Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    QUANTIZATION-BASED FRAGILE WATERMARKING USING BLOCK-WISE AUTHENTICATION AND PIXEL-WISE RECOVERY SCHEME FOR TAMPERED IMAGE

    This paper suggests an efficient fragile watermarking scheme for image content authentication along with altered region restoration capability. In this scheme, image is divided into nonoverlapping blocks of size 2 × 2 and for each block, eight bits for image content recovery data and four bits for authentication data from five most significant bits (MSBs) of each pixel, are generated. These 12 bits are embedded into the least significant bits (LSBs) of the pixels which are placed in its corresponding mapping block. At the receiver end by comparing the recalculated and extracted authentication data, the tampered blocks can easily be identified and using recovery data, one can easily restore the tampered block. Results of experiments demonstrate that the proposed scheme is effective enough for alteration detection as well as tamper recovery of the image.

  • chapterNo Access

    Tamper Detection of Batch Websites Based on Text Comparison

    Currently, information search on websites is an indispensable part of daily life. It is an important platform to obtain resources, such as regular notifications or current affairs about relevant companies, schools or other organizations. However, websites are prone to tampering by malicious attacks and thus tamper detection for websites is an important countermeasure to maintain the credibility and integrity of information found on websites. In this paper, we propose a highly feasible batch website tamper detection method based on text comparison. Different algorithms for text comparison have been proposed to analyze various websites with with varying degrees tamper detection using three factors: time efficiency, accuracy of detection and memory consumption. The experiments demonstrated that different algorithms have varying performances in terms of website tamper detection but nevertheless the string comparison method has more advantages under normal circumstances.