期刊文献+

自然语言水印隐蔽性自动评测方法 被引量:1

Automatic evaluation scheme for imperceptibility of natural language watermarking
下载PDF
导出
摘要 对自然语言水印(NLW)隐蔽性评测的缺乏严重影响了该领域技术的发展,为此,结合NLW的特点和语言心理学,以人类对语言释义的速度及难易程度为依据,提出了NLW隐蔽性的感知模型和相应的评测方案:从语法错误、搭配错误和语义损失三个方面对隐蔽性进行评测。最后,针对四种不同水印技术(基于绝对同义词替换的TLex水印系统、相对同义词替换水印系统、基于句法树的水印系统和中文句法水印系统),一方面利用该方案进行自动评测,另一方面进行置信度为90%的人工评测。两种方法得到了相同的结论:基于词汇的NLW技术的隐蔽性优于基于句子的NLW技术,说明该自动评测方法是评测NLW隐蔽性的有效评测方法。 The deficiency of evaluation scheme for the imperceptibility of Natural Language Watermarking (NLW) seriously restricts the development in this field. To resolve this problem, combining the characteristics of natural language and the knowledge of psycholinguistics and considering the difficulty for human to understand natural language, an imperceptibility perceptual model and an automatic evaluation scheme were proposed. The proposed scheme evaluated the imperceptibility from three aspects: syntax error, collocation error and semantic loss. Finally, four different watermarking schemes including the T- Lex watermarking system based on absolute synonym substitution, the relative synonymous substitution watermarking system, the watermarking system based on syntactic tree and the Chinese syntactic watermarking system were used to compare the results of the proposed automatic method and manual method whose confidence coefficient is 90%. The two methods get the same conclusion: the imperceptibility of NLW based on word is better than that of NLW based on sentence, and the automatic evaluation scheme is effective for the imperceptibility of NLW.
出处 《计算机应用》 CSCD 北大核心 2013年第12期3522-3526,3530,共6页 journal of Computer Applications
基金 陕西省教育厅科学研究计划项目(12JK0742)
关键词 自然语言水印 隐蔽性 自动评测 自然语言处理 信息隐藏 Natural Language Watermarking (NLW) imperceptibility automatic evaluation natural language process information biding
  • 相关文献

参考文献18

  • 1TOPKARA M, TASKIRAN C M, DELP EJ, m. Natural language watermarking[C] / / Proceedings of the 2005 SPIE International Conference on Security, Steganography, and Watermarking of Multi?media Contents Vll, SPIE 5681. Bellingham: SPIE, 2005: 441 - 452.
  • 2何路,桂小林,田丰,武睿峰,房鼎益.自然语言水印鲁棒性分析与评估[J].计算机学报,2012,35(9):1971-1982. 被引量:7
  • 3VYBORNOVA 0, MACQ B. A method of text watermarking using presuppositions[C] / / Proceedings of the 2007 SPIE International Conference on Security, Steganography and Watermarking of Multi?media Contents IX, SPIE 6505. Bellingham: SPIE, 2007: 65051R.
  • 4MURPHY B, VOGEL C. Statistically-constrained shallow text mark?ing: techniques, evaluation paradigm and results[C] / / Proceedings of the 2007 SPIE International Conference on Security, Steganogra?phy and Watermarking of Multimedia Contents IX, SPIE 6505. Bellingham: SPIE, 2007: 65050Z.
  • 5TOPKARA M, RICCARDI G, HAKKANI-TiiR, D, et al. Natural language watermarking: challenges in building a practical system[C] II Proceedings of the 2006 SPIE International Conference on Se?curity, Steganography and Watermarking of Multimedia Contents VJlJ, SPIE 6072. Bellingham: SPIE, 2006: 60720A.
  • 6张雅轩,何路,房鼎益.针对文本水印摘要攻击的语义损失量评估方法[J].计算机应用研究,2012,29(9):3483-3485. 被引量:2
  • 7CARROU D W. Psychology of language[M]. Belmont: Wadsworth Publishing Company, 2007: 223 - 231.
  • 8SPIVEY M,JOANISSE M, MCRAE K. The Cambridge handbook of psycholinguistics[M]. Cambridge: Cambridge University Press, 2012: 1021 -1039.
  • 9BOLSHAKOV I A. A method of linguistic steganography based on collocationally-verified synonymy[C]I / IH '05: Proceedings of the 6th International Workshop on Information Hiding, LNCS 3200. Berlin: Springer-Verlag, 2005: 180 - 191.
  • 10BOLSHAKOV I A, GELBUKH A. Synonymous paraphrasing using WordNet and Internet[C] / / NLDB 2004: Proceedings of the 9th International Conference on Applications of Natural Language to In?formation Systems, LNCS 3136. Berlin: Springer-Verlag, 2004: 312 -323.

二级参考文献34

  • 1张宇,刘挺,陈毅恒,赵世奇,李生.自然语言文本水印[J].中文信息学报,2005,19(1):56-62. 被引量:51
  • 2薛存金,苏奋振,周军其.最佳结构元素尺寸的自适应确定算法[J].中国图象图形学报,2006,11(3):317-324. 被引量:5
  • 3戴祖旭,洪帆,崔国华,付敏.基于词性标记串统计特性的文本数字水印算法[J].通信学报,2007,28(4):108-113. 被引量:11
  • 4HE Lu,GUI Xiao-lin, JIN Yao-ping. Summary attack on spread spectrum vector natural language watermarking [ J ]. Journal of Computational Information Systems, 2012,8(4) :l-8.
  • 5RADEV D R, JING Hong-yan, BUDZIKOWSKA M. Centroid-based summarization of multiple documents [ J ]. Information Processing and Management, 2004,40(6) :919-938.
  • 6RADEV D,BLITZER J, WINKEL A, et al. MEAD [EB/OL].(2003-11-21). http://www. summarization, com/mead/.
  • 7西北大学信息学院数字内容安全研究小组.自动攻击[EB/0L]. http ://dc-security. org/download/autoattacker. html.
  • 8ANI H A, NENKOVA A,PASSONNEAU R,et al. Automation of summary evaluation by the pyramid method [ C ] //Proc of Conference of Recent Advances in Natural Language Processing. 2005,.
  • 9RADEV D, ALLISON T,GOLDENSOHN S B ,et al. MEAD:a platform for multidocument multilingual text summarization [ C ] //Proc of the 4th International Conference on Language Resources and Evaluation. 2004.
  • 10MANI T. Automatic summarization [ M ]. Amsterdam, Philadelphia : John Benjamins Publishing Company, 2001.

共引文献7

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部