期刊文献+

编码与同义词替换结合的可逆文本水印算法 被引量:7

A Reversible Text Watermarking Algorithm Based on Coding and Synonymy Substitution
下载PDF
导出
摘要 从通信编码的角度,该文探讨一种利用编码方法和同义词替换相结合的可逆文本篡改检测水印算法。以可替换同义词为标志对文本进行分组,提取分组文本特征生成认证水印信息;利用霍夫曼编码和纠错编码对同义词库各词进行编码,利用同义词替换技术完成水印的嵌入。在接收端,利用分组文本特征和霍夫曼编码,实现水印文本的篡改定位,利用纠错码实现可替换同义词的还原恢复。仿真实验表明,算法嵌入的水印具有良好的不可见性和较强的鲁棒性,在实现对文本篡改定位的同时,较好地实现了可替换同义词无损还原。 From the perspective of communication encoding, a reversible text watermarking algorithm based on cod- ing and synonymy substitution is discussed. The algorithm employs interchangeable synonyms as signs to group the texts and generates watermarking by extracting group text feature. The algorithm uses the method of Huffman cod- ing to encode synonyms and uses the method of error correction coding to encode the position of a synonym in the thesaurus into , then completes the watermark embedding combined with synonymy substitution. At the receiving end, using packet text feature and the Hoffman code to locate tampered watermark text and using error correcting codes to restore the original synonymy. Experimental results show that, the proposed algorithm can improve the ro- bustness and imperceptibility of watermarking. In addition, it can locate the tampering and restore the original syn- onymy.
出处 《中文信息学报》 CSCD 北大核心 2015年第4期151-158,198,共9页 Journal of Chinese Information Processing
关键词 编码 同义词替换 可逆文本水印 定位篡改 coding synonymy substitution reversible text watermarking tampering identification
  • 相关文献

参考文献16

  • 1Mercan Topkara,Cuneyt M,Taskiran.Natural language watermarking [C]//Proceedings of Security,Steganography,and Watermarking of Multimedia Contents VII,2005,2005:441-452.
  • 2Zunera Jalil,Anwar M Mirza.A review of digital watermarking techniques for text documents [C]//Proceedings of 2009 International Conference on Information and Multimedia Technology,ICIMT 2009,2009:230-234.
  • 3Zheng Xueling,Huang Liusheng,Chen Zhil.Hiding information by context-based synonym substitution[C]//Proceedings of 8th Internation- al Workshop on Digital Watermarking,IWDW 2009,2009:162-169.
  • 4黄华,齐春,李俊,朱伟芳.文本数字水印[J].中文信息学报,2001,15(5):52-57. 被引量:39
  • 5Coatriuex G,Guillou C L,Gauvin J M.Reversible watermarking for knowledge digest embedding and reliability control in medical images [J].IEEE Transaction on Information Technology in Biomedicine,2009,13(2):158-165.
  • 6彭飞,雷瑜洲,孙星明.2维CAD工程图小波域可逆水印[J].中国图象图形学报,2011,16(7):1134-1139. 被引量:5
  • 7王俊祥,倪江群,潘金伟.一种基于直方图平移的高性能可逆水印算法[J].自动化学报,2012,38(1):88-96. 被引量:40
  • 8Banani Patra,Jagdish C Patra.CRT-based fragile self-recovery watermarking scheme for image authentication and recovery [C]//Proceedings of 20th IEEE International Symposium on Intelligent Signal Processing and Communications Systems(ISPACS),2012:430-435.
  • 9T jokorda Agung B.W,Adiwijaya.Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and Run Length Encoding (RLE) compression [C]//Proceedings of 2012 IEEE International Conference on Communication,Networks and Satellite,COMNETSAT 2012,2012:167-171.
  • 10Luis Rosales-Roldan,Mariko Nakano-Miyatake.Watermarking-based tamper detection and recovery algorithms for official documents[C]//Proceeding of 8th International Conference on Electrical Engineering,Computing Science and Automatic Control,CCE 2011,2011.

二级参考文献37

  • 1谢于明,程义民,王以孝,郭志川.基于线性预测的图像无损信息隐藏方法[J].计算机辅助设计与图形学学报,2006,18(4):585-591. 被引量:8
  • 2Honsinger C W,Jones P W,Rabbani M,et al.Lossless recovery of an original image containing embedded data:US,6278791[P].2001-08-21.
  • 3Coatrieux G,Guillou C L,Gauvin J M,et al.Reversible watermarking for knowledge digest embedding and reliability control in medical images[J].IEEE Transactions on Information Technology in Biomedicine,2009,13(2):158-165.
  • 4Low S H,Maxemchuk N F,Brassil J T,et al.Document marking and identification using both line and word shifting[C] //Proceedings of the 14th Annual Joint Conference on the IEEE Computer and Communications Societies,Boston,1995:853-860.
  • 5Topkara M,Topkara U,Atallah M J.Words are not enough:sentence level natural language watermarking[C] //Proceedings of the 4th ACM International Workshop on Content Protection and Security,Santa Barbara,2006:37-46.
  • 6Atallah M J,Raskin V,Crogan M,et al.Natural language watermarking:design,analysis,and a proof-of-concept implementation[M] //Lecture Notes in Computer Science,Heidelberg:Springer,2001,2137:185-200.
  • 7Gupta G,Pieprzyk J,Wang H X.An attack-localizing watermarking scheme for natural language documents[C] //Proceedings of the ACM Symposium on Information,Computer and Communications Security,Taiper,2006:157-165.
  • 8董振东,董强.知网[0L].[2009-05-31].http://www.keenage.com/zhiwang/c_zhiwang.html.
  • 9同义词词林扩展版[OL].[2009-05-31].http://ir.hit.edu.cn/demo/ltp/sharing_plan.htm.
  • 10Manning C D,Schuuze H.Foundations of statistical natural language processing[M].Cambridge:MIT Press,1999:95-140.

共引文献150

同被引文献67

引证文献7

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部