期刊文献+

基于二元依存同义词替换隐写算法 被引量:3

Two-gram dependency synonym substitution-based steganographic algorithm
下载PDF
导出
摘要 针对在自然语言文本信息隐写术中,采用基于同义词替换方法来嵌入秘密信息时,常由于候选同义词选择不准确导致替换后文本语句出现明显错误或逻辑歧义等问题,提出了基于二元依存同义词替换隐写算法。该算法首先从Word Net词库中得出与目标词词性相同、语义相似的词语,然后对目标语句利用依存句法提取同义词对应的二元依存关系,从大规模语料库中计算二元依存关系的向量距离,得出最佳替换的同义词词集。实验结果表明,该算法生成的隐写文本保持嵌入秘密信息后文本特征属性不变,比目前改进的同义词替换算法更能保证文本语法正确、语义完整,更高效地抵抗同义词结对和相对词频统计分析检测,提高了秘密信息传递的安全性。 In linguistic steganography,when the text using synonym substitution-base method embeds secret information,obvious mistakes and logical misconceptions,resulted from the inaccuracy of candidate synonyms,are ubiquitous.In order to solve this problem,this paper proposed a new steganography algorithm based on two-gram dependency synonym substitution.Firstly,this algorithm chose the synonym which had the same attribute and semantic as the target word from the WordNet sets.Secondly,it extracted the two-gram dependency relation of synonym from the target sentence using dependency syntactic,and obtained the best synonym substitution set by calculating vector distance of two-gram dependency relation in a large-scale corpus.Experimental results show that the stego text generated by using this algorithm keeps the same property of the text after embedding secret information.In comparison to the current advanced synonym substitution,it not only can better ensure the accuracy of grammar and completeness of semantics,but can resist attacks made by detection algorithms using statistical features based on the synonyms pairing and relative frequency more efficiently,guarantees the security of secret information.
作者 霍林 肖豫川 Huo Lin;Xiao Yuchuan(School of Computer&Electric Information,Guangxi University,Nanning 530004,China)
出处 《计算机应用研究》 CSCD 北大核心 2018年第4期1174-1178,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61262072) 广西工业和信息化委员会信息服务项目发展基金资助项目(201333)
关键词 文本 信息隐藏 同义词 二元依存词语 向量距离 text information hiding synonymy two-gram dependency collocations vector distance
  • 相关文献

参考文献2

二级参考文献21

  • 1周继军,杨著,钮心忻,杨义先.文本信息隐藏检测算法研究[J].通信学报,2004,25(12):97-101. 被引量:26
  • 2钮心忻.信息隐藏与数字水印的研究及发展[EB/OL].http://www.cihw.ciii.com.cn.,2005-01-08.
  • 3Cox I J,Linnartz J P M G.Public Watermarks and Resistance to Tampering[C].Proc.of International Conference on Image Processing Santa Barbara,California,1997-10:26-29.
  • 4Brassil J T,Low S,Maxemchuk N F.Copyright Protection for the Electronic Distribution of Text Documents[J].Proceedings of the IEEE,1999,87(7).
  • 5Brassil J,Low S,Maxemchuk N F,et al.Electronic Marking and Identification Techniques to Discourage Document Copying[J].IEEE Journal on Sel.Areas in Commun,1995,13(8):1495-1504.
  • 6Atallah M J,Raskin V,Crogan M,et al.Natural Language Wat ermarking:Design,Analysis,and a Proof-of-concept Implementation[C].Proc.of Int.Workshop on Information Hiding.Berlin:Springer-Verlag,2001:185-199.
  • 7罗纲 孙星明.基于噪声检测的文本隐藏信息检测算法研究.湖南大学学报:自然科学版,2005,32(6):181-184.
  • 8Cox I J, Kalker T, Pakura G, et al. Information transmission and steganography [C] //Proc of the 4th Int Workshop on Digital Watermarking. LNCS 3710. Berlin: Springer, 2005:15-29
  • 9Lie Wennung, Lin Guoshiang. A feature -based classification technique for blind image steganalysis[J]. IEEE Trans on Multimedia, 2005, 7(6):1007-1020
  • 10Lyu S, Farid H. Steganalysis using higher order image statistics [J]. IEEE Trans on Information Forensics and Security, 2006, 1(1): 111-119

共引文献13

同被引文献16

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部