首页 > 最新文献

2008 International Symposium on Electronic Commerce and Security最新文献

英文 中文
Research and Design on Reputation Services (RS) System 信誉服务(RS)系统研究与设计
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.225
Shouqiang Liu, Deyu Qi, Jun Xiang, Baogang Chen
Reputation services are acting as a secure informative service which is responsible for maintaining a dynamic and adaptive trust and reputation metric for its community increasingly. Resources, including services providers and consumers, continuously interact with the reputation services to create a community rating mechanism that co-operatively assists their future decisions based on the overall community experiences. In the reputation services system, resources and services are ranked based on the reputation they obtain. This paper studies some necessary aspects of reputation and reputation services, such as their definition, framework and applications, after offeing some cases, RS system and its network are designed.
声誉服务作为一种安全的信息服务,越来越多地负责为其社区维护动态和自适应的信任和声誉度量。资源(包括服务提供者和消费者)不断地与声誉服务交互,以创建一个社区评级机制,该机制可以根据整体社区经验协同帮助他们未来的决策。在声誉服务系统中,资源和服务根据获得的声誉进行排名。本文对信誉和信誉服务的定义、框架和应用等方面进行了研究,并通过实例设计了信誉和信誉服务的RS系统及其网络。
{"title":"Research and Design on Reputation Services (RS) System","authors":"Shouqiang Liu, Deyu Qi, Jun Xiang, Baogang Chen","doi":"10.1109/ISECS.2008.225","DOIUrl":"https://doi.org/10.1109/ISECS.2008.225","url":null,"abstract":"Reputation services are acting as a secure informative service which is responsible for maintaining a dynamic and adaptive trust and reputation metric for its community increasingly. Resources, including services providers and consumers, continuously interact with the reputation services to create a community rating mechanism that co-operatively assists their future decisions based on the overall community experiences. In the reputation services system, resources and services are ranked based on the reputation they obtain. This paper studies some necessary aspects of reputation and reputation services, such as their definition, framework and applications, after offeing some cases, RS system and its network are designed.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122531775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Method for Wheel Rim Recognition 一种新的轮辋识别方法
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.160
Guan Xu, Jian Su, H. Pan, Donglin Zhang
The recognition of the wheel rim is a crucial area for vehicle safety. We present a novel recognition method for the detection of wheel rim whose projective curve is an ellipse. An image preprocessing method including the Otsu algorithm to binary the gray image, removing spurious areas and region filling algorithm is introduced to segment the rim area correctly. Then the ellipse rim region is considered as a 2D sheet and the centroid coordinate of the ellipse region is identified by the formula of calculating mass center. At last, all the five parameters to construct the ellipse of wheel rim are obtained according to the geometrical property that the optimum vertex on the semiaxis is the point on the edge of ellipse whose distance between the centroid and the point is maximum or minimum. The experimental results show that the proposed method recognizes the wheel rim efficiently and precisely.
轮辋的识别是关系到车辆安全的关键环节。提出了一种新的轮辋投影曲线为椭圆的识别方法。采用Otsu算法对灰度图像进行二值化处理、去除杂散区域和区域填充算法对边缘区域进行正确分割。然后将椭圆边缘区域视为二维薄片,利用质心计算公式确定椭圆区域的质心坐标。最后,根据半轴上最优顶点为椭圆边缘上质心距离最大或最小的点的几何性质,得到了构造轮辋椭圆的5个参数。实验结果表明,该方法能有效、准确地识别轮辋。
{"title":"A Novel Method for Wheel Rim Recognition","authors":"Guan Xu, Jian Su, H. Pan, Donglin Zhang","doi":"10.1109/ISECS.2008.160","DOIUrl":"https://doi.org/10.1109/ISECS.2008.160","url":null,"abstract":"The recognition of the wheel rim is a crucial area for vehicle safety. We present a novel recognition method for the detection of wheel rim whose projective curve is an ellipse. An image preprocessing method including the Otsu algorithm to binary the gray image, removing spurious areas and region filling algorithm is introduced to segment the rim area correctly. Then the ellipse rim region is considered as a 2D sheet and the centroid coordinate of the ellipse region is identified by the formula of calculating mass center. At last, all the five parameters to construct the ellipse of wheel rim are obtained according to the geometrical property that the optimum vertex on the semiaxis is the point on the edge of ellipse whose distance between the centroid and the point is maximum or minimum. The experimental results show that the proposed method recognizes the wheel rim efficiently and precisely.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133565333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Research on the Security of Information and Data in the Communication 通信中信息数据安全问题研究
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.185
Xiao Han
This article is related to security of information and data. Some computer and network users use ICT to abuse this technology and to get some sensitiveinformation of someone else. This is a big problem oftoday's information society and communication networks. This paper describes possibilities of sensitive data securing.
这篇文章是关于信息和数据的安全。一些计算机和网络用户利用信息通信技术滥用这项技术,获取他人的一些敏感信息。这是当今信息社会和通信网络的一个大问题。本文描述了敏感数据保护的可能性。
{"title":"Research on the Security of Information and Data in the Communication","authors":"Xiao Han","doi":"10.1109/ISECS.2008.185","DOIUrl":"https://doi.org/10.1109/ISECS.2008.185","url":null,"abstract":"This article is related to security of information and data. Some computer and network users use ICT to abuse this technology and to get some sensitiveinformation of someone else. This is a big problem oftoday's information society and communication networks. This paper describes possibilities of sensitive data securing.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121790893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unified Certificate Validation System DNS-OCSP 统一证书验证系统DNS-OCSP
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.53
Shigen Shen, Guangxue Yue
To solve the interoperable problem during current certificate validation process of different certificate authorities (CAs), the new system DNS-OCSP is proposed by incorporating DNS-style referral, which can construct a unified certificate validation mechanism between different CAs. The architecture of DNS-OCSP is presented, and the workflow of DNS-OCSP is illuminated. It has been shown that the DNS-OCSP is more accessible and scalable.
为了解决当前不同证书颁发机构之间证书验证过程中的互操作问题,提出了一种新的系统DNS-OCSP,该系统引入了dns样式的引用,可以在不同的证书颁发机构之间构建统一的证书验证机制。介绍了DNS-OCSP的体系结构,阐述了DNS-OCSP的工作流程。事实证明,DNS-OCSP具有更高的可访问性和可扩展性。
{"title":"Unified Certificate Validation System DNS-OCSP","authors":"Shigen Shen, Guangxue Yue","doi":"10.1109/ISECS.2008.53","DOIUrl":"https://doi.org/10.1109/ISECS.2008.53","url":null,"abstract":"To solve the interoperable problem during current certificate validation process of different certificate authorities (CAs), the new system DNS-OCSP is proposed by incorporating DNS-style referral, which can construct a unified certificate validation mechanism between different CAs. The architecture of DNS-OCSP is presented, and the workflow of DNS-OCSP is illuminated. It has been shown that the DNS-OCSP is more accessible and scalable.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133091035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Study on Electronic Commerce and Development of International Logistics 电子商务与国际物流发展研究
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.165
Zhongquan Zou
E-commerce is closely related to international logistics. International logistics in China developed rapidly, but many problems appeared. In the e-commerce environment, learn from the developed countries, advanced logistics experience, methods and policies may be used to promote the international logistics. International strategy may be implemented, including the implementation of core strategies and conditions strategies of international logistics enterprises. At the same time, a dynamic e-commerce based on the Web service and the strategy of the international logistics train qualified personnel is necessary.
电子商务与国际物流密切相关。中国的国际物流发展迅速,但也出现了许多问题。在电子商务环境下,借鉴发达国家先进的物流经验、方法和政策可以促进国际物流的发展。国际战略可以实施,包括实施国际物流企业的核心战略和条件战略。同时,基于Web服务的动态电子商务和国际物流战略培养合格的人才是必要的。
{"title":"The Study on Electronic Commerce and Development of International Logistics","authors":"Zhongquan Zou","doi":"10.1109/ISECS.2008.165","DOIUrl":"https://doi.org/10.1109/ISECS.2008.165","url":null,"abstract":"E-commerce is closely related to international logistics. International logistics in China developed rapidly, but many problems appeared. In the e-commerce environment, learn from the developed countries, advanced logistics experience, methods and policies may be used to promote the international logistics. International strategy may be implemented, including the implementation of core strategies and conditions strategies of international logistics enterprises. At the same time, a dynamic e-commerce based on the Web service and the strategy of the international logistics train qualified personnel is necessary.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133290681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on the Construction of Customer-centered Integrative Knowledge Push System 以客户为中心的集成知识推送系统构建研究
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.45
Yong Feng, Hongyan Xu, Song-yu Yan
With the transformation of service mode in enterprise from production-centered to customer-centered, improving the knowledge service level of customer service center to better meet customer's knowledge requirement becomes the key for the success of enterprise. In this paper, the construction of the knowledge push system served for customer service center was described. By the knowledge push system, various kinds of Enterprise application could be integrated and the knowledge service capability of customer service center could be promoted. Firstly, the concept of knowledge push was introduced and the customer-centered knowledge push requirement was analyzed. Then, the construction method of customer-centered integrative knowledge push system was proposed, which included the frame, the running flow and the key implementation technologies of knowledge push system. Finally, an instance analysis was given to illuminate that the customer-centered integrative knowledge push system could effectively improve the work efficiency of customer service center and customer satisfaction.
随着企业服务模式从以生产为中心向以客户为中心的转变,提高客户服务中心的知识服务水平,更好地满足客户的知识需求成为企业成败的关键。本文介绍了为客户服务中心服务的知识推送系统的构建。通过知识推送系统,可以集成各种企业应用,提升客服中心的知识服务能力。首先,介绍了知识推送的概念,分析了以客户为中心的知识推送需求。然后,提出了以客户为中心的集成知识推送系统的构建方法,包括知识推送系统的框架、运行流程和关键实现技术。最后通过实例分析说明,以客户为中心的集成知识推送系统能够有效地提高客户服务中心的工作效率和客户满意度。
{"title":"Research on the Construction of Customer-centered Integrative Knowledge Push System","authors":"Yong Feng, Hongyan Xu, Song-yu Yan","doi":"10.1109/ISECS.2008.45","DOIUrl":"https://doi.org/10.1109/ISECS.2008.45","url":null,"abstract":"With the transformation of service mode in enterprise from production-centered to customer-centered, improving the knowledge service level of customer service center to better meet customer's knowledge requirement becomes the key for the success of enterprise. In this paper, the construction of the knowledge push system served for customer service center was described. By the knowledge push system, various kinds of Enterprise application could be integrated and the knowledge service capability of customer service center could be promoted. Firstly, the concept of knowledge push was introduced and the customer-centered knowledge push requirement was analyzed. Then, the construction method of customer-centered integrative knowledge push system was proposed, which included the frame, the running flow and the key implementation technologies of knowledge push system. Finally, an instance analysis was given to illuminate that the customer-centered integrative knowledge push system could effectively improve the work efficiency of customer service center and customer satisfaction.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134609001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modification and Improvement on Group Signature Scheme without Random Oracles 无随机oracle的群签名方案的改进与改进
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.154
Wang Shaohui
Group signature can provide anonymity for signers, and in CIS'2007, Wang et.al. presented an efficient group signature schemes secure in the standard model by combining the HSDH variant signature scheme of Okamoto scheme and NIZK proof techniques used by Boyen and Waters. In this paper, we point out that the scheme in CIS'07 is not unforgeable because of the wrong construction of the HSDH variant signature scheme. We correct the mistake and give the corresponding group signature scheme without random oracle using the same method in CIS'07, and the efficiency is decreased a little. In addition, we improve the new scheme to present a new group signature scheme in the standard model, and the new scheme has a relatively shorter public key, secret key length, and needs less computation.
群签名可以为签名者提供匿名性,在CIS’2007中,Wang等。将Okamoto方案的HSDH变体签名方案与Boyen和Waters的NIZK证明技术相结合,提出了一种在标准模型下安全的高效群签名方案。本文指出,由于HSDH变体签名方案的构造错误,CIS'07中的方案不是不可伪造的。我们在CIS'07中使用相同的方法修正了这个错误,并给出了相应的不带随机oracle的群签名方案,效率有所降低。此外,我们对新方案进行了改进,在标准模型下提出了一个新的群签名方案,新方案具有相对较短的公钥、秘钥长度,并且需要较少的计算量。
{"title":"Modification and Improvement on Group Signature Scheme without Random Oracles","authors":"Wang Shaohui","doi":"10.1109/ISECS.2008.154","DOIUrl":"https://doi.org/10.1109/ISECS.2008.154","url":null,"abstract":"Group signature can provide anonymity for signers, and in CIS'2007, Wang et.al. presented an efficient group signature schemes secure in the standard model by combining the HSDH variant signature scheme of Okamoto scheme and NIZK proof techniques used by Boyen and Waters. In this paper, we point out that the scheme in CIS'07 is not unforgeable because of the wrong construction of the HSDH variant signature scheme. We correct the mistake and give the corresponding group signature scheme without random oracle using the same method in CIS'07, and the efficiency is decreased a little. In addition, we improve the new scheme to present a new group signature scheme in the standard model, and the new scheme has a relatively shorter public key, secret key length, and needs less computation.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114421974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Process-Oriented Software Architecture for Supporting Business Process Change 支持业务流程变更的面向业务流程的软件体系结构
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.46
Qing Yao, Jing Zhang, Haiyang Wang
As a business process is essential in running an enterprise, this paper aims toward improving software architecture by extracting business-relevant semantics from business logic and transforming them as important elements that need to be molded and represented in software architecture. This allows for the development of a business process-oriented software architecture (BPOSA) that can support smoother business process change. The paper introduces the structure of BPOSA and its work mode. Then it describes the steps involved in designing a process-oriented software system, and provides analysis and design methods of extending process-relevant attributes for application in business operations.
由于业务流程在企业运行中是必不可少的,因此本文旨在通过从业务逻辑中提取与业务相关的语义,并将其转换为需要在软件体系结构中建模和表示的重要元素,从而改进软件体系结构。这允许开发面向业务流程的软件体系结构(BPOSA),以支持更流畅的业务流程更改。介绍了BPOSA的结构和工作模式。然后描述了设计面向过程的软件系统所涉及的步骤,并提供了在业务操作中扩展与过程相关的属性的分析和设计方法。
{"title":"Business Process-Oriented Software Architecture for Supporting Business Process Change","authors":"Qing Yao, Jing Zhang, Haiyang Wang","doi":"10.1109/ISECS.2008.46","DOIUrl":"https://doi.org/10.1109/ISECS.2008.46","url":null,"abstract":"As a business process is essential in running an enterprise, this paper aims toward improving software architecture by extracting business-relevant semantics from business logic and transforming them as important elements that need to be molded and represented in software architecture. This allows for the development of a business process-oriented software architecture (BPOSA) that can support smoother business process change. The paper introduces the structure of BPOSA and its work mode. Then it describes the steps involved in designing a process-oriented software system, and provides analysis and design methods of extending process-relevant attributes for application in business operations.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115808815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Selecting Supplier of Cluster Supply Chain Based on Fuzzy Measurement 基于模糊度量的集群供应链供应商选择
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.162
Jizi Li, Baishu Li, Zhiping Li
Uncertainty in operation process of cluster supply chain raises the issue of flexibility, where the supply lead-time and demand quantity are the two most common changes occurring in cluster supply chain. Focusing on the flexibility of cluster supply chain, the fuzzy set theory was applied to give the representation for the variables, and model the cluster supply chain flexibility. Besides it, a supplier selection method was developed. Finally, an illustrative example was given for demonstration.
集群式供应链运行过程中的不确定性提出了灵活性问题,其中供应前置时间和需求数量是集群式供应链中最常见的两个变化。针对集群式供应链的柔性问题,应用模糊集理论对变量进行表示,建立了集群式供应链柔性模型。在此基础上,提出了一种供应商选择方法。最后给出了一个实例进行说明。
{"title":"Selecting Supplier of Cluster Supply Chain Based on Fuzzy Measurement","authors":"Jizi Li, Baishu Li, Zhiping Li","doi":"10.1109/ISECS.2008.162","DOIUrl":"https://doi.org/10.1109/ISECS.2008.162","url":null,"abstract":"Uncertainty in operation process of cluster supply chain raises the issue of flexibility, where the supply lead-time and demand quantity are the two most common changes occurring in cluster supply chain. Focusing on the flexibility of cluster supply chain, the fuzzy set theory was applied to give the representation for the variables, and model the cluster supply chain flexibility. Besides it, a supplier selection method was developed. Finally, an illustrative example was given for demonstration.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132628623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Effective Fragile Document Watermarking Technique 一种有效的易碎文件水印技术
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.91
Jiaxin Yu, Xinsheng Wang, Jianfei Li, Xu Nan
Some work is done to improve embedding capacity and locate tampered regions base on the prior research of fragile document watermark in this paper. And an effective fragile document watermarking algorithm is proposed. The wet paper code which adjusts the number of embedding watermark bits dynamically and takes full advantage of turnover pixels is used for embed watermark to improve embedding capacity. To locate tampered regions, the image is cut into blocks according to the content of it and every image block includes only one character or Chinese word. The Gray-code which was used for coding the watermark reduced the decoding errors caused by noise and improved the robustness of the watermark. The experiment shows that this algorithm can detect the location of tampered image and get better embedding capacity that is near the number of changeable pixels, which are demands of actual application.
本文在对脆弱文件水印研究的基础上,对提高嵌入能力和定位篡改区域做了一些工作。提出了一种有效的脆弱文件水印算法。采用湿纸码动态调整嵌入水印比特数,充分利用周转像素的优势,提高水印嵌入容量。为了定位被篡改的区域,根据图像的内容将图像切割成块,每个图像块只包含一个字符或中文单词。采用灰度码对水印进行编码,减少了由噪声引起的解码误差,提高了水印的鲁棒性。实验表明,该算法可以检测到篡改图像的位置,并得到较好的嵌入容量,嵌入容量接近可变像素数,满足了实际应用的要求。
{"title":"An Effective Fragile Document Watermarking Technique","authors":"Jiaxin Yu, Xinsheng Wang, Jianfei Li, Xu Nan","doi":"10.1109/ISECS.2008.91","DOIUrl":"https://doi.org/10.1109/ISECS.2008.91","url":null,"abstract":"Some work is done to improve embedding capacity and locate tampered regions base on the prior research of fragile document watermark in this paper. And an effective fragile document watermarking algorithm is proposed. The wet paper code which adjusts the number of embedding watermark bits dynamically and takes full advantage of turnover pixels is used for embed watermark to improve embedding capacity. To locate tampered regions, the image is cut into blocks according to the content of it and every image block includes only one character or Chinese word. The Gray-code which was used for coding the watermark reduced the decoding errors caused by noise and improved the robustness of the watermark. The experiment shows that this algorithm can detect the location of tampered image and get better embedding capacity that is near the number of changeable pixels, which are demands of actual application.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122448501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2008 International Symposium on Electronic Commerce and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1