Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 338-341.

• Information Security • Previous Articles     Next Articles

New Method for Webpage Watermarking Based on Empty Styles

CHEN Wei-xu, CHEN Jian-ping, WEN Wan-zhi, CAI Liang   

  1. School of Computer Science and Technology,Nantong University,Nantong,Jiangsu 226019,China
  • Online:2019-02-26 Published:2019-02-26

Abstract: Webpage watermarking has important applications in webpage copyright protection and anti-tampering.The existing webpage watermarking methods mainly embed watermark information by using the insensitivity of HTML to some format changes.Such methods have the problems that watermark information is separated from the webpage contents,which makes the watermark less concealed and vulnerable to attacks.This paper proposed a new webpage watermarking method based on empty styles.Making use of HTML’s feature that it does no operation to a style without content definition,the method transforms watermark information into empty styles and embeds them into the HTML code.The embedded watermark information is closely linked with the HTML code and is of strong concealment.It is not easy to detect and attack,and has a large watermark capacity as well.Compared with the existing methods,the proposed method is more superior.

Key words: Copyright protection, Empty style, Information hiding, Webpage watermarking

CLC Number: 

  • TP309.2
[1]SUN P,LU H T.An efficient web page watermarking scheme[C]∥2009 2nd IEEE International Conference on Computer Science and Information Technology.Beijing,2009:163-167.
[2]ZHANG Z,PENG H,LONG X.A Fragile Watermarking Sche-me Based on Hash Function for Web Pages[C]∥2011 International Conference on Network Computing and Information Security.Guilin,2011:417-420.
[3]LI D J,ZHANG B.DWTC:A Dual Watermarking Scheme Based on Threshold Cryptography for Web Document[C]∥2010 International Conference on Computer Application and System Modeling (ICCASM 2010).Taiyuan,2010:510-514.
[4]CHOU Y C,LIAO H C.A Webpage Data Hiding Method by Using Tag and CSS Attribute Setting[C]∥2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.Kitakyushu,2014:122-125.
[5]SAINI S.A survey on watermarking web contents for protecting copyright[C]∥2015 International Conference on Innovations in Information,Embedded and Communication Systems (ICIIECS).Coimbatore,2015:1-4.
[6]SONNLEITNER E.A user-tracable watermarking scheme for dynamic web-page content[C]∥The First InternationalConfe-rence on Future Generation Communication Technologies.London,2012:121-125.
[7]HE C.Research of Web Resources Protection Based on Digital Watermarking and Digital Signature[C]∥2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS).Ostrawva,2016:294-297.
[8]黄华军,王保卫,孙星明.基于CSS类选择符重复引入的网页信息隐藏算法[J].计算机研究与发展,2009,46(z1):138-142.
[9]杨旭光,唐文龙.基于Shamir门限和html标签id的网页水印方法[J].计算机系统应用,2013,22(8):98-102.
[10]沈勇.一种基于HTML文档的信息隐藏方案[C]∥第一届中国可信计算与信息安全学术会议.武汉:中国计算机学会,2004:217-220.
[11]NECHTA I.Robustness analysis for dynamic watermarks[C]∥2017 International Multi-Conference on Engineering,Computer and Information Sciences (SIBIRCON).Novosibirsk,Russia,2017:298-300.
[12]YU Z,X J Y,L Y X,et al.A spectrum watermark embedding and extracting method based on spread spectrum technique[C]∥2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT).Harbin,2016:16-22.
[13]SOBHA R,VSUCHARITHA M.Secure transmission of data using audio watermarking with protection on synchronization attack[C]∥2015 Global Conference on Communication Technologies (GCCT).Thuckalay,2015:592-597.
[14]SAINI S.A survey on watermarking web contents for protecting copyright[C]∥2015 International Conference on Innovations in Information,Embedded and Communication Systems (ICIIECS).Coimbatore,2015:1-4.
[15]张立和,杨义先,钮心忻,等.软件水印综述[J].软件学报,2003,14(2):298-300.
[16]陈真勇,唐龙,唐泽圣,等.以鲁棒性为目标的数字多水印研究[J].计算机学报,2006,29(11):2037-2043.
[17]张冠男,王树勋,温泉.一种嵌入可读水印的自适应盲水印算法[J].电子学报,2005,33(2):308-312.
[18]HARTUNG F,RAMME F.Digital rights management and watermarking of multimedia content for m-commerce applications[J].IEEE Communications Magazine,2000,38(11):78-84.
[19]丁伟.基于Web网页的文本水印技术的研究[D].武汉:武汉理工大学,2012.
[1] SHE Wei, HUO Li-juan, TIAN Zhao, LIU Wei, SONG Xuan. Blockchain Covert Communication Model for Plain Text Information Hiding [J]. Computer Science, 2022, 49(1): 345-352.
[2] REN Shuai, WANG Meng, FAN Ao-xiong, GAO Ze, XU Jie, Shahzad KHURRAM, ZHANG Tao. Zero-high-resolution Information Hiding Algorithm for 3D Mesh Model [J]. Computer Science, 2020, 47(7): 328-334.
[3] PENG Wei, HU Ning and HU Jing-Jing. Overview of Research on Image Steganalysis Algorithms [J]. Computer Science, 2020, 47(6A): 325-331.
[4] ZHANG Jian-an. Users’ Sensitive Information Hiding Method in Hierarchical Heterogeneous Network Based on Mobile Switching Authentication [J]. Computer Science, 2019, 46(3): 217-220.
[5] LIU Zhong-yi, SHEN Xiang-chen, NI Lu-lin, XU Chun-gen. Algorithm Improvement of Pseudo-random Sequence Collision in Information Hiding [J]. Computer Science, 2018, 45(11A): 330-334.
[6] ZANG Rui, YU Yang. Composite Image Encryption Algorithm Based on Involutory Matrix [J]. Computer Science, 2018, 45(11A): 389-392.
[7] REN Shuai, ZHAO Xiang-mo, ZHANG Tao, SHI Fang-xia and MU De-jun. Information Hiding Scheme for 3D Models Based on Local Height and Mean Shift Clustering Analysis [J]. Computer Science, 2017, 44(3): 187-191.
[8] WENG Chao, ZHOU Liang and DING Qiu-lin. Primary and Secondary Webpage Information Hiding Algorithm Based on Invisible Characters [J]. Computer Science, 2016, 43(7): 136-140.
[9] TIAN Zu-wei, LI Yong-fan and LIU Yang. Research of PE File Information Hiding Based on Import Table Migration [J]. Computer Science, 2016, 43(1): 207-210.
[10] WANG Wei, LIN Xi-jie and LI Xiao-qin. Improved Information Hiding Algorithm Based on Motion Estimation of H.264 [J]. Computer Science, 2015, 42(6): 151-157.
[11] XIE Jian-quan,XIE Qing and HUANG Da-zu. Image Information Hiding Algorithm with High Security Based on Run-length [J]. Computer Science, 2014, 41(3): 172-175.
[12] . Study of Spatial Information Hiding Algorithm Based on MSB and HVS [J]. Computer Science, 2012, 39(9): 89-93.
[13] . Anonymous and Traceable Copyright Protection Protocol Based on Mobile Devices [J]. Computer Science, 2012, 39(4): 71-74.
[14] . Research of PE File Information Hiding Based on Incremental Link [J]. Computer Science, 2012, 39(12): 91-93.
[15] . New Copyright Protection Method Based on Text Feature Extraction [J]. Computer Science, 2012, 39(10): 104-107.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!