[1]张震宇,李千目,戚湧.基于不可见字符的文本水印设计[J].南京理工大学学报(自然科学版),2017,41(04):405.[doi:10.14177/j.cnki.32-1397n.2017.41.04.002]
 Zhang Zhenyu,Li Qianmu,Qi Yong.Text watermarking design based on invisible characters[J].Journal of Nanjing University of Science and Technology,2017,41(04):405.[doi:10.14177/j.cnki.32-1397n.2017.41.04.002]
点击复制

基于不可见字符的文本水印设计()
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
41卷
期数:
2017年04期
页码:
405
栏目:
出版日期:
2017-08-31

文章信息/Info

Title:
Text watermarking design based on invisible characters
文章编号:
1005-9830(2017)04-0405-07
作者:
张震宇李千目戚湧
南京理工大学 计算机科学与工程学院,江苏 南京 210094
Author(s):
Zhang ZhenyuLi QianmuQi Yong
School of Computer Science and Engineering,Nanjing University of Science and Technology,Nanjing 210094,China
关键词:
文本水印 版权保护 防篡改 信息隐藏 不可见字符 文本溯源
Keywords:
text watermarking copyright protection tamper-proof information hiding invisible characters text traceability
分类号:
TP309
DOI:
10.14177/j.cnki.32-1397n.2017.41.04.002
摘要:
为了在文本中嵌入版权信息且防止文本被篡改,提出一种基于不可见Unicode字符的文本水印嵌入和提取方法。该方法在不改变原文外观的前提下,将需要嵌入的水印信息通过编码和替换转化为不可见字符串,嵌入到文本特定位置,实现在无格式文本中附加信息。该方法能够对文本信息的来源进行标示,通过水印中的哈希信息能使文本具备防篡改能力。实验显示该方法特别适用于网络文本的版权保护。
Abstract:
In order to embed watermarks into text as well as to protect the content against tampering,a text watermarking method based on invisible Unicode characters is proposed.Technically,this method is independent of text layout and style and can be applied to non-formatted text watermarking.Consequently,copyright information can be encoded into a sequence of invisible characters by this method which can be embedded into the text without changing the visual appearance.Also,it is easy to obtain the author’s information from a piece of text,and more importantly,the text content is protected by the hash code in watermark.According to tests,this method is particularly applicable to the copyright protection of text transmitted over the Internet.

参考文献/References:

[1] 华梦,王雷.基于DCT-DWT的FRFT数字水印算法[J].南京理工大学学报,2015,39(4):435-439.
Hua Meng,Wang Lei.Method of digital watermark in FRFT domain based on DCT-DWT[J].Journal of Nanjing University of Science and Technology,2015,39(4):435-439.
[2]刘静,刘晓威,张金,等.基于文本水印的数字作品侵权追踪问题研究[J].南开大学学报(自然科学版),2014,47(3):93-101.
Liu Jing,Liu Xiaowei,Zhang Jin,et al.Research on digital works tort tracking with text watermark[J].Acta Scientiarum Naturalium Universitatis Nankaiensis,2014,47(3):93-101.
[3]Brassil J T,Low S,Maxemchuk N F,et al.Electronic marking and identification techniques to discourage document copying[J].IEEE Journal on Selected Areas in Communications,2006,13(8):1495-1504.
[4]陈青,邢晓溪.格式化文本水印性能评估基准研究[J].计算机应用研究,2014,31(9):2764-2768.
Chen Qing,Xing Xiaoxi.Research on performance evaluation benchmark of formatted text watermarking[J].Application Research of Computers,2014,31(9):2764-2768.
[5]雷敏,杨榆,胡若翔.基于文字复杂度的抗打印扫描文本水印算法[J].北京邮电大学学报,2015,38(B06):58-62.
Lei Min,Yang Yu,Hu Ruoxiang.A print resilient watermark scheme based on character complexity[J].Journal of Beijing University of Posts and Telecommunications,2015,38(B06):58-62.
[6]Yang H,Kot A C.Pattern-based data hiding for binary image authentication by connectivity-reserving[J].IEEE Transactions on Multimedia,2007,9(3):475-486.
[7]Borges P,Mayer J.Text luminance modulation for hardcopy watermarking[J].Signal Processing,2007,87(7):1754-1771.
[8]Kaur M,Mahajan K.Performance evaluation of natural language text watermarking using encryption techniques[J].International Journal of Computer Applications,2015,129(3):22-28.
[9]林新建,唐向宏,王静,等.编码与同义词替换结合的可逆文本水印算法[J].中文信息学报,2015,29(4):151-158.
Lin Xinjian,Tang Xianghong,Wang Jing,et al.A reversible text watermarking algorithm based on coding and synonymy substitution[J].Journal of Chinese Information Processing,2015,29(4):151-158.
[10]Ahvanooey M T,Mazraeh H D,Tabasi S H.An innovative technique for web text watermarking(AITW)[EB/OL].http://dx.doi.org/10.1080/19393555.2016.1202356 2016-07-15/2016-11-12.
[11]Mir N.Copyright for web content using invisible text watermarking[J].Computers in Human Behavior,2014,30(30):648-653.
[12]Zhu P,Lu M.Improved web page watermarking[C]//International Conference on Management of E-Commerce and E-Government.Beijing,China:IEEE Computer Society,2012:98-102.
[13]Wolf J K,Chun D.The single burst error detection performance of binary cyclic codes[J].IEEE Transactions on Communications,1994,42(1):11-13.

相似文献/References:

[1].简讯[J].南京理工大学学报(自然科学版),1992,(06):112.

备注/Memo

备注/Memo:
收稿日期:2016-11-12 修回日期:2017-01-14基金项目:国家重点研发计划政府间国际科技创新合作重点专项(S2016G9070); 江苏省重大研发计划社会发展项目(BE2017739); 江苏省重大研发计划产业前瞻项目(BE2017100); 中央高校基本科研业务费专项资金(30916015104); 赛尔下一代互联网创新项目(NGII20160122); 中兴通讯产学研合作论坛合作项目(2016ZTE04-11)
作者简介:张震宇(1993-),男,硕士生,主要研究方向:信息安全,E-mail:zzy590@foxmail.com; 通讯作者:李千目(1979-),男,教授,博士生导师,主要研究方向:信息安全,E-mail:liqianmu@126.com。
引文格式:张震宇,李千目,戚.基于不可见字符的文本水印设计[J].南京理工大学学报,2017,41(4):405-411.
投稿网址:http://zrxuebao.njust.edu.cn
更新日期/Last Update: 2017-08-31