一个自然语言水印嵌入安全性评估方案(7)
发布时间:2008-12-19 10:26
作者:
来源:
点击:加载中...次
取与水印协议近似的同义词词典,从而按构造1进行交互证明被拒绝的概率会更接近1/2。
6 结束语
本文提出了一个自然语言水印嵌入安全性的评价方案,定义了理想不可检测性,提出了针对特定检测器构造交互证明系统的方法。依据这个评价方案对几个现存的实际自然语言水印系统作了评估。
除了不可检测性,自然语言水印的安全性还有很多的方面。需要一个较为完整的计算模型,用以讨论了水印的更多性能。未来我们将在这个方向上进行更深入的工作。
参考文献:
[1] F. Hartung and F. Ramme, "Digital rights management and watermarking of multimedia content for m-commerce applications", IEEE Communications Magazine, vol. 38, pp. 78-84, 2000.
[2] P. Moulin and J. OSullivan, “Information-Theoretic Analysis of Information Hiding”, IEEE TRANSACTIONS ON INFORMATION THEORY, vol. 49, no. 3, p. 563, 2003.
[3] M. Atallah, V. Raskin, M. Crogan, et al, “Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation,” Information Hiding, 4th InternationalWorkshop, IHW, pp. 25–27, 2001.
[4] G. Gupta, J. Pieprzyk, and H. Wang, “An attacklocalizing watermarking scheme for natural language documents,” Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pp. 157–165, 2006.
[5] “The tyrannousaurus lex system available at http://alumni.imsa.edu/ keithw/tlex/,”
[6] Y. Chiang, L. Chang, W. Hsieh, et al, “Natural language watermarking using semantic substitution for chinese text,” Digital Watermarking: Second International Workshop, IWDW, vol. 2939, pp. 129–140, 2003.
[7] C. Taskiran, U. Topkara, M. Topkara, et al, “Attacks on lexical natural language steganography systems,” Proceedings of SPIE, vol. 6072, pp. 97–105, 2006.
[8] C. Zhi-li, H. Liu-sheng, Y. Zhen-shan, et al, “A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words,” Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, pp. 558–563, 2008.
[9] G. Simmons, “The prisoners problem and the subliminal channel”, Proceedings of CRYPTO, vol. 83, pp. 51–67, 1984.
[10] O. Goldreich, Foundations of Cryptography: Basic Tools. Cambridge University Press New York, NY, USA, 2000.
[11] U. Topkara, M. Topkara, and M. Atallah, “The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions,” Proceedings of the 8th workshop on Multimedia and security, pp. 164–174, 2006.