期刊文献+

一个自然语言水印嵌入安全性评估方案

An Evaluating Scheme for Embedding Security of Natural Language Watermarking
下载PDF
导出
摘要 随着互联网的发展,获得未授权的数字媒体变得比以往容易。自然语言水印是一种为自然语言文档特别设计的数字版权管理技术。它将水印嵌入到文档中,但不改变文档的含义。虽然已经有不少精心设计的自然语言水印算法,但是对它们的嵌入质量和安全性只有简单的说明。本文中,我们提出了一个自然语言水印嵌入安全性的评估方案,定义了理想不可检测性,并提出了构造针对特定检测器的不可检测性的交互证明系统。本文也对一些实际系统按此方案作了评价。 With the development of Internet, it is easier to get unauthorized digital media than ever before. Natural language watermarking (NLW) is a kind of digital rights management (DRM) techniques specially designed for natural language documents. NLW embeds watermark into documents in linguistic meaning - preserving ways. The previous research on designing elaborate watermarking algorithms, security or quality of these schemes is briefly discussed. In this paper, we propose an evaluating scheme for embed- ding security of NLW, define ideal undetectability, and design ways to construct an inter - proof system for undetectability against specific detector. We also apply this evaluating scheme to some practical NLW systems.
出处 《北京电子科技学院学报》 2009年第2期54-59,共6页 Journal of Beijing Electronic Science And Technology Institute
关键词 自然语言水印 计算模型 计算不可区分 不可检测性 交互证明系统 natural language watermarking computational model computational indistinguishability undeteetability inter - proof system
  • 相关文献

参考文献10

  • 1U.Topkara,,M.Topkara,,M.Atallah."The hiding virtues of ambiguity:quantifiably resilient water-marking of natural language text through synonym substitutions,"[].Proceedings of theth workshop on Multimedia and security.2006
  • 2M.Atallah,,V.Raskin,,M.Crogan,et al."Natural Language Watermarking:Design,Analysis,and a Proof-of-Concept Implementation,"[].Information Hidingth InternationalWorkshopIHW.2001
  • 3The tyrannousaurus lex system. http://alumni.imsa.edu/keithw/tlex/ .
  • 4Y.Chiang,,L.Chang,,W.Hsieh et al."Natural language watermarking using semantic substitution for chinese text,"[].Digital Watermarking:Second International WorkshopIWDW.2003
  • 5O.Goldreich.Foundations of Cryptography:Basic Tools[]..2000
  • 6Hartung,F,Ramme,F.Digital rights management and watermarking of multimedia content for M-commerce applications[].IEEE Communications Magazine.2000
  • 7Moulin P,Sullivan J.Information-Theoretic Analysis of Information Hiding[ J][].IEEE Transactions on Information Theory.2003
  • 8Gupta Gaurav,Pieprzyk Josef,Wang Huaxiong.An attack-localizing watermarking scheme for natural language documents[].Proceedings oftheACM Symposium on InformationComputer and Communications SecurityASIACCS.2006
  • 9Taskiran C M,Topkara U,Topkara M,et al.Attacks on lexical natural language steganography systems[].SPIE Interna-tional Conference on SecuritySteganographyand Watermarking ofMultimedia Contents.2006
  • 10C.Zhi-li,,H.Liu-sheng,,Y.Zhen-shan,et al."A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words,"[].AvailabilityReliability and SecurityARESThird International Conference on.2008

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部