Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 338-341.
• Information Security • Previous Articles Next Articles
CHEN Wei-xu, CHEN Jian-ping, WEN Wan-zhi, CAI Liang
CLC Number:
[1]SUN P,LU H T.An efficient web page watermarking scheme[C]∥2009 2nd IEEE International Conference on Computer Science and Information Technology.Beijing,2009:163-167. [2]ZHANG Z,PENG H,LONG X.A Fragile Watermarking Sche-me Based on Hash Function for Web Pages[C]∥2011 International Conference on Network Computing and Information Security.Guilin,2011:417-420. [3]LI D J,ZHANG B.DWTC:A Dual Watermarking Scheme Based on Threshold Cryptography for Web Document[C]∥2010 International Conference on Computer Application and System Modeling (ICCASM 2010).Taiyuan,2010:510-514. [4]CHOU Y C,LIAO H C.A Webpage Data Hiding Method by Using Tag and CSS Attribute Setting[C]∥2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.Kitakyushu,2014:122-125. [5]SAINI S.A survey on watermarking web contents for protecting copyright[C]∥2015 International Conference on Innovations in Information,Embedded and Communication Systems (ICIIECS).Coimbatore,2015:1-4. [6]SONNLEITNER E.A user-tracable watermarking scheme for dynamic web-page content[C]∥The First InternationalConfe-rence on Future Generation Communication Technologies.London,2012:121-125. [7]HE C.Research of Web Resources Protection Based on Digital Watermarking and Digital Signature[C]∥2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS).Ostrawva,2016:294-297. [8]黄华军,王保卫,孙星明.基于CSS类选择符重复引入的网页信息隐藏算法[J].计算机研究与发展,2009,46(z1):138-142. [9]杨旭光,唐文龙.基于Shamir门限和html标签id的网页水印方法[J].计算机系统应用,2013,22(8):98-102. [10]沈勇.一种基于HTML文档的信息隐藏方案[C]∥第一届中国可信计算与信息安全学术会议.武汉:中国计算机学会,2004:217-220. [11]NECHTA I.Robustness analysis for dynamic watermarks[C]∥2017 International Multi-Conference on Engineering,Computer and Information Sciences (SIBIRCON).Novosibirsk,Russia,2017:298-300. [12]YU Z,X J Y,L Y X,et al.A spectrum watermark embedding and extracting method based on spread spectrum technique[C]∥2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT).Harbin,2016:16-22. [13]SOBHA R,VSUCHARITHA M.Secure transmission of data using audio watermarking with protection on synchronization attack[C]∥2015 Global Conference on Communication Technologies (GCCT).Thuckalay,2015:592-597. [14]SAINI S.A survey on watermarking web contents for protecting copyright[C]∥2015 International Conference on Innovations in Information,Embedded and Communication Systems (ICIIECS).Coimbatore,2015:1-4. [15]张立和,杨义先,钮心忻,等.软件水印综述[J].软件学报,2003,14(2):298-300. [16]陈真勇,唐龙,唐泽圣,等.以鲁棒性为目标的数字多水印研究[J].计算机学报,2006,29(11):2037-2043. [17]张冠男,王树勋,温泉.一种嵌入可读水印的自适应盲水印算法[J].电子学报,2005,33(2):308-312. [18]HARTUNG F,RAMME F.Digital rights management and watermarking of multimedia content for m-commerce applications[J].IEEE Communications Magazine,2000,38(11):78-84. [19]丁伟.基于Web网页的文本水印技术的研究[D].武汉:武汉理工大学,2012. |
[1] | SHE Wei, HUO Li-juan, TIAN Zhao, LIU Wei, SONG Xuan. Blockchain Covert Communication Model for Plain Text Information Hiding [J]. Computer Science, 2022, 49(1): 345-352. |
[2] | REN Shuai, WANG Meng, FAN Ao-xiong, GAO Ze, XU Jie, Shahzad KHURRAM, ZHANG Tao. Zero-high-resolution Information Hiding Algorithm for 3D Mesh Model [J]. Computer Science, 2020, 47(7): 328-334. |
[3] | PENG Wei, HU Ning and HU Jing-Jing. Overview of Research on Image Steganalysis Algorithms [J]. Computer Science, 2020, 47(6A): 325-331. |
[4] | ZHANG Jian-an. Users’ Sensitive Information Hiding Method in Hierarchical Heterogeneous Network Based on Mobile Switching Authentication [J]. Computer Science, 2019, 46(3): 217-220. |
[5] | LIU Zhong-yi, SHEN Xiang-chen, NI Lu-lin, XU Chun-gen. Algorithm Improvement of Pseudo-random Sequence Collision in Information Hiding [J]. Computer Science, 2018, 45(11A): 330-334. |
[6] | ZANG Rui, YU Yang. Composite Image Encryption Algorithm Based on Involutory Matrix [J]. Computer Science, 2018, 45(11A): 389-392. |
[7] | REN Shuai, ZHAO Xiang-mo, ZHANG Tao, SHI Fang-xia and MU De-jun. Information Hiding Scheme for 3D Models Based on Local Height and Mean Shift Clustering Analysis [J]. Computer Science, 2017, 44(3): 187-191. |
[8] | WENG Chao, ZHOU Liang and DING Qiu-lin. Primary and Secondary Webpage Information Hiding Algorithm Based on Invisible Characters [J]. Computer Science, 2016, 43(7): 136-140. |
[9] | TIAN Zu-wei, LI Yong-fan and LIU Yang. Research of PE File Information Hiding Based on Import Table Migration [J]. Computer Science, 2016, 43(1): 207-210. |
[10] | WANG Wei, LIN Xi-jie and LI Xiao-qin. Improved Information Hiding Algorithm Based on Motion Estimation of H.264 [J]. Computer Science, 2015, 42(6): 151-157. |
[11] | XIE Jian-quan,XIE Qing and HUANG Da-zu. Image Information Hiding Algorithm with High Security Based on Run-length [J]. Computer Science, 2014, 41(3): 172-175. |
[12] | . Study of Spatial Information Hiding Algorithm Based on MSB and HVS [J]. Computer Science, 2012, 39(9): 89-93. |
[13] | . Anonymous and Traceable Copyright Protection Protocol Based on Mobile Devices [J]. Computer Science, 2012, 39(4): 71-74. |
[14] | . Research of PE File Information Hiding Based on Incremental Link [J]. Computer Science, 2012, 39(12): 91-93. |
[15] | . New Copyright Protection Method Based on Text Feature Extraction [J]. Computer Science, 2012, 39(10): 104-107. |
|