Redirigiendo al acceso original de articulo en 18 segundos...
Inicio  /  Future Internet  /  Vol: 15 Par: 9 (2023)  /  Artículo
ARTÍCULO
TITULO

E-SAWM: A Semantic Analysis-Based ODF Watermarking Algorithm for Edge Cloud Scenarios

Lijun Zu    
Hongyi Li    
Liang Zhang    
Zhihui Lu    
Jiawei Ye    
Xiaoxia Zhao and Shijing Hu    

Resumen

With the growing demand for data sharing file formats in financial applications driven by open banking, the use of the OFD (open fixed-layout document) format has become widespread. However, ensuring data security, traceability, and accountability poses significant challenges. To address these concerns, we propose E-SAWM, a dynamic watermarking service framework designed for edge cloud scenarios. This framework incorporates dynamic watermark information at the edge, allowing for precise tracking of data leakage throughout the data-sharing process. By utilizing semantic analysis, E-SAWM generates highly realistic pseudostatements that exploit the structural characteristics of documents within OFD files. These pseudostatements are strategically distributed to embed redundant bits into the structural documents, ensuring that the watermark remains resistant to removal or complete destruction. Experimental results demonstrate that our algorithm has a minimal impact on the original file size, with the watermarked text occupying less than 15%, indicating a high capacity for carrying the watermark. Additionally, compared to existing explicit watermarking schemes for OFD files based on annotation structure, our proposed watermarking scheme is suitable for the technical requirements of complex dynamic watermarking in edge cloud scenario deployment. It effectively overcomes vulnerabilities associated with easy deletion and tampering, providing high concealment and robustness.

 Artículos similares

       
 
Chengyi Qu, Xu Xi, Jinglong Du and Tong Wu    
Traditional frequency-domain watermarking algorithms for vector geographic data suffer from disadvantages such as the random watermark embedding position, unpredictable embedding strength, and difficulty in resisting multiple attacks at the same time. To... ver más

 
Fahmi Amhar, Endang Purnama Giri, Florence Elfriede Sinthauli Silalahi, Shelvie Nidya Neyman, Anggrahito, Dadan Ramdani, Danang Jaya, Dewayany Sutrisno, Sandi Adhitya Kolopaking, Tia Rizka Nuzula Rachma and Murdaningsih    
This research aims to protect Digital Elevation Model (DEM) data from piracy or counterfeiting. An invisible watermark inserted into the data, which will not considerably change the data value, is necessary. The proposed method involves the use of the tw... ver más

 
Qifei Zhou, Changqing Zhu and Na Ren    
How to keep the fidelity of the digital elevation model (DEM) data is a crucial problem in the current watermarking research, as the watermarked DEM data need to preserve their accuracy. We proposed a zero watermarking method for the triangulated irregul... ver más

 
Yu Li, Liming Zhang, Xiaolong Wang, Xingang Zhang and Qihang Zhang    
Commutative encryption and watermarking (CEW) is an emerging method that combines encryption technology with digital watermarking technology. It has the dual capability of secure transmission and copyright protection. However, the existing CEW methods fo... ver más

 
Qifei Zhou, Na Ren, Changqing Zhu and A-Xing Zhu    
Projection transformation is an important part of geographic analysis in geographic information systems, which are particularly common for vector geographic data. However, achieving resistance to projection transformation attacks on watermarking for vect... ver más