Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text
نویسندگان
چکیده
Content authentication, integrity verification, and tampering detection of digital content exchanged via the internet have been used to address a major concern in information communication technology. In this paper, text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing Digital Watermarking (SFASCDW) is proposed for authentication English text. A first-level order alphanumeric mechanism, hidden Markov model, integrated with techniques improve watermark robustness approach. The researcher uses mechanism model soft computing technique analyze Moreover, he extracts features interrelationship among contexts text, utilizes extracted information, validates it later studied detect any tampering. SFASCDW has implemented using PHP VS code IDE. robustness, effectiveness, applicability are proved experiments involving four datasets various lengths random locations three common attacks, namely insertion, reorder, deletion. was found be effective could applicable detecting possible
منابع مشابه
Hierarchical Fragile Watermarking Scheme For Image Authentication
In this paper, a simple hierarchical fragile watermarking scheme for image authentication is proposed. The important features and parity bits of an image are embedded by modifying the pixel value of the host image. Once an image is tampered by other users or corrupted by transmission, the parity bits and important features can be used to detect and recover the image. The method is effective bec...
متن کاملBreaking a Robust Remote User Authentication Scheme Using Smart Cards
Understanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. Recently, Yeh et al. showed that Hsiang and Shih’s password-based remote user authentication scheme is vulnerable to various attacks if the smart card is nontamper resistant, and proposed an improved version which was claimed to be efficient and secure. In this...
متن کاملTampering with a watermarking-based image authentication scheme
Article history: Received 17 January 2008 Received in revised form 3 April 2008 Accepted 8 May 2008
متن کاملInstitutional Repository Tampering with a watermarking - based image authentication scheme
We analyse a recent image authentication scheme designed by Chang et al. [Chang, C.-C., Hu, Y.-S., Lu, T.-C., 2006, A watermarkingbased image ownership and tampering authentication scheme. Pattern Recognition Letters. 27, 439-446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Maniccam, S.S., Bourbakis, N., 2004, Lossless compression and information hiding in imag...
متن کاملTampering attacks on binary phase only filter–based watermarking schemes for image authentication
Recently, a category of watermarking techniques based on binary phase-only filter (BPOF) has been proposed for image authentica-tion. In such techniques, the authentication is implemented by evaluating the correlation between Fourier phase information and the hidden watermark bitplane. In this paper, we reveal the security flaws of BPOF-based watermarking algorithms and propose sophisticated ta...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers, materials & continua
سال: 2022
ISSN: ['1546-2218', '1546-2226']
DOI: https://doi.org/10.32604/cmc.2022.018591