Webpage watermark generation and authentication method capable of positioning and tampering positions on a browser

An authentication method and browser technology, applied in the fields of instruments, image data processing, special data processing applications, etc., can solve the problems of unable to locate the tampered position of the web page, loss, reducing the efficiency of website information transmission and real-time interactivity, etc.

Inactive Publication Date: 2014-08-13
SOUTHWEST JIAOTONG UNIV
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above two algorithms can only detect whether the webpage has been tampered with, but cannot locate the tampered position of the webpage
In order to locate where the webpage has been tampered with, Zhang et al. proposed a webpage watermarking algorithm based on the HASH function (Zulin Zhang, Hong Peng, XianzhongLong. A Fragile Watermarking Scheme Based On Hash Function for Web Pages[C], 2011 International Conference on Network Computing and Information Security (NCIS), Guilin, China, 2011: 417-420.), this algorithm encrypts each line of original code characters and each word displayed on the browser through HASH encryption to generate 6-bit watermark information, using tag case The method combined with invisible characters embeds the watermark, so the algorithm can detect and locate the tampered characters in the source code of the webpage, but the algorithm cannot locate and mark the tampered position on the browser
[0004] Another issue that needs to be considered in the practical application of web page fragile watermarking technology is: when the web page watermark algorithm detects that the web page has been tampere...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Webpage watermark generation and authentication method capable of positioning and tampering positions on a browser
  • Webpage watermark generation and authentication method capable of positioning and tampering positions on a browser
  • Webpage watermark generation and authentication method capable of positioning and tampering positions on a browser

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0061] A specific embodiment of the present invention is a webpage watermark generation and authentication method capable of locating tampered positions on a browser, comprising the following steps:

[0062] A. Web page segmentation

[0063] The original webpage source file F, F={f r |r=1, 2, ..., N}, divide the original web page source file F into M text blocks F connected end to end according to the character blocks displayed by the browser i , that is, F={F i |i=1,2,...,M}; F i ={f r | r = d i +1, d i +2,...,d i +s i}, where f r Indicates the rth character in the original web page source file F, N is the number of characters contained in the original web page source file F, F i Indicates the i-th text block, M is the number of text blocks contained in the original webpage source file F, s i for text block F i the number of characters contained, d i for text block F i The position of the prefix of the first character, ie d i = d i-1 +s i-1 ;

[0064] B. Wate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a webpage watermark generation and authentication method capable of positioning and tampering positions on a browser. The method includes: partitioning webpage source codes combining character blocks displayed by the browser to enable sub-blocks to contain browser display characters; then extracting a non-label portion and an attribute value portion in a label of each sub-block to generate 12-bit watermark information, randomly embedding the watermark information into another sub-block by a color attribute method; comparing the consistency of an extracted watermark and a reconstructed watermark of each sub-block during detection so as to judge whether the sub-block is tampered or not; and finally detecting the label of the tempered sub-block, substituting the marking attribute for all attributes of the tempered sub-block, and substituting prompt information for the display characters in the sub-block on the browser. By the method, when partial content in a webpage is tempered, no-break of Web service can be maintained, information not tempered can be used continuously, error information can be prevented from spreading timely, and negative effect and loss of reputation and business of enterprises and public institutions due to webpage tempering are reduced.

Description

technical field [0001] The invention relates to a method for generating and authenticating a webpage watermark capable of locating a tampered position on a browser. Background technique [0002] With the rapid development of network and multimedia technology, information hiding technology has become an important part of information security. At present, there are many research results on information hiding of digital media such as image, audio, video, etc., but there are relatively few researches on information hiding technology of web pages. According to the statistics of the National Internet Emergency Response Center (CNCERT), in December 2011, the number of tampered websites in mainland China was 2,016, of which 163 were tampered with government websites. Frequent incidents of tampering with government and enterprise websites have seriously affected the image of the government and the normal business progress of enterprises and institutions. As a method to effectively ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00G06F17/30
Inventor 陈帆张玉梅和红杰翟东海
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products