2003)
Chang, C.C., Wu, W.C., Hu, Y.C.: Public-Key Inter-Block Dependence Fragile Watermarking for Image Authentication Using Continued Fraction. Informatica 28, 147–152 (2004)
Chang, C.C., Tsai, P.Y., Lin, M.H.: SVD-based Digital Image Watermarking Scheme. Pattern Recognition Letters 26(10), 1577–1586 (2005)
Chang, C.C., Hu, Y.S., Lu, T.C.: A Watermarking-Based Image Ownership and Tampering Authentication Scheme. Pattern Recognition Letters 27, 439–446 (2006)
Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann publishers, Seattle, Washington, USA (2002)
Craver, S., Memon, N., Yeo, B., Yeung, M.: Can Invisible Watermarks Resolve Rightful Ownership? IBM Research Division, Technical Report RC 20509 (1996)
Hwang, M.S., Chang, C.C., Hwang, K.F.: A Watermarking Technique Based on One-way Hash Functions. IEEE Transactions on Consumer Electronics 45(2), 286–294 (1999)
Hwang, M.S., Chang, C.C., Hwang, K.F.: Digital Watermarking of Images Using Neural Networks. Journal of Electronic Imaging 9(4), 548–555 (Oct. 2000)
Katzenbeisser, S., Petitcolas, A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Boston (2000)
NIST FIPS PUB 180-1, Secure Hash Standard, National Institute of Standards and Technology (April 1995), Available at http://www.itl.nist.gov/fipspubs/fip180-1.htm
Rivest, R.: The MD5 Message-Digest Algorithm. RFC 1321, Internet Activities Board, Internet Privacy Task Force (1992)
Stallings, W.: Cryptography and Network Security Principles and Practice. Prentice-Hall Inc, Englewood Cliffs, New Jersey (1999)
Wu, H.C., Chang, C.C.: A Novel Digital Image Watermarking Scheme Based on the Vector Quantization Technique. Computers & Security 24(6), 460–471 (September 2005)
Zhao, Q., Lu, H.: PCA-based Web Page Watermarking. Pattern Recognition (2006), doi: 10.1016/j.patcog.2006.04.047
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wu, CC., Chang, CC., Yang, SR. (2007). An Efficient Fragile Watermarking for Web Pages Tamper-Proof. In: Chang, K.CC., et al. Advances in Web and Network Technologies, and Information Management. APWeb WAIM 2007 2007. Lecture Notes in Computer Science, vol 4537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72909-9_72
Download citation
DOI: https://doi.org/10.1007/978-3-540-72909-9_72
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72908-2
Online ISBN: 978-3-540-72909-9
eBook Packages: Computer ScienceComputer Science (R0)