A Web Page Watermarking Method Using Hybrid Watermark Hiding Strategy

  • Chun-Hsiu Yeh
  • Jing-Xun Lai
  • Yung-Chen ChouEmail author
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 81)


On the Internet, various communication channels are readily available for companies, communities, and individuals. As companies have increasingly made use of social websites and instant messaging technologies for marketing and public relations, additional effort has been put in place to create interactive web contents to attract online audience. It is easy for anyone to simply copy and modify existing web contents for their own use. A common approach to protecting the copyright of a companys web content is digital watermarking with copyright information. The watermarking technique is a good way to achieve the goal of copyright protection. This paper presents a web page copyright protection method by integrating Cartesian product combination, CSS and HTML tag capitalization method, HTML attribute combination method, HTML attribute quotation mark method, and CSS attribute value embedding method. The experimental results demonstrate that the proposed method success achieved the goal of copyright protection for web pages.


HTML CSS Data hiding Digital watermarking 


  1. 1.
    Chou, Y.-C., Huang, C.-Y., Liao, H.-C.: A reversible data hiding scheme using Cartesian product for html file. In: 2012 Sixth International Conference on Genetic and Evolutionary Computing (ICGEC), pp. 153–156. IEEE (2012)Google Scholar
  2. 2.
    Chou, Yung-Chen, Lin, Iuon-Chang, Hsu, Ping-Kun: A watermarking for html files based on multi-channel system. Int. J. Secur. Appl. 7(3), 163–174 (2013)Google Scholar
  3. 3.
    Dey, S., Al-Qaheri, H., Sanyal, S.: Embedding secret data in html web page. arXiv preprint arXiv:1004.0459, pp. 474–481 (2009)
  4. 4.
    Huang, H., Sun, X., Li, Z., Sun, G.: Detection of hidden information in webpage. In: 2007 Fourth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2007, vol. 4, pp. 317–321. IEEE (2007)Google Scholar
  5. 5.
    Huang, H., Zhong, S., Sun, X.: An algorithm of webpage information hiding based on attributes permutation. In: 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2008, pp. 257–260. IEEE (2008)Google Scholar
  6. 6.
    Lai, J.-X., Chou, Y.-C., Tseng, C.-C., Liao, H.-C.: A large payload webpage data embedding method using CSS attributes modification. In: Advances in Intelligent Information Hiding and Multimedia Signal Processing: Proceeding of the Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, 21–23 November 2016, vol. 1, pp. 91–98. Springer (2017)Google Scholar
  7. 7.
    Lee, I.-S., Tsai, W.-H.: Secret communication through web pages using special space codes in html files. Int. J. Appl. Sci. Eng. 6(2), 141–149 (2008)MathSciNetGoogle Scholar
  8. 8.
    Lee, I.-S., Tsai, W.-H., et al.: Security protection of software programs by information sharing and authentication techniques using invisible ASCII control code. IJ Netw. Secur. 10(1), 1–10 (2010)Google Scholar
  9. 9.
    Sui, X.-G., Luo, H.: A new steganography method based on hypertext. In: 2004 Proceedings of the Asia-Pacific Radio Science Conference, pp. 181–184. IEEE (2004)Google Scholar
  10. 10.
    Tarillo, J.F., Mavrogiannakis, N., Lisboa, C.A., Argyrides, C., Carro, L.: Multiple bit error detection and correction in memory. In: 2010 Proceedings of the 13th Euromicro Conference on Digital System Design: Architectures, Methods and Tools (DSD), pp. 652–657. IEEE (2010)Google Scholar
  11. 11.
    Yang, Y., Yang, Y.: An efficient webpage information hiding method based on tag attributes. In: 2010 Seventh International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), vol. 3, pp. 1181–1184. IEEE (2010)Google Scholar
  12. 12.
    Zhang, X., Wang, S.: Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Process. Lett. 12(1), 67–70 (2005)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Department of Management Information SystemsChung Chou University of Science and TechnologyChanghuaTaiwan R.O.C.
  2. 2.Department of Computer Sciences and Information EngineeringAsia UniversityTaichungR.O.C.

Personalised recommendations