期刊文献+

混沌文本零水印的词法主动攻击 被引量:1

Lexical active attack on chaotic text zero-watermarking
下载PDF
导出
摘要 为了解决传统的密写分析技术对文本零水印失效的问题,提出一种基于词法的主动攻击算法。该算法将目前鲁棒性较好的混沌文本零水印作为攻击对象,采用同义词替换技术,定义了同步攻击和生日攻击两种方法,通过将这两种方法相结合,在词这一级别上实现了对文本零水印的主动攻击。实验结果表明,该算法无需大量改写载体文本即可有效地破坏零水印。 The conventional steganalysis techniques does not work in zero-watermarking technology because it does not modify Carrier text. However, active attack model on text zero-watermarking has not been well studied. In order to solve this problem, an active attack algorithm for text zero-watermarking was proposed. Making use of synonym substitution technology, sync-attack and birthday-attack were defined. Through combining the two active attack methods, a lexical active attack algorithm on text zero-watermarking was designed and implemented. The experimental result shows the proposed algorithm can effectively destroy zero-watermarking without modifying carrier text massively.
出处 《计算机应用》 CSCD 北大核心 2012年第9期2603-2605,共3页 journal of Computer Applications
关键词 文本水印 零水印 主动攻击 同义词替换 自然语言处理 text watermarking zero-watermarking active attack synonym substitution natural language processing
  • 相关文献

参考文献11

  • 1VENKATESAN R, KOON S M, JAKUBOWSKI M H, et al. Robust image hashing[ C]// Proceedings of IEEE International Conference on Image Processing. Piscataway, NJ: IEEE Press, 2000: 664- 666.
  • 2程玉柱,孙星明,黄华军.一种新的基于混沌映射的文本零水印算法[J].计算机应用,2005,25(12):2753-2754. 被引量:15
  • 3CHEN Z L, HUANG L S, YANG W. Detection of substitution- based linguistic steganography by relative frequency analysis [ J]. Digital Investigation, 2011, 8(1) : 68 -77.
  • 4罗纲,孙星明,向凌云,刘玉玲,甘灿.针对同义词替换信息隐藏的检测方法研究[J].计算机研究与发展,2008,45(10):1696-1703. 被引量:9
  • 5TASKIRAN C M, TOPKARA U, TOPKARA M, et al. Attacks on lexical natural language steganography systems[ C]// SPIE Interna- tional Conference on Security, Steganography, and Watermarking of Multimedia Contents. San Jose: SPIE, 2006:6072 -6080.
  • 6HE L, GUI X L, JIN Y P. Summary attack on spread spectrum vec- tor natural language watermarking [ J]. Journal of Computational In- formation Systems, 2012, 8(4) : 1663 - 1670.
  • 7ATALLAH M, RASKIN V, CROGAN M C, et al. Natural language watermarking: design, analysis, and a proof-of-concept implementa- tion[ C]// Proceedings of the 4th International Workshop, IH 2001 Pittsburgh, LNCS 2137. Berlin: Springer-Verlag, 2001:185 -200.
  • 8ATALLAH M, RASKIN V, HEMPELMANN C F, et al. Natural language watermarking and tamper proofing [ C]// Proceedings of IH ' 02 Revised Papers from the 5th International Workshop on In- formation Hiding, LNCS 2578. Berlin: Springer-Verlag, 2002:196 -212.
  • 9CHAND V, ORGUN C O. Exploiting linguistic features in lexical steganography: design and proof-of-concept implementation [ C]// Proceedings of the 39th Hawaii International Conference on System Sciences. Washington, DC: IEEE Computer Society, 2006: 126b.
  • 10甘灿,孙星明,刘玉玲,向凌云.一种改进的基于同义词替换的中文文本信息隐藏方法[J].东南大学学报(自然科学版),2007,37(A01):137-140. 被引量:18

二级参考文献30

  • 1王宏霞,何晨,丁科.基于混沌映射的鲁棒性公开水印[J].软件学报,2004,15(8):1245-1251. 被引量:50
  • 2眭新光,罗慧.一种安全的基于文本的信息隐藏技术[J].计算机工程,2004,30(19):104-105. 被引量:15
  • 3周继军,杨著,钮心忻,杨义先.文本信息隐藏检测算法研究[J].通信学报,2004,25(12):97-101. 被引量:26
  • 4BRASSIL JT,LOW SH,MAXEMCHUK NF,et al. Electrical Marking and Identification Techniques to Discourage Document Copying[J]. IEEE Journal on Selected Areas in Communications, 1995, 13(8): 1495-1504.
  • 5LOW SH, MAZEMCHUK NF,BRASSIL JT,et al.Document Marking and Identification Using Both Line and Word Shifting[A]. Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies[C].Boston,USA,1995,853-860.
  • 6ATALLAH MJ,RASKIN V, HEMPELMANN CF,et al. Natural Language Watermarking and Tamperproofing[A]. Proceedings of the Fifth International Information Hiding Workshop[C].Netherlands, 2002. 196-212.
  • 7SUN XM,CHEN HW, YANG LH,et al.Mathematical Representation of a Chinese Character and its Applications[J]. International Journal of Pattern Recognition and Artificial Intelligence, 2002, 16(8): 735-747.
  • 8罗纲 孙星明.基于噪声检测的文本隐藏信息检测算法研究.湖南大学学报:自然科学版,2005,32(6):181-184.
  • 9Moulin P,O'Sullivan J A.Informationtheoretic analysis of information hiding[J].IEEE Transaction on Information Theory,2003,49(3):563-593.
  • 10Atallah M,McDonough C,Nirenburg S,et al.Natural language processing for information assurance and security:an overview and implementations[C]/Proceedings 9th ACM/SIGSAC New Security Paradigms Workshop.Ireland,2000:51-65.

共引文献36

同被引文献10

  • 1Wikipedia. Birthday problem [ EB/OL]. [ 2015-03-21]. http:// en. wikipedia, org/wiki/Birthday_problem.
  • 2KLAMKIN M S, NEWMAN D J. Extensions of the birthday surpri- ses [J]. Journal of Combinatorial Theory, 1967, 3(3) : 279 -282.
  • 3ABRAMSON M, MOSER W O J. More birthday surprises [ J]. A- merican Mathematical Monthly, 1970, 77:856-858.
  • 4WIKIPEDIA. Birthday attack [ EB/OL]. [ 2015- 03- 21]. http:// en. wikipedia, org/wiki/Birthday_attaek.
  • 5ERDELSKY P J. The birthday paradox [ EB/OL]. [ 2015-03- 25]. http://www, efgh. com/math/birthday, html.
  • 6MURPHY R. An analysis of the distribution of birthdays in a cal- endar year [ EB/OL]. [ 2015- 04- 21 ]. http://www, panix, corn/- murphy/bday, html.
  • 7BLOOM D M. A birthday problem [ J]. American Mathematical Monthly, 1973, 80:1141 - 1142.
  • 8冯伟,冯登国.基于串空间的可信计算协议分析[J].计算机学报,2015,38(4):701-716. 被引量:12
  • 9程宽,韩文报.MD5选择前缀碰撞算法的改进及复杂度分析[J].计算机应用,2014,34(9):2650-2655. 被引量:2
  • 10姬东耀,冯登国.对两个双方密码协议运行模式的攻击及改进[J].计算机科学,2003,30(6):72-73. 被引量:1

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部