Content Authentication of English Text via Internet using Zero Watermarking Technique and Markov Model

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Content based Zero-Watermarking Algorithm for Authentication of Text Documents

Copyright protection and authentication of digital contents has become a significant issue in the current digital epoch with efficient communication mediums such as internet. Plain text is the rampantly used medium used over the internet for information exchange and it is very crucial to verify the authenticity of information. There are very limited techniques available for plain text watermark...

متن کامل

Zero-Watermarking Technique for Medical Image Authentication

In this paper, we present zero-watermarking technique for medical image based on thinning file in order to ensure the authenticity and integrity of the medical images. Medical images, different of other images, require careful attention when hiding watermark information within them because the watermark bits may be affect on the region of interest (ROI) and misdiagnose. Therefore, zero-watermar...

متن کامل

Zero-Distortion Authentication Watermarking

This paper proposes a zero-distortion authentication watermarking to produces a watermarked signal. With the same decoder, the watermarked signal has the same quality as the original one. To this end, the scheme replaces the original signal with its equivalence so as to embed authentication message. We employ this concept to authenticate palette images by regulating the palette. Because the vis...

متن کامل

Robust Image Content Authentication Using Perceptual Hashing and Watermarking

Perceptual hashing is a promising tool for multimedia content authentication. Digital watermarking is a convenient way of data hiding. By combining the two, we get a more efficient and versatile solution. In a typical scenario, multimedia data is sent from a server to a client. The corresponding hash value is embedded in the data. The data might undergo incidental distortion and malicious modif...

متن کامل

Perceptible Content Retrieval in DCT Domain and Semi-Fragile Watermarking Technique for Perceptible Content Authentication

Digital watermarking was commenced to copyright protection and ownership verification of multimedia data. However the evolution of the watermark focused on different security aspects of multimedia data such as integrity and authenticity. Fragile and semi-fragile watermarking schemes were introduced to accomplish these requirements. In this paper, we propose semi-fragile watermarking scheme to a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Applied Information Systems

سال: 2014

ISSN: 2249-0868

DOI: 10.5120/ijais14-451128