版权说明 操作指南
首页 > 成果 > 详情

An Improved Tamper Detection and Location Scheme for DOCX Format Documents

认领
导出
Link by DOI
反馈
分享
QQ微信 微博
成果类型:
期刊论文、会议论文
作者:
Xin, Guojiang*;Qi, Xitong;Ding, Changsong
通讯作者:
Xin, Guojiang
作者机构:
[Ding, Changsong; Xin, Guojiang] Hunan Univ Chinese Med, Sch Informat, Changsha 410208, Hunan, Peoples R China.
[Qi, Xitong] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China.
通讯机构:
[Xin, Guojiang] H
Hunan Univ Chinese Med, Sch Informat, Changsha 410208, Hunan, Peoples R China.
语种:
英文
关键词:
Text watermarking;Content authentication;Tamper located;DOCX document
期刊:
Lecture Notes in Computer Science
ISSN:
0302-9743
年:
2018
卷:
11066
页码:
242-251
会议名称:
4th International Conference on Cloud Computing and Security (ICCCS)
会议论文集名称:
Lecture Notes in Computer Science
会议时间:
JUN 08-10, 2018
会议地点:
Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Haikou, PEOPLES R CHINA
会议主办单位:
Nanjing Univ Informat Sci & Technol, Sch Comp & Software
会议赞助商:
Nanjing Univ Informat Sci & Technol, Springer, Hainan Univ, IEEE Nanjing Chapter, ACM China, Michigan State Univ, Taiwan Cheng Kung Univ, Taiwan Dong Hwa Univ, Providence Univ, Nanjing Univ Aeronaut & Astronaut, State Key Lab Integrated Serv Networks, Tech Sci Press, Natl Nat Sci Fdn China
主编:
Sun, X Pan, Z Bertino, E
出版地:
GEWERBESTRASSE 11, CHAM, CH-6330, SWITZERLAND
出版者:
SPRINGER INTERNATIONAL PUBLISHING AG
ISBN:
978-3-030-00015-8; 978-3-030-00014-1
基金类别:
Hunan Natural Science FoundationNatural Science Foundation of Hunan Province [2018JJ2301]; National Key Research and Development Program of China [2017YFC1703306]; Doctoral Research Start-up Fund of Hunan University of Chinese Medicine
机构署名:
本校为第一且通讯机构
摘要:
Content authentication of the text document has become a major concern in the current digital era. In this paper, a tamper locating algorithm for DOCX document content authentication is proposed. Firstly, according to the characteristics of DOCX format, the authentication information unrelated to the text content is embedded into the main setting file named document.xml by displaying characters segmentation. Then, identify the integrity of the text by confirming whether the embedded watermark is same to the authentication watermark. Experiments show that the algorithm is very fragile to any mo...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com