scispace - formally typeset
Open AccessJournal Article

Natural language watermarking and tamperproofing

Reads0
Chats0
TLDR
A semantically-based scheme dramatically improves the information-hiding capacity of any text through two techniques: modifying the granularity of meaning of individual sentences, whereas the own previous scheme kept the granular fixed, and halving the number of sentences affected by the watermark.
Abstract
Two main results in the area of information hiding in natural language text are presented. A semantically-based scheme dramatically improves the information-hiding capacity of any text through two techniques: (i) modifying the granularity of meaning of individual sentences, whereas our own previous scheme kept the granularity fixed, and (ii) halving the number of sentences affected by the watermark. No longer a long text, short watermark approach, it now makes it possible to watermark short texts, like wire agency reports. Using both the above-mentioned semantic marking scheme and our previous syntactically-based method hides information in a way that reveals any non-trivial tampering with the text (while re-formatting is not considered to be tampering-the problem would be solved trivially otherwise by hiding a hash of the text) with a probability 1-2 -β(n+1) , n being its number of sentences and β a small positive integer based on the extent of co-referencing.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

Digital Watermarking

TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.

Linguistic steganography: survey, analysis, and robustness concerns for hiding information in text

TL;DR: This paper provides a basic introduction to steganography and steganalysis, with a particular focus on text Steganography, and highlights some of the problems inherent in text steganographic as well as issues with existing solutions, and describes linguistic problems with character-based, lexical, and syntactic approaches.
Proceedings ArticleDOI

Rights protection for relational data

TL;DR: In this paper, a solution for relational database content rights protection through watermarking is proposed, which addresses important attacks, such as data re-sorting, subset selection, linear data changes (applying a linear transformation on arbitrary subsets of the data).
Journal ArticleDOI

Rights protection for relational data

TL;DR: In this article, a solution for relational database content rights protection through watermarking is proposed, which is able to handle higher level semantic constraints, such as classification preservation, while also addressing important attacks such as subset selection and random and linear data changes.
Book

Disappearing Cryptography: Information Hiding: Steganography and Watermarking

TL;DR: This new edition of this best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques capable of withstanding the evolved forms of attack.
References
More filters
Journal ArticleDOI

On the limits of steganography

TL;DR: It is shown that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive, and the use of parity checks to amplify covertness and provide public key steganography.
Proceedings ArticleDOI

Electronic marking and identification techniques to discourage document copying

TL;DR: Three coding methods are proposed that discourage illicit distribution by embedding each document with a unique codeword, yet enable one to identify the sanctioned recipient of a document by examination of a recovered document.
Book

Ontological semantics

TL;DR: This book is divided into two parts: a philosophical part I and a practical part II, in which the authors present their text-meaning representation (TMR) and demonstrate how it is used in language analysis and critique many alternative views of semantics.
Book ChapterDOI

Stretching the Limits of Steganography

TL;DR: It was widely believed that public key steganography was impossible; it is shown how to do it and a number of possible approaches to the theoretical security of hidden communications are looked at.
Book ChapterDOI

Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation

TL;DR: A scheme for watermarking natural language text by embedding small portions of the watermark bit string in the syntactic structure of a number of selected sentences in the text, with both the selection and embedding keyed (via quadratic residue) to a large prime number.
Related Papers (5)