期刊文献+

利用范本构建语法模板生成仿自然语言隐写文本 被引量:1

CFG-Based Stego-Text Generation Using Template Text and Grammar File
下载PDF
导出
摘要 基于模仿函数的Mimicry文本隐写法利用上下文无关文法(CFG)构造树形结构,生成的含密仿自然文本在语义连贯性方面存在缺陷。该文提出一种改进的Mimicry文本隐写方法,从选择范本和设计语法模板两方面提高语义的连贯性和一致性。经过范本训练,在模板设计中运用置换文本库,考虑文本中各词汇、短语和句子的可置换性。模板还运用Huffman编码,充分考虑语句和词组的出现频度,以改善含密文本的自然度。这样生成的含密文本语义连贯性好,符合自然语言在字符、词汇、句法等方面的统计特性,有利于对抗人工和机器检测。 A previous text steganography scheme uses the mimic function and the Context-Free Grammar (CFG) to generate pseudo-natural language text to convey secret information. However, the generated text usually lacks semantic consistency and is therefore Vulnerable to human evaluation. An improved mimicry technique is proposed that constructs the CFG-based grammar file from a template text that meets certain criteria so that the generated text is semantically consistent. The grammar file is constructed from a replacement text base composed of many optional words, phrases or sentences. Huffman coding is used to take into account the occurrence frequencies of various words, expressions, and syntactic structures to improve naturalness of the generated text. Thus, in addition to machine examination, the obtained stego-text is able to pass stringent human evaluation.
出处 《电子与信息学报》 EI CSCD 北大核心 2008年第8期1936-1939,共4页 Journal of Electronics & Information Technology
基金 上海市重点学科建设项目(T0102)资助课题
关键词 文本隐写 模仿函数 上下文无关文法 语义连贯性 Text steganography Mimic function Context Free Grammar (CFG) Semantic consistency
  • 相关文献

参考文献13

  • 1Bender W, et al.. Techniques for data hiding. IBM Systems Journal, 1996, 35(3,4): 313-336.
  • 2Brassil J T, Low S, and Maxemchuk N F. Copyright protection for the electronic distribution of text documents. Proce, IEEE, 1999, 87(7): 1181-1196.
  • 3Takizawa O, et al.. Method of hiding information in agglutinative language documents using adjustment to new line positions. LNCS/LNAI, 2005, 3683: 1039-1048.
  • 4肖湘蓉,孙星明.基于内容的英文文本数字水印算法设计与实现[J].计算机工程,2005,31(22):29-31. 被引量:6
  • 5Atallah M, et al.. Natural language watermarking and tamperproofing, fifth information hiding workshop, IHW'02, Noordwijkerhout, The Netherlands, LNCS, 2002, 2578: 7-9.
  • 6Topkara M, et al.. Natural language watermarking. Proceedings of the SPIE, International Conference on Security, Steganography, and Watermarking of Multimedia Contents Ⅵ, San Jose, CA, USA, January, 2005: 17-21.
  • 7Grothoff C, et al.. Translation-based steganography. Proceedings of Information Hiding Workshop (IH2005), Barcelona, Spain, 2005: 213-233.
  • 8Stutsman R, et al.. Lost in just the translation. The 21st Annual ACM Symposium on Applied Computing, Dijon, France, April, 2006: 23-27.
  • 9Wayner P. Mimic functions. Cryptolgia, 1992,16(3):193-214.
  • 10Bennett K. Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text, CERIAS Tech Report, 2004-13.

二级参考文献12

  • 1Brassil J, Low S H, Maxemchuk N F. Electronic Marking and Identification Techniques to Discourage Document Copying. IEEE Journal on Selected Areas in Communications, 1995,13(8): 1495-1504.
  • 2Brassil J, Low S H, Maxemchuk N F. Copyright Protection for the Electronic Distribution of Text Documents. Proceedings of the IEEE,1999, 87(7).
  • 3Cox I J,Miller M L,McKcllips A L. Watermarking as Communications with Side Information. Proceedings of the IEEE, 1999, 87(7): 1127-1141.
  • 4Cox I J, Miller M L, Mckellips A L. Digital Watermarking of Text,Image, and Video Documents. Compute. & Graphics, 1998,22(6):687-695.
  • 5Maxemchuk N F, Low S. Marking Text Documents. In:International Conference on Image Processing, Santa Barbara,Calif, 1998:687-695.
  • 6Brassil J, O'Gorman L. Watermarking Document Images with Bounding Box Expansion. Information Hiding of Lecture Notes in Computer Science, Springer-Verlag, 1996,1174:227-235.
  • 7Maxemchuk N F. Electronic Document Distribution.AT & T Technical Journal, 1994, 73 (5): 73-80.
  • 8Low S H, Maxemchuk N F, Lapone M A. Document Identification for Copyright Protection Using Centroid Detection. IEEE Trans. Communications, 1998,46(3): 372-383.
  • 9Qruanaidb J J, Dowling W J, Boland F M. Watermarking Digital Images for Copyright Protection [J]. Signal and Image Processing,1996,143(4): 250-256.
  • 10张得民.数据通信[M].北京7科学教书文献出版社,1997-08..

共引文献5

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部