期刊文献+

基于特征词和句子变序的双密钥文本水印方案

Dual-key Text Watermarking Scheme Based on the Feature Vocabulary and Permuting Sentence
下载PDF
导出
摘要 在分析现有文本水印方法的基础上,提出一种新方案.该方案中文档看成是句子的集合.利用密钥K1,K2和特征函数返回值选择特征词汇子集和可变序的句子子集合,改变该子集合中的句子顺序来嵌入水印信息.为提高方案对水印攻击的抵御性,在多个句子中嵌入相同的水印信息.阐述了该方案的模型和句子变序算法,通过对主要句子层次上的攻击方法的分析,给出了本方案的优势. On the basis of analyzing the proposed text watermarking method,this paper presents a new scheme.The document is viewed as a set of sentences in the scheme.Using the secret key of K1 and K2 and the return value of feature function,the feature vocabulary subset and sequence variable sentences subset are selected.The watermarking is embedded by permuting the sentences in the subset.To enhance the scheme capability of resisting the attack,the same watermarking is embedded in multi sentences.The paper expounds the scheme model and the algorithm of the permuting sentences.By analyzing the primary sentence level attack,it proposes the advantages of the scheme.
出处 《石家庄学院学报》 2011年第3期56-59,共4页 Journal of Shijiazhuang University
关键词 双密钥 文本水印 特征词 句子变序 特征函数 dual-key text watermarking feature vocabulary permuting sentence feature function
  • 相关文献

参考文献6

  • 1CHOTIKAKAMTHORN N.Electronic Document Data Hiding Technique Using Inter-character space[G].Thailang:Chiangmai -Verlag,1998,(24):419-422.
  • 2CHOTIKAKAMTHORN N.Document Image Data Hiding Technique Using character Spacing Width Sequence Coding[G].Japan Kobe:Internationgal Conference on Image Processing,1999:250-254.
  • 3KANKANHALLI M S,HAU K F.Watermarking of Electronic Text Documents[J].Electronic Commerce Research,2002,2 (1):169-187.
  • 4舒后,何薇,齐亚莉.文本数字水印技术研究[J].北京印刷学院学报,2006,14(1):24-28. 被引量:4
  • 5张宇,刘挺,陈毅恒,赵世奇,李生.自然语言文本水印[J].中文信息学报,2005,19(1):56-62. 被引量:51
  • 6ATALLAH M,RASKIN V,CROGAN M,et al.Natural Labguage Watermarking:Design,Analysis,and a Proff-of-concept Implementation[G].Heidelberg:Springer-Verlag,2001:185-199.

二级参考文献13

  • 1赵东宁,张勇,李德毅.基于云模型的文本数字水印技术[J].计算机应用,2003,23(z2):100-102. 被引量:19
  • 2张宇,刘挺,陈毅恒,赵世奇,李生.自然语言文本水印[J].中文信息学报,2005,19(1):56-62. 被引量:51
  • 3弋英民,郑岗.一种利用字符特征变化的文本数字水印方法[J].微型电脑应用,2005,21(3):36-39. 被引量:17
  • 4Katzenbeisser, S. C. Principles of Steganogtaphy. In: S. Katzenbeisser and F. A. P. Petitcolas(eds. ) ,Information Hiding[ C ]. Techniques for Steganography and Digital Watermarking. Boston: Artech, 2000,17- 41.
  • 5Brassil, J., N. F. Maxemchuk, and L. O' Gonnan. Electronic Marking and Identification Technique to Discourage Document Copying[C] .Proceedings of INFOCOM '94,1994,1278- 1287.
  • 6Maxemchuk, N. F. 1994. Electronic Document Distribution[ J ]. AT&T Technical Journal, September/October, 73 - 80.
  • 7Low, S. H., N. F. Maxemchuk, and A. M. Lapnoe. Document Identification for Copyright Protection Using Centroid Detection[J]. IEEE Transactions on Communication, 1998,46(3) ,372 - 383.
  • 8Atallah, M. J., C. J. McDonough, V. Raskin, and S. Nirenburg. Natural Language Processing for Information Assurance and Security:An Overview and Implementations [ C ]. In: M. Shaeffer ( ed. ), NSPW' 00: Proceedings of Workshop on New Paradigms in Information Security, Cork, Ireland, September 2000. New York: ACM Press, 51 - 65.
  • 9Mikhail J., Atallah, Samuel S., Wagstaff, Jr.. Watermarking with Quadratic Residues[C]. Working Paper,Department of Computer Science, Purdue University, 1996.
  • 10Mikhail J. Atallah, Victor Raskin, Mchael Crogan, Christian Hempelimann, Flofian Kerschbaum, Dina Mohamed and Sanket Naik. Natural Language Watetmarking:Design,Analysis, and a Proof-of- Concept Implementation[C]. Informarion Hiding 2001 : 185 - 199.

共引文献53

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部