学位论文 > 优秀研究生学位论文题录展示
Constituent Structures Based Technique of Natural Language Watermarking
作 者: Alex Jessey Asiimwe
导 师: Sun Xingming
学 校: 湖南大学
专 业: Computer Science and Technology
关键词: Constituent structures Natural language watermarking embedding parsed sentence
分类号: TP309
类 型: 硕士论文
年 份: 2006年
下 载: 7次
引 用: 0次
阅 读: 论文下载
内容摘要
There is an increasing need for software or in the worst case, hardware that allows for protection of ownership rights, and it is in this context where watermarking techniques come to our help. Perceptible marks of ownership or authenticity have been around for centuries in the form of stamps, seals, signatures or classical watermarks nevertheless, given current data manipulation technologies, imperceptible digital watermarks are mandatory in most applications. A digital watermark is a distinguishing piece of information that is adhered to the data that it is intended to protect, this meaning that it should be very difficult to extract or remove the watermark from the watermarked object. Since watermarking can be applied to various types of data, the imperceptibility constraint will take different forms, depending on the properties of the recipient (i.e., the human senses in most practical cases).This thesis aims to discuss natural language watermarking, which uses the structure of the sentence constituents in natural language text in order to insert a watermark. This approach is different from techniques, collectively referred to as“text watermarking,”which embed information by modifying the appearance of text elements, such as lines, words, or characters. The watermark is inserted in the text by using constituent structures from a parsed sentence. If the required watermark bit is not achieved, the sentence is modified by making synonym substitutions and synonym transformations such as passivization and clefting, which change the syntactic structure of a sentence with little effect on its meaning. The first step is to identify marker sentences whose successors are the sentences carrying the watermark. The system uses quadratic residues and well as pseudo random numbers
|
全文目录
TABLE OF CONTENTS 5-7 List of Figures 7-8 List of Tables 8-10 ABSTRACT 10-12 CHAPTER 1. INTRODUCTION 12-15 1.1 Background and motivation 12-14 1.2 Aims 14 1.3 Organization of the thesis 14-15 CHAPTER 2. DIGITAL WATERMARKING TECHNIQUES 15-27 2.1 Introduction 15-17 2.2 Basic Watermarking Principles 17-20 2.3 Watermarking Terminologies 20-21 2.4 Watermarking Applications 21-23 2.4.1 Watermarking for Copyright Protection 21-22 2.4.2 Fingerprinting for Traitor Tracking 22 2.4.3 Watermarking for Copy Protection 22-23 2.4.4 Watermarking for Media Authentication 23 2.5 Requirements and Algorithmic Design Issues 23-27 2.5.1 Imperceptibility 24-25 2.5.2 Robustness 25-27 CHAPTER 3. WATERMARKING NATURAL LANGUAGE TEXT 27-36 3.1 Natural Language watermarking overview 27-28 3.2 Natural Language Transformations and Resources 28-34 3.2.1 Applying Linguistic Transformations 28-31 3.2.2 Natural Language Parsing and Processing (NLP) 31-33 3.2.3 Natural Language Generation 33-34 3.3 Previous Work on Natural Language Steganography 34-36 3.3.1 Using Probabilistic Context Free Grammars 34-35 3.3.2 Information Embedding Through Synonym Substitutions 35 3.3.3 Generating Cover Text Using Hybrid Techniques 35-36 CHAPTER 4. IMPLEMENTATION AND RESULTS 36-58 4.1 Project Development 36 4.2 Resources 36-38 4.2.1 The Link Grammar Parser 36-37 4.2.2 Cryptographic pseudorandom sequences 37 4.2.3 Quadratic residues 37 4.2.4 Synonymizer 37-38 4.3 Algorithm 38-41 4.4 Text selection 41-45 4.5 Watermark embedding 45-50 4.6 Watermark recovery 50-51 4.7 Experimental Results and Performance Analysis 51-58 4.7.1 Regular Tests 51-53 4.7.2 Attack tests 53-54 4.7.3 Synonym substitution, deletions, additions and passivizing attacks 54-58 CONCLUSION 58-60 1. Conclusion 58 2. Future Research 58-60 References 60-65 List of Published Papers 65-66 ACKNOWLEDGMENTS 66 DEDICATION 66
|
相似论文
- Windows内核态密码服务接口设计与实现,TP309.7
- 嵌入式可信计算机系统安全机制的设计与实现,TP309
- 基于虹膜的数据加解密算法研究,TP309.7
- 云计算平台下的动态信任模型的研究,TP309
- ATN中敏感信息保护技术研究,TP309
- 法院审判信息系统的访问控制研究,TP309
- 图像信息隐藏技术的应用研究,TP309.7
- 一种FFTT非对称加解密算法的研究与实现,TP309.7
- 基于图像的信息隐藏技术研究,TP309.7
- 彩色图像水印的非线性检测方案研究,TP309.7
- 基于RSA信息安全加密系统的研究与实现,TP309.7
- 基于离散小波变换的图像水印算法研究,TP309.7
- 网络备份系统中管理控制的设计与实现,TP309.3
- DES_RSA混合加密以及传输实现,TP309.7
- 基于SHA和AES算法的AHB总线监视器设计,TP309.7
- 基于固态硬盘加密方法的研究,TP309.7
- 基于混沌映射与FrFT的单通道彩色图像加密算法,TP309.7
- 基于嵌入式系统安全的信息流监控机制的研究与实现,TP309
- k-匿名隐私保护模型中不确定性数据建模及存储问题的研究,TP309
- 光盘授权播放系统安全通信研究与设计,TP309
- 宽带远程接入服务器高可靠冗余备份关键技术的研究,TP309.3
中图分类: > 工业技术 > 自动化技术、计算机技术 > 计算技术、计算机技术 > 一般性问题 > 安全保密
© 2012 www.xueweilunwen.com
|