{"title":"基于哈希函数的网页脆弱水印方案","authors":"Zulin Zhang, Hong Peng, Xianzhong Long","doi":"10.1109/NCIS.2011.91","DOIUrl":null,"url":null,"abstract":"With the development of Internet, the integrity protection of web pages has become an important problem. A fragile watermarking scheme based on hash function for web pages is proposed in this paper. Watermarks are generated by using hash function and these watermarks are related to the web page's content. Then, the watermarks are embedded into the tags and embedding locations, which are randomly pointed. In the detection phase, regenerated watermarks and extracted watermarks are got from the watermarked web page. Finally, according to comparing the mentioned above two kind watermarks, we can judge whether the web page has been tampered or not. In addition, we can also identify the types of modification and locate the locations of modification.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"A Fragile Watermarking Scheme Based on Hash Function for Web Pages\",\"authors\":\"Zulin Zhang, Hong Peng, Xianzhong Long\",\"doi\":\"10.1109/NCIS.2011.91\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the development of Internet, the integrity protection of web pages has become an important problem. A fragile watermarking scheme based on hash function for web pages is proposed in this paper. Watermarks are generated by using hash function and these watermarks are related to the web page's content. Then, the watermarks are embedded into the tags and embedding locations, which are randomly pointed. In the detection phase, regenerated watermarks and extracted watermarks are got from the watermarked web page. Finally, according to comparing the mentioned above two kind watermarks, we can judge whether the web page has been tampered or not. In addition, we can also identify the types of modification and locate the locations of modification.\",\"PeriodicalId\":215517,\"journal\":{\"name\":\"2011 International Conference on Network Computing and Information Security\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Network Computing and Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCIS.2011.91\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Network Computing and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCIS.2011.91","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Fragile Watermarking Scheme Based on Hash Function for Web Pages
With the development of Internet, the integrity protection of web pages has become an important problem. A fragile watermarking scheme based on hash function for web pages is proposed in this paper. Watermarks are generated by using hash function and these watermarks are related to the web page's content. Then, the watermarks are embedded into the tags and embedding locations, which are randomly pointed. In the detection phase, regenerated watermarks and extracted watermarks are got from the watermarked web page. Finally, according to comparing the mentioned above two kind watermarks, we can judge whether the web page has been tampered or not. In addition, we can also identify the types of modification and locate the locations of modification.