期刊文献+

基于移位变换的句子层自然语言信息隐藏算法 被引量:2

Algorithm of natural language information hiding based on shift conversion in sentence level
原文传递
导出
摘要 针对现有的句子层自然语言信息隐藏方法存在的问题,提出一种基于句子层移位变换规则的中文自然语言信息隐藏算法.首先利用汉字数学表达式对中文文本信号数字化;然后通过句子的移位变换改变句子词序以嵌入秘密信息.实验结果和分析表明,该算法实现简单、编码容量较大,同时秘密信息隐藏在自然语言文本句子层词序变换中,不改变文本语法、语义和风格,具有较好的隐蔽性. An algorithm based on shift conversion is proposed combining with the characteristic of Chinese grammar. A method based on chinese mathematical expression is presented by converting Chinese text into bit string. Then, shift conversion rules are selected by utilizing transform grammar based on case grammar that Chinese philologist proposed. The secret information is embedded by modifying the order of words in the sentence according to the shift conversion rules. The experimental results show that the method can achieve a degree of information-carrying capacity and a better result with the imperceptibility.
出处 《控制与决策》 EI CSCD 北大核心 2009年第12期1861-1864,共4页 Control and Decision
基金 国家973计划项目(2006CB303000) 国家自然科学基金重点项目(60736016) 国家自然科学基金面上项目(60873198) 湖南省科技计划项目(2008FJ4221)
关键词 信息隐藏 自然语言 移位变换 文本数字化 Information hiding Natural language Shift conversion Text digitalization
  • 相关文献

参考文献8

  • 1Topkara M, Topkara U, Atallah M J. Words are not enough: Sentence level natural language watermarking [C]. Proc of ACM Workshop on Content Protection and Security. Santa Barbara: ACM Press, 2006: 37-46.
  • 2Murphy B, Vogel C. The syntax of concealment:Reliable methods for plain text information hiding[C]. Proc of the SHE Int Conf on Security, Steganography, and Watermarking of Multimedia Contents. San Jose: ACM Press, 2007:351-362.
  • 3Murphy B, Vogel C. Statistically constrained shallow text marking: Techniques, evaluation paradigm, and results[C]. Proc of the SHE Int Conf on Security, Steganography, and Watermarking of Multimedia Contents. San Jose: ACM Press, 2007: 363-371.
  • 4Meral H M, Sankur B, Ozsoy S. Syntactic tools for natural language watermarking[C]. Proc of the SPIE Int Conf on Security, Steganography, and Watermarking of Multimedia Contents. San Jose: ACM Press, 2007: 339-350.
  • 5Atallah M J, Raskin V, Crogan M, et al. Natural language watermarking: Design, analysis, and proof-of-concept implementation [C]. Proc of the 4th Int Inf Hiding Workshop. Berlin Heidelberg: Springer Verlag, 2001: 185-199.
  • 6Gupta G, Pieprzyk J, Wang H X. An attack-localizing watermarking scheme for natural language documents [C]. Proc of ASIACCS'06. Taipei: ACM Press, 2006: 157-165.
  • 7Topkara M, Riccardi G, Hakkani-Tur D, et al. Natural language watermarking.. Challenges in building a practical system[C]. Proc of the SPIE Int Conf on Security, Steganography, and Watermarking of Multimedia Contents. San Jose: ACM Press, 2006: 106-177.
  • 8孙星明,殷建平,陈火旺,吴泉源,景新海.汉字的数学表达式研究[J].计算机研究与发展,2002,39(6):707-711. 被引量:29

二级参考文献3

共引文献28

同被引文献22

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部