[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

An Efficient Fragile Watermarking for Web Pages Tamper-Proof

  • Conference paper
Advances in Web and Network Technologies, and Information Management (APWeb 2007, WAIM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4537))

Abstract

The Internet is the most popular and convenient mode of communication for people. An incredible amount of information and many services are provided through the Internet. However, many famous websites often suffer from tampering. Therefore, website security has become an important issue. Recently, Zhao and Lu proposed a PCA-based watermark scheme for web pages, claiming that their process would make web pages tamper-proof and more efficient. However, the PCA algorithm is time-consuming in processing the features of the web page. Therefore, we design a fast fragile watermark for web pages based on hash functions, because hash functions can generate rapidly a digest for the web page. According to our experimental results, our scheme is up to 100 times faster than the PCA algorithm, and, at the same time, our scheme improves case insensitivity and the malfunctions of HTML tags that are drawbacks of Zhao and Lu’s scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 71.50
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Chang, C.C., Chan, C.S.: A Watermarking Scheme Based on Principal Component Analysis Technique. Informatica 14(4), 431–444 (2003)

    MATH  MathSciNet  Google Scholar 

  2. Chang, C.C., Wu, W.C., Hu, Y.C.: Public-Key Inter-Block Dependence Fragile Watermarking for Image Authentication Using Continued Fraction. Informatica 28, 147–152 (2004)

    MATH  Google Scholar 

  3. Chang, C.C., Tsai, P.Y., Lin, M.H.: SVD-based Digital Image Watermarking Scheme. Pattern Recognition Letters 26(10), 1577–1586 (2005)

    Article  Google Scholar 

  4. Chang, C.C., Hu, Y.S., Lu, T.C.: A Watermarking-Based Image Ownership and Tampering Authentication Scheme. Pattern Recognition Letters 27, 439–446 (2006)

    Article  Google Scholar 

  5. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann publishers, Seattle, Washington, USA (2002)

    Google Scholar 

  6. Craver, S., Memon, N., Yeo, B., Yeung, M.: Can Invisible Watermarks Resolve Rightful Ownership? IBM Research Division, Technical Report RC 20509 (1996)

    Google Scholar 

  7. Hwang, M.S., Chang, C.C., Hwang, K.F.: A Watermarking Technique Based on One-way Hash Functions. IEEE Transactions on Consumer Electronics 45(2), 286–294 (1999)

    Article  Google Scholar 

  8. Hwang, M.S., Chang, C.C., Hwang, K.F.: Digital Watermarking of Images Using Neural Networks. Journal of Electronic Imaging 9(4), 548–555 (Oct. 2000)

    Article  Google Scholar 

  9. Katzenbeisser, S., Petitcolas, A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Boston (2000)

    Google Scholar 

  10. NIST FIPS PUB 180-1, Secure Hash Standard, National Institute of Standards and Technology (April 1995), Available at http://www.itl.nist.gov/fipspubs/fip180-1.htm

  11. Rivest, R.: The MD5 Message-Digest Algorithm. RFC 1321, Internet Activities Board, Internet Privacy Task Force (1992)

    Google Scholar 

  12. Stallings, W.: Cryptography and Network Security Principles and Practice. Prentice-Hall Inc, Englewood Cliffs, New Jersey (1999)

    Google Scholar 

  13. Wu, H.C., Chang, C.C.: A Novel Digital Image Watermarking Scheme Based on the Vector Quantization Technique. Computers & Security 24(6), 460–471 (September 2005)

    Article  MathSciNet  Google Scholar 

  14. Zhao, Q., Lu, H.: PCA-based Web Page Watermarking. Pattern Recognition (2006), doi: 10.1016/j.patcog.2006.04.047

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Kevin Chen-Chuan Chang Wei Wang Lei Chen Clarence A. Ellis Ching-Hsien Hsu Ah Chung Tsoi Haixun Wang

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wu, CC., Chang, CC., Yang, SR. (2007). An Efficient Fragile Watermarking for Web Pages Tamper-Proof. In: Chang, K.CC., et al. Advances in Web and Network Technologies, and Information Management. APWeb WAIM 2007 2007. Lecture Notes in Computer Science, vol 4537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72909-9_72

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72909-9_72

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72908-2

  • Online ISBN: 978-3-540-72909-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics