学位论文 > 优秀研究生学位论文题录展示

Constituent Structures Based Technique of Natural Language Watermarking

作 者: Alex Jessey Asiimwe
导 师: Sun Xingming
学 校: 湖南大学
专 业: Computer Science and Technology
关键词: Constituent structures Natural language watermarking embedding parsed sentence
分类号: TP309
类 型: 硕士论文
年 份: 2006年
下 载: 7次
引 用: 0次
阅 读: 论文下载
 

内容摘要


There is an increasing need for software or in the worst case, hardware that allows for protection of ownership rights, and it is in this context where watermarking techniques come to our help. Perceptible marks of ownership or authenticity have been around for centuries in the form of stamps, seals, signatures or classical watermarks nevertheless, given current data manipulation technologies, imperceptible digital watermarks are mandatory in most applications. A digital watermark is a distinguishing piece of information that is adhered to the data that it is intended to protect, this meaning that it should be very difficult to extract or remove the watermark from the watermarked object. Since watermarking can be applied to various types of data, the imperceptibility constraint will take different forms, depending on the properties of the recipient (i.e., the human senses in most practical cases).This thesis aims to discuss natural language watermarking, which uses the structure of the sentence constituents in natural language text in order to insert a watermark. This approach is different from techniques, collectively referred to as“text watermarking,”which embed information by modifying the appearance of text elements, such as lines, words, or characters. The watermark is inserted in the text by using constituent structures from a parsed sentence. If the required watermark bit is not achieved, the sentence is modified by making synonym substitutions and synonym transformations such as passivization and clefting, which change the syntactic structure of a sentence with little effect on its meaning. The first step is to identify marker sentences whose successors are the sentences carrying the watermark. The system uses quadratic residues and well as pseudo random numbers

全文目录


TABLE OF CONTENTS  5-7
List of Figures  7-8
List of Tables  8-10
ABSTRACT  10-12
CHAPTER 1. INTRODUCTION  12-15
  1.1 Background and motivation  12-14
  1.2 Aims  14
  1.3 Organization of the thesis  14-15
CHAPTER 2. DIGITAL WATERMARKING TECHNIQUES  15-27
  2.1 Introduction  15-17
  2.2 Basic Watermarking Principles  17-20
  2.3 Watermarking Terminologies  20-21
  2.4 Watermarking Applications  21-23
    2.4.1 Watermarking for Copyright Protection  21-22
    2.4.2 Fingerprinting for Traitor Tracking  22
    2.4.3 Watermarking for Copy Protection  22-23
    2.4.4 Watermarking for Media Authentication  23
  2.5 Requirements and Algorithmic Design Issues  23-27
    2.5.1 Imperceptibility  24-25
    2.5.2 Robustness  25-27
CHAPTER 3. WATERMARKING NATURAL LANGUAGE TEXT  27-36
  3.1 Natural Language watermarking overview  27-28
  3.2 Natural Language Transformations and Resources  28-34
    3.2.1 Applying Linguistic Transformations  28-31
    3.2.2 Natural Language Parsing and Processing (NLP)  31-33
    3.2.3 Natural Language Generation  33-34
  3.3 Previous Work on Natural Language Steganography  34-36
    3.3.1 Using Probabilistic Context Free Grammars  34-35
    3.3.2 Information Embedding Through Synonym Substitutions  35
    3.3.3 Generating Cover Text Using Hybrid Techniques  35-36
CHAPTER 4. IMPLEMENTATION AND RESULTS  36-58
  4.1 Project Development  36
  4.2 Resources  36-38
    4.2.1 The Link Grammar Parser  36-37
    4.2.2 Cryptographic pseudorandom sequences  37
    4.2.3 Quadratic residues  37
    4.2.4 Synonymizer  37-38
  4.3 Algorithm  38-41
  4.4 Text selection  41-45
  4.5 Watermark embedding  45-50
  4.6 Watermark recovery  50-51
  4.7 Experimental Results and Performance Analysis  51-58
    4.7.1 Regular Tests  51-53
    4.7.2 Attack tests  53-54
    4.7.3 Synonym substitution, deletions, additions and passivizing attacks  54-58
CONCLUSION  58-60
  1. Conclusion  58
  2. Future Research  58-60
References  60-65
List of Published Papers  65-66
ACKNOWLEDGMENTS  66
DEDICATION  66

相似论文

  1. Windows内核态密码服务接口设计与实现,TP309.7
  2. 嵌入式可信计算机系统安全机制的设计与实现,TP309
  3. 基于虹膜的数据加解密算法研究,TP309.7
  4. 云计算平台下的动态信任模型的研究,TP309
  5. ATN中敏感信息保护技术研究,TP309
  6. 法院审判信息系统的访问控制研究,TP309
  7. 图像信息隐藏技术的应用研究,TP309.7
  8. 一种FFTT非对称加解密算法的研究与实现,TP309.7
  9. 基于图像的信息隐藏技术研究,TP309.7
  10. 彩色图像水印的非线性检测方案研究,TP309.7
  11. 基于RSA信息安全加密系统的研究与实现,TP309.7
  12. 基于离散小波变换的图像水印算法研究,TP309.7
  13. 网络备份系统中管理控制的设计与实现,TP309.3
  14. DES_RSA混合加密以及传输实现,TP309.7
  15. 基于SHA和AES算法的AHB总线监视器设计,TP309.7
  16. 基于固态硬盘加密方法的研究,TP309.7
  17. 基于混沌映射与FrFT的单通道彩色图像加密算法,TP309.7
  18. 基于嵌入式系统安全的信息流监控机制的研究与实现,TP309
  19. k-匿名隐私保护模型中不确定性数据建模及存储问题的研究,TP309
  20. 光盘授权播放系统安全通信研究与设计,TP309
  21. 宽带远程接入服务器高可靠冗余备份关键技术的研究,TP309.3

中图分类: > 工业技术 > 自动化技术、计算机技术 > 计算技术、计算机技术 > 一般性问题 > 安全保密
© 2012 www.xueweilunwen.com