Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text

نویسندگان

چکیده

Content authentication, integrity verification, and tampering detection of digital content exchanged via the internet have been used to address a major concern in information communication technology. In this paper, text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing Digital Watermarking (SFASCDW) is proposed for authentication English text. A first-level order alphanumeric mechanism, hidden Markov model, integrated with techniques improve watermark robustness approach. The researcher uses mechanism model soft computing technique analyze Moreover, he extracts features interrelationship among contexts text, utilizes extracted information, validates it later studied detect any tampering. SFASCDW has implemented using PHP VS code IDE. robustness, effectiveness, applicability are proved experiments involving four datasets various lengths random locations three common attacks, namely insertion, reorder, deletion. was found be effective could applicable detecting possible

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hierarchical Fragile Watermarking Scheme For Image Authentication

In this paper, a simple hierarchical fragile watermarking scheme for image authentication is proposed. The important features and parity bits of an image are embedded by modifying the pixel value of the host image. Once an image is tampered by other users or corrupted by transmission, the parity bits and important features can be used to detect and recover the image. The method is effective bec...

متن کامل

Breaking a Robust Remote User Authentication Scheme Using Smart Cards

Understanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. Recently, Yeh et al. showed that Hsiang and Shih’s password-based remote user authentication scheme is vulnerable to various attacks if the smart card is nontamper resistant, and proposed an improved version which was claimed to be efficient and secure. In this...

متن کامل

Tampering with a watermarking-based image authentication scheme

Article history: Received 17 January 2008 Received in revised form 3 April 2008 Accepted 8 May 2008

متن کامل

Institutional Repository Tampering with a watermarking - based image authentication scheme

We analyse a recent image authentication scheme designed by Chang et al. [Chang, C.-C., Hu, Y.-S., Lu, T.-C., 2006, A watermarkingbased image ownership and tampering authentication scheme. Pattern Recognition Letters. 27, 439-446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Maniccam, S.S., Bourbakis, N., 2004, Lossless compression and information hiding in imag...

متن کامل

Tampering attacks on binary phase only filter–based watermarking schemes for image authentication

Recently, a category of watermarking techniques based on binary phase-only filter (BPOF) has been proposed for image authentica-tion. In such techniques, the authentication is implemented by evaluating the correlation between Fourier phase information and the hidden watermark bitplane. In this paper, we reveal the security flaws of BPOF-based watermarking algorithms and propose sophisticated ta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers, materials & continua

سال: 2022

ISSN: ['1546-2218', '1546-2226']

DOI: https://doi.org/10.32604/cmc.2022.018591