自然语言信息隐藏研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机和互联网技术的发展与普及,信息隐藏成为信息安全领域兴起的一个研究热点,在版权保护、隐蔽通信、身份认证等许多方面有着非常广阔的应用前景。目前,学术界对视频、图像和音频中的信息隐藏进行了广泛的研究。文本文档作为一种普遍使用的重要的信息存储与传输媒体,利用它们作为载体进行隐蔽通信、利用数字水印技术保护文本文档版权以及对文本内容进行认证等具有重要意义。
     由于文本文档缺乏图像、音频和视频等媒体所具有的人类视觉或听觉冗余特性,以及当前自然语言处理领域对文本内容的理解、变换和生成缺乏坚实的理论基础与实用的自动化技术等原因,文本信息隐藏的研究工作极具挑战性。早期基于格式的文本信息隐藏技术不能抵御重新排版和光学字符识别攻击,应用不广。自然语言信息隐藏是起步不久的新兴领域,代表了文本信息隐藏的发展趋势。
     本文主要以中文自然语言文本为研究对象,按照自然语言信息隐藏嵌入法的修改粒度,分别在词汇层、句子层以及篇章层提出相应的自然语言信息隐藏方法。其次,为了克服现有嵌入法容量较小、实现难度较大等问题,提出一种基于Mimic的载体文本生成方法。其主要研究成果如下:
     (1)根据汉语自身的特点,提出两种词汇层自然语言信息隐藏方法。一种是基于异形词替换和同义词替换的方法。该方法将物理相邻的词作为上下文窗口,然后利用词法分析系统对其进行预替换以判断是否嵌入信息。这种方法易于实现、容量较大、能抵抗机器分析的攻击。另一种是基于语义相邻的同义词替换方法。首先利用《同义词词林》和《知网》构建一个同义词库并对同义词组进行分类;然后对于不能完全替换的同义词,根据依存句法分析获取被替换词的语义相邻词作为上下文语境,并选取与上下文语境的出现概率最高的同义词进行替换。这种方法可以有效地获取上下文,并较好地消除错误的替换。
     (2)针对现有句子层自然语言信息隐藏方法主要集中在英文文本,且存在现有句法分析技术与生成技术无法满足句法变换要求等问题,提出两种句子层中文自然语言信息隐藏方法。一种是基于句法分析树变换的方法。首先设计并实现一个基于BP神经网络的句法分析器;然后对句法分析树进行编码;最后通过句法变换规则修改句法分析树编码来隐藏信息。另一种方法是基于移位变换的方法。首先利用汉字数学表达式思想实现文本数字化,然后通过移位变换规则以隐藏秘密信息。
     (3)针对现有篇章层自然语言信息隐藏方法研究较少,且存在实现难度大、可行性不高等问题,提出一种基于命名实体和指代消解的篇章层自然语言数字水印方法,同时引入扩频技术对水印信息进行编码。实验结果表明该方法能抵抗一定的主动性攻击,具有较好的鲁棒性。
     (4)针对现有的自然语言信息隐藏生成法需要通信双方额外传输词典和句型模板库,且存在生成的文本容易引起怀疑等问题,提出一种基于Mimic的载体文本生成方法。该方法不需要事先构建精细的词典和(或)句子模板库,且能提高和增强秘密信息传输的效率和安全性。同时,文中以Microsoft PowerPoint(PPT)文档为例详细地描述了工具MIMIC-PPT的实现过程。
With the development and popularization of computer and Internet technology, information hiding has become one of the hot spots in the field of information security, and has been extensively used for copyright protection, covert communication, authentication, etc. At present, most have focused on information hiding of video, image and audio documents. However, digital texts form one of the largest chunk of digital data people encounter daily, thus covert communication, copyright management and authentication for text documents are more serious than they are for video, image, and audio documents.
     Comparing with other media documents, such as image, audio and video, text documents lack redundancies of the human visual system and human auditory system. Additionally, there are few of strong theories and practical automatic techniques in natural language processing area to understand, transform and generate texts. Thus the research of text steganography is very challenging. The early methods of text steganography are based on the physical format of texts. Due to those methods exploited tolerances in typesetting by making minute changes in line placement and kerning, making them vulnerable to simple reformatting and OCR (short for Optical Character Recognition) attacks, their applications are limited. Natural language steganography, as a new area, directs the text steganography.
     This dissertation mainly concerns about Chinese texts, and proposes several methods for natural language steganography on word level, sentence level and paragraph level. Additionally, due to the limit of the amount of hidden information and the sensitivity of modifying a given cover text, a new method based on Mimic is proposed. The main contributions are summarized as follows.
     (1) According to characteristics of Chinese texts, two methods on the word level are proposed. The first method exploits the substitution of variant forms of the same word and synonyms. In the method, the neighboring words are deemed as context words. When substituting, a Chinese morphological analyzer is introduced to evaluate whether the text is correctly segmented. The method is easy to implement. It can achieve a high degree of capacity and resist machine analysis. The second method is substitution of synonyms based on the semantic adjacent words. Firstly, the synonymy sets are created and classified with HowNet and Tongyicicilin. For the non-totally interchangeable synonymy sets, the context words are obtained from the semantic adjacent words by analyzing the dependency relationships, and then the synonym is selected with high probability of its cooccurrence of the semantic adjacent words. The method can effectively obtain the context words, and avoid the improper substitutions.
     (2) As present work on natural language steganography on the sentence level is mainly designed for English texts, this dissertation proposes two methods on the sentence level of Chinese texts. The first method is based on the transformation of syntactic parser trees. Firstly, a parser based on BP neural network is designed and implemented. And then, all the syntactic parser trees are encoded. Then, secret information is embedded by modifying the trees according to the transformation rules. The second method is based on shift conversion. Firstly, a method based on Chinese mathematical expression is presented to encode Chinese texts. Then, secret information is embedded according to the shift conversion rules.
     (3) Presently, there is little work on natural language steganography on the paragraph level. This dissertation proposes a Chinese natural language watermarking method on the paragraph level. The method is based on named entity and coreference resolution. Additionally, the spread spectrum technique is introduced to encode the watermark. The experimental results show that the method is robust, and can resist some active attacks.
     (4) For the existing text mimicking methods, it is necessary for the communication parties to share the dictionary and sentence templates. Additionally, the generated texts are easy to incur suspicion. This dissertation proposes a new method of natural language steganography based on Mimic. The method needs not construct sophisticated dictionaries and sentence templates beforehand. Moreover, it can improve the efficiency and security of transmitting secret information. A tool, called MIMIC-PPT, is implemented by combining text mimicking techniques with characteristics of PPT documents.
引文
[1]中国互联网络信息中心.第21次中国互联网络发展状况统计报告. www.cnnic.cn/uploadfiles/doc/2008/1/17/104126.doc, 2007-12
    [2]中国互联网络信息中心.第1次中国互联网络发展状况统计报告. http://www.cnnic.cn/download/2003/10/13/93603.pdf, 1997-10
    [3] Kurak C, McHugh J. A Cautionary Note on Image Downgrading. In: Proc of the 8th IEEE Annual Computer Security Applications Conference. 1992, 153-159
    [4] Cox I J, Miller M L. The First 50 Years of Electronic Watermarking. Journal of Applied Signal Processing, 2002, 2:126-132
    [5] Bender W, Gruhl D, Morimoto N, et al. Techniques for Data Hiding. IBM Systems Journal, 1996, 35(3,4): 313-336
    [6] Wu M, Tang E, Liu B. Data Hiding in Digital Binary Image. In: Proc of IEEE Int Conf on Multimedia and Expo. 2000,1:393-396
    [7] Wu M, Liu B. Data Hiding in Binary Images for Authentication and Annotation. IEEE Transaction on Multimedia, 2004, 6(4): 528-538
    [8] Zhao J, Koch E. Embedding Robust Labels into Images for Copyright Protection. In: Proc of the Int Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies. Australia, 1995, 242-251
    [9] Mei Q, Wong E K, Memon N. Data Hiding in Binary Text Documents. In: Proc of SPIE Security and Watermarking of Multi. Contents III, San Jose, CA., Jan. 2001
    [10]张小华,刘芳,焦李成.一种基于外边缘的文档水印技术.系统工程与电子技术, 2003, 5 (25): 612-616
    [11]张小华,刘芳,焦李成.一种有效的文档水印技术.通信学报, 2003, 24(5): 21-28
    [12] Amamo T, Misaki D. Feature Calibration Method for Watermarking of Document Images. In: Proc of the 5th International Conference on Document Analy. and Recog.. Bangalore, India, 1999, 91-94
    [13] Lu H P, Shi X X, Shi Y Q, et al. Watermark Embedding in DC Components of DCT for Binary Images. In: Proc of Int Workshop on Multimedia Signal Processing(MMSP’02). 2002, 300-303
    [14]王慧琴,李人厚.二值文本数字水印技术的研究与仿真.系统仿真学报,2004,16(3):521-214
    [15] Villan R, Voloshynovskiy S, Deguillaume F, et al. A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents. In: Proc of 9th IFIP TC-6 TC-11 Int Conf on Communications and Multimedia Security. Salzburg, 2005, LNCS 3677: 280-281
    [16] Villan R, Voloshynovskiy S, Koval O, et al. Text Data-Hiding for Digital and Printed Documents: Theoretical and Practical Considerations. In: Proc of SPIE, International Conference on Security, Steganography, and Watermarking of Multimedia Contents VIII. 2006, 406-416
    [17] Wbstego 4.2. www.8ung.at/wbailer/wbstego/, 2006-08-29
    [18] Invisible Secret. www.invisiblesecrets.com/ , 2006-08-29
    [19] Steganos. www.steganos.com/ , 2006-08-29
    [20] Snow. www.darkside.com.au/snow/index.html ,2006-08-29
    [21] FFEncode. www.rugeley.demon.co.uk/security/ffencode.zip ,2006-08-29
    [22] Maxemchuk N F. Electronic Document Distribution. AT&T Technical Journal, 1994, 73-80
    [23] Low S H, Maxemchuk N F, Brassil J T, et al. Document Marking and Identification Using Both Line and Word Shifting. In: Proc. of Infoncom’95. Boston, MA. April 1995, 853-860
    [24] Brassil J T, Low S H, Maxemchuk N F, et al. Electronic Marking and Identification Techniques to Discourage Document Copying. IEEE Journal on Sel. Areas in Commun., 1995, 13(8):1495-1504
    [25] Maxemchuk N F, Low S H. Marking Text Documents. In: Proc of the IEEE Int Conf on Image Processing. Washington, DC, 1997, 13-16
    [26] Low S H, Maxemchuk N F, Lapone A M. Document Identification for Copyright Protection Using Centroid Detection. IEEE Trans Communications, 1998, 46(3 ): 372-383
    [27] Maxemchuk N F, Low S H. Performance Comparison of Two Text Marking Methods. IEEE Journal Selected Areas of Communications,1998,16(4):561-572
    [28] Brassil J T, Low S H, Maxemchuk N F. Copyright protection for the electronic distribution of text documents. In: Proc of the IEEE. 1999,87(7):1181-1196
    [29]黄华,齐春,李俊,朱伟芳.一种新的文本数字水印标记策略和检测方法.西安交通大学学报,2002,36(2):165-168
    [30] Adnan M A, Osama M A. Watermarking Electronic Text Documents Containing Justified Paragraphs and Irregular Line Spacing. In: Proc of the SPIE. 2004, 685-695
    [31] Aca M, Dragan R, Sasa N. Authentication of Text Documents Using Digital Watermarking. IEEE Telsiks,2005, 503-505
    [32] Osamu T, Tsutomu M, Hiroshi N, et al. 3-8 Information Hiding on Digital Documents by Adjustment of New-line Positions. Journal of the National Institute of Information and Communications Technology, 2005, 52(1,2):153-171
    [33] Osmau T, Kyoko M, Tsutomu M, et al. Method of Hiding Information in Agglutinative Language Documents Using Adjusting to New Line Position. In: Proc of IEEE IIHMSP’05. Melbourne, Australia, 2005, LNCS 3683: 1039-1048
    [34]弋英民.一种改进型行移文本数字水印方法.现代电子技术,2005,(13): 40-42
    [35]弋英民,李人厚,梅时春,等.一种基于文本行和对角侧面特性的数字水印方法.小型微型计算机系统, 2005, 26(2): 293-296
    [36] Khodami A A, Yaghmaie K. Persian Text Watermarking. In: Proc of PCM 2006. 2006, LNCS 4621: 927-934
    [37] Nopporn C. Electronic Document Data Hiding Technique using Inter-character Space. In: Proc of the 1998 IEEE Asia-Pacific Conf on Circuits and Systems. 1998, 419-422
    [38] Nopporn C. Document Image Data Hiding Technique Using Character Spacing Width sequence coding. In: Proc of Int Conf Image Processing. Japan, 1999, 250-254
    [39] Huang D, Yan H. Interword Distance Changes Represented by Sine Waves for Watermarking Text Images. IEEE Trans. on Circuits and Systems for Video Technology, 2001, 11(12):1237-1245
    [40] Huijuan Y, Alex C K. Text Document Authentication by Integrating Inter Character and Word Spaces Watermarking. In: Proc of IEEE Int Conf on Multimedia and Expo. Washington, DC: IEEE Computer Society, 2004, 955- 958
    [41]刘显德,唐国维,富宇,等.一种基于Word文档的信息隐藏方法.电子技术应用, 2005, 4: 16-17
    [42] Kim Y W, Moon K A, Oh I S. A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics. In: Proc of the 7th Int Conf on Document Analysis and Recognition. 2003, 775-779
    [43]胡晶晶,孙星明.基于单词间字符统计特征的文本数字水印.计算机工程, 2005, 31(23):116-118
    [44]胡晶晶,孙星明.一种鲁棒文本水印的算法研究.计算机工程与科学, 2006, 28(7): 57-59,90
    [45]刘豪,孙星明,刘晋飚.一种基于字体颜色的文本数字水印算法.计算机工程,2005, 31(15):129-131
    [46]吴悠,孙星明.基于正弦波的WOED文档数字水印.计算机工程, 2005, 31(24): 175-176, 209
    [47]陈芳,王冰.基于文本字体的信息隐藏算法.计算机技术与发展, 2006, 16(1): 20-22
    [48] Mansuo Z, Hong Y. A Watermarking Technique for Document Images by Words Shrinking. http://www.cs.usyd.edu.au/~vip2000/poster/zhao_water.ps, 2007-08-10
    [49]鲁芳,孙星明.一种基于汉语拼音的鲁棒性文本水印算法.计算机工程与设计, 2006,27(8):1330-1332
    [50] Amano T, Misaki D. A Feature Calibration Method for Watermarking of Document Images. In: Proc of the Fifth Int Conf on Document Analysis and Recognition. 1999, 91-94
    [51] Bhattacharjya A K, Ancin H. Data Embedding in Text for A Copier System. In: Proc of Int Conf on Image Processing. 1999, 2: 245-249
    [52]周新民,孙星明.基于汉字结构知识的鲁棒性公开文本水印.计算机工程与应用, 2006, 42(8): 165-168
    [53]袁树雄,孙星明.英文文本多重数字水印算法设计与实现.计算机工程,2006,32(15):146-148, 154
    [54] Shirali-Shahreza M H, Shirali-Shahreza M. A New Approach to Persian/Arabic Text Steganography. In: Proc of the 5th IEEE/ACIS Int Conf on Computer and Information Science. Washington, DC: IEEE Computer Society, 2006, 310-315
    [55] Sun X M, Luo G, Huang H J. Component-based Digital Watermark of Chinese Texts. In: Proc of Int Conf on Information Security. Shanghai: ACM Press, 2004, 76-81
    [56] Zhang W Y. Content-based Information Security Technique for Chinese Text. In: Proc of FSKD 2006. 2006, LNAI 4223: 650-659
    [57]弋英民,郑岗.一种利用字符特征变化的文本数字水印方法.微型电脑应用, 2005, 21(3): 36-39
    [58]董相志,柳岸,苏庆堂,等.一种大容量鲁棒性中文文本数字水印算法.计算机应用, 2007, 12(增刊): 229-231,234
    [59]刘东,孙明,周明天.一种基于人类认知模型的文本数字水印技术.哈尔滨工业大学学报, 2006, 8(增刊): 844-849
    [60]刘东,孙明,周明天.基于图论的文本数字水印技术.计算机研究与发展, 2007, 44(10): 1757-1764
    [61] Shingo I, Kyoko M, Ichiro M, et al. A Proposal on Information Hiding Methodsusing XML. In: Proc of the 6th Natural Language Pacific Rim Symposium. Tokyo, Japan, 2001, 55-62
    [62]胡岚,尤新刚.现有的超文本(HTML)信息隐藏技术分析. In:全国第三届信息隐藏学术会议论文集.西安:西安电子科技大学出版社, 2001, 62-67
    [63]沈勇.一种基于HTML文档的信息隐藏方案.武汉大学学报(自然版), 2004, 50(s1):217-220
    [64]眭新光,罗慧.一种新的基于超文本的信息隐藏方法.计算机工程, 2005, 31(12): 136-138
    [65] Sui X G, Luo H. A New Steganography Method Based on Hypertext. In: Proc of Radio Science Conference. 2004, 181-184
    [66] Mohamed L B, Sun X M. Techniques with Statistics for WebPage Watermarking. In: Proc of PWASET. Turkish, 2005, 300-303
    [67]邹昕光,孙圣和.基于RTF格式的文本脆弱水印算法.计算机工程,33(4):131-133
    [68]陈超,王朔中,张新鹏.应用Tex控制功能和图像检测的文本密写.应用科学学报, 2006, 24(2): 115-119
    [69] Lin S L. New Methods of Data Hiding in Tex Documents: [dissertation]. Taiwan: National Kaohsiung First University of Science and Technology, 2004
    [70]张静,张春田.用于PDF文档认证的数字水印算法.天津大学学报, 2003, 36(2): 215-219
    [71]廖柯宇,李炳法等.一种基于PDF文档的数字水印算法.现代计算机, 2005, 5:4-8
    [72] Zhong S P, Cheng X Q, Chen T R. Data Hiding in a Kind of PDF Texts for Secret Communication. International Journal of Network Security, 2007,4(1): 17-26
    [73]刘友继,孙星明,罗纲.一种新的基于PDF文档结构的信息隐藏算法.计算机工程, 2006, 32(17): 230-232
    [74] Gary C, David D. D. Experiments in Hiding Data inside the File Structure of Common Office Documents: A Stegonography Application. In: Proc of the Int Symposium on Information and Communication Technologies. Las Vegas, Nevada, USA, 2004, 146-151
    [75] Castiglione A, Santis A D, Soriente C. Taking Advantages of a Disadvantage: Digital Forensics and Steganography using Document Metadata. The Journal of Systems and Software, 2007 (80): 750-764
    [76] Liu T Y, Tsai W H. A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique. IEEE Transactions onInformation Forensics and Security, 2007, 2(1): 24-30
    [77] Wayner P. Mimic Functions. Cryptologia,1992, XVI:3:192-213
    [78] Wayner P. Strong Technical Steganography. Cryptologia,1995, XIX:3:285-299
    [79] Wayner P. Disappearing Cryptography: Information Hiding: Steganography & Watermarking (second edition). San Francisco: Morgan Kaufmann,2002
    [80] Chapman M, Davida G. Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text. In: Proc of Int Conf on Information and Communication Security. Beijing, 1997, LNCS 1334: 335-345
    [81] Chapman M. Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text:[dissertation]. Milwaukee: University of Wisconsin-Milwaukee, 1998
    [82] Chapman M, Davida G, Rennhard M. A Practical and Effective Approach to Larege-Scale Automated Linguistic Steganography. In: Proc of the Information Security Conference (ISC’01). 2001, 156-165
    [83] Chapman M, Davida G. Plausible Deniability Using Automated Linguistic Steganography. In: Proc of Int Conf Infrastructure Security. 2002, LNCS 2437: 276-287
    [84] Tenenbaum A J. Linguistic Steganography: Passing Covert Data using Text-based Mimicry: [dissertation]. Canada: University of Toronto, 2002
    [85] EI-Kwae E A, Cheng L. HIT: A New Approach for Hiding Multimedia Information in Text. In: Proc of Security and Watermarking of Multimedia Contents IV. San Jose, CA, 2002, SPIE 4675: 132-140
    [86]吴树峰.信息隐藏技术研究:[中国科学技术大学硕士学位论文].安徽:中国科学技术大学,2003
    [87] Wayner P. Mimicry Applet. www.wayner.org/texts/mimic/, 2007-08-20
    [88] Mckellar D. Spammimic. www.spammimic.com, 2007-08-20
    [89] Walker J. Steganosaurus. www.fourmilab.ch/stego/stego.shar.gz, 2007-08-20
    [90] Maher K. Texto. www.ecn.org/crypto/soft/texto.zip, 2007-08-20
    [91] Chapman M, Davida G. Nicetext. www.nicetext.com/, 2005-03-09
    [92] GMBH S. Sams Big Play Maker. www.scramdisk.clara.net/play/playmaker.html, 2007-08-20
    [93]周继军,杨著,钮心忻,等.文本信息隐藏检测算法研究.通信学报, 2004, 25(12): 97-101
    [94] Grothoff C, Grothoff K, Alkhutova L, et al. Translation-Based Steganography. In: Proc of Information Hiding Workshop. Barcelona, 2005, 213-233
    [95] Stutsman R, Atallah M, Grothoff C, et al. Lost in Just the Translation. In: Proc of SAC’06. Dijon, 2006
    [96] Atallah M J, Raskin V, Crogan M, et al. Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation. In: Proc of the 4th Information Hiding Workshop. Pittsburgh, 2001, 193-208
    [97] Topkara M, Topkara U, Atallah M J. Words Are Not Enough: Sentence Level Natural Language Watermarking . In: Proc of ACM Workshop on Content Protection and Security. Santa Barbara, 2006, 37-46
    [98] Murphy B. Syntactic Information Hiding in Plain Text: [dissertation]. England: Trintity College Dublin, 2001
    [99] Murphy B, Vogel C. The Syntax of Concealment: Reliable Methods for Plain Text Information Hiding. In: Proc of the SPIE Int Conf on Security, Steganography, and Watermarking of Multimedia Contents. San Jose, 2007
    [100] Murphy B, Vogel C. Statistically Constrained Shallow Text Marking: Techniques, Evaluation Paradigm, and Results. In: Proc of the SPIE Int Conf on Security, Steganography, and Watermarking of Multimedia Contents. San Jose, 2007
    [101] Gaurav G, Josef P, Wang H X. An Attack-localizing Watermarking Scheme for Natural Language Documents. In: Proc of ASIACCS’06. Taiwan, 2006, 157-165
    [102] Meral H M, Sankur B, Ozsoy S. Watermarking Tools for Turkish Texts. In: Proc of the 14th IEEE Conf on Signal Processing and Communications Applications. 2006,1-4
    [103] Meral H M, Sankur B, Ozsoy S. Syntactic Tools for Natural Language Watermarking. In: Proc of the SPIE Int Conf on Security, Steganography, and Watermarking of Multimedia Contents. San Jose, 2007
    [104]戴祖旭,洪帆,崔国华,等.基于词性标记串统计特性的文本数字水印算法.通信学报, 2007, 28(4):108-113
    [105]戴祖旭,洪帆.基于词性标记序列逆序数的文本信息隐藏算法.计算机工程与应用, 2007, 43(14):160-162
    [106] Dai Z X, Hong F. Watermarking Text Documents Based on Entropy of Part of Speech String. Journal of Information and Computational Science, 2007, 4(1): 21-25
    [107] Kankanhalli M S, Hau K F. Watermarking of Electronic Text Documents. Electronic Commerce Research, 2002, 2(1-2): 169-187
    [108] Chiang Y L, Chang L P, Hsieh W T, et al. Natural Language Watermarking Using Semantic Substitution for Chinese Text. In: Proc of IWDW 2003. Heidelberg,2004,129-140
    [109]肖湘蓉,孙星明.基于内容的英文文本数字水印算法设计与实现.计算机工程, 2005, 31(22): 175-177,181
    [110] Topkara M, Topkara U, Atallah M J. Information Hiding through Errors: A Confusing Approach. In: Proc of the SPIE Int Conf on Security, Steganography, and Watermarking of Multimedia Contents. San Jose, 2007
    [111] Steven E H. Stegparty. www.fasterlight.com/hugg/projects/stegparty.html, 2005-03-25
    [112] Atallah M J, McDonough C J, Raskin V, et al. Natural Language Processing for Information Assurance and Security: An Overview and Implementations. In: Proc of Workshop on New Paradigms in Information Security. Ireland, 2000, 51-65
    [113] Keith W. Lexical Steganography Through Adaptive Modulation of the Word Choice Hash. www.imsa.edu/~keithw/tlex, 2006-02-12
    [114] Bolshakov I A. A Method of Linguistic Steganography Based on Collocationally-Verified Synonymy. In: Proc of Int Information Hiding Workshop. Toronto, 2004, LNCS 3200: 180-191
    [115] Hiram C, Bolshakov I A. Using Selectional Preferences for Extending a Synonymous Paraphrasing Method in Steganography. www.likufanele.com/ publications/24calvobolshakov.pdf, 2007-05-20
    [116] Bolshakov I A, Gelbukh A. Synonymous Paraphrasing Using WordNet and Internet. In: Proc of NLDB. 2004, LNCS 3136: 312-323
    [117] Hiroshi N, Trstomu M, Ichiro M. Information Hiding for Text by Paraphrasing. http://www.r.dl.itc.u-tokyo.ac.jp/~nakagawa /academic-res/ finpri02.pdf
    [118] Christian D J. Fingerprinting Text in Logical Markup Languages. In: Proc of ISC’2001. 2001, LNCS 2200: 433-445
    [119] Topkara U, Topkara M, Atallah M J. The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions. In: Proc of ACM Multimedia and Security Workshop. Geneva, , 2006, 164-174
    [120]睢新光,罗慧.一种安全的基于文本的信息隐藏技术.计算机工程. 2004, 30(19): 104-106
    [121] Yan Y, Zhang Z H, Wang J M, et al. Clouds, Watermarking Natural Language Text. In: Proc of the 11th World Congress of International Fuzzy Systems Association. Beijing, 2005, 1529-1535
    [122] Keith W. Tyrannosaurus Lex. http://alumni.imsa.edu/%7Ekeithw/tlex/, 2006-08-02
    [123] Compris. TextHide. www.texthide.com/, 2006-08-02
    [124] Bergmair R. Natural Language Steganography and an AI-Complete Security Primitive. The 21st Chaos Communication Congress in Berlin, 2004
    [125] Cuneyt M T, Topkara U, Topkara M, et al. Attacks on Lexical Natural Language Steganography Systems. In: Proc of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents. San Jose, 2006
    [126] Vineeta C, Orgun C O. Exploiting Linguistic Features in Lexical Steganography: Design and Proof-of-Concept Implementation. In: Proc of the 39th Int Conf on System Science. Hawaii, 2006, 1-10
    [127]赵敏之,孙星明,向华政.基于虚词变换的自然语言信息隐藏算法研究.计算机工程与应用, 2006, 42(3): 158-160
    [128]赵敏之,孙星明,向华政.基于不完整语义理解的文本数字水印算法研究.计算机应用研究, 2006, 23(6): 118-120
    [129]徐迎晖.文本载体信息隐藏技术研究:[北京邮电大学博士学位论文].北京:北京邮电大学信息工程学院, 2006, 50-70
    [130]徐迎晖,杨榆,钮心忻,等.基于语义的文本隐藏方法.计算机系统应用, 2006,(6): 91-94
    [131] Nirenburg S, Raskin V. Ontology Semantics. Cambridge: MIT Press, 2003
    [132] Atallah M J, Raskin V, Hempelmann C, et al. Natural Language Watermarking and Tamperproofing. In: Proc of the 5th Information Hiding Workshop. Noordwijkerhout, 2002, 196-212
    [133] Vybornova O, Macq B. A Method of Text Watermarking using Presuppositions. In: Proc of the SPIE Int Conf Security, Steganography, and Watermarking of Multimedia Contents. San Jose, 2007, 1-10
    [134] Vybornova O, Macq B. Natural Language Watermarking and Robust Hashing based on Presuppositional Analysis. In: Proc of the 2007 IEEE Int Conf on Information Reuse and Integration. Las Vegas, 2007, 177-182
    [135] Bergmair R. Towards Linguistic Steganography: A System Investigation of Approaches, Systems, and Issues: [dissertation]. Derby: Univ. of Derby, 2004
    [136] Bergmair R. A Comprehensive Bibliography of Linguistic Steganography. http://semantilog.ucam.org/biblingsteg/, 2007-11-20
    [137] Bennett K. Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text. CERIAS Tech Report, 2004-13
    [138] Topkara M, Taskiran C M, Delp E J. Natural Language Watermarking. In: Proc ofthe SPIE Int Conf on Security, Steganography, and Watermarking of Multimedia Contents. San Jose, 2005, 441-452
    [139] Hoehn H. Natural Language Watermarking. www.sec.informatik.tu-darmstadt.de/ pages/lehre/SS07/semmisc/papers/hoehn.pdf, 2008-02-20
    [140]张宇,刘挺,陈毅恒,等.自然语言文本水印技术.中文信息学报, 2005, 19(6): 13-20
    [141] Petitcolas F A P, Anderson R J, Kuhn M G. Information Hiding– A Survey. In: Proc of the IEEE, 1999, 87(7): 1062-1078
    [142]王道顺,梁敬弘,戴一奇,等.图像水印系统有效性的评价框架.计算机学报, 2003, 26(7): 779-788
    [143] Simmons G J. The Prisoners’Problem and the Subliminal Channel. In: Proc of the CRYPTO’83. 1984, 51-67
    [144] David K. The History of Steganography. In: Proc of the 1st Int Workshop on Information Hiding. Cambridge, U. K., 1996, 1-5
    [145]董振东,董强.知网. www.keenage.com, 2006-08-12
    [146]梅家驹,竺一鸣,等.同义词词林.上海:上海辞书出版社, 1983
    [147] Zhang H P, Liu Q, Cheng X Q, et al. Chinese Lexical Analysis Using Hierarchical Hidden Markov Model. In: Proc of 2nd SIGHAN workshop affiliated with 41th ACL. Sapporo, 2003, 63-70.
    [148] Zhang H P, Liu T, Ma J S, et al. Chinese Word Segmentation with Multiple Postprocessors in HIT-IRLab. In: Proc of SIGHAN’05. 2005, 172-175
    [149]中科院计算所数字化研究室.概率句法分析器. http://mtgroup.ict.ac.cn/ictparser /parser_1.php, 2006-07-10
    [150]刘挺,马金山,李生.基于词汇支配度的汉语依存分析模型.软件学报, 2006, 17(9): 1876-1883
    [151]孙星明,殷建平,陈火旺,等.汉字的数学表达式研究.计算机研究与发展, 2002, 9(6): 707-711
    [152]哈尔滨工业大学信息检索研究室. LTP. http://ir.hit.edu.cn/demo/ltp/, 2008-01-12
    [153] Topkara M, Riccardi G, Dilek H T, et al. Natural Language Watermarking: Challenges in Building a Practical System. In: Proc of the SPIE Int Conf on Security, Steganography, and Watermarking of Multimedia. San Jose, 2006
    [154] Papineni K, Roukos S, Ward T, et al. BLEU: A Method for Automatic Evaluation of Machine Translation. In: Proc of 40th Annual Meeting of the ACL. Philedelphia, 2001, 311-318
    [155] Doddington G. Automatic Evaluation of Machine Translation Quality Using Ngram Co-occurrence Statistics. In: Proc of the 2nd int conf on Human Language Technology Research. San Diego, 2002, 138-145
    [156] Yang J L, Wang J M, Wang C K, et al. A Novel Scheme for Watermarking Natural Language Text. In: Proc of the 3rd Int Conf on Intelligent Information Hiding and Multimedia Signal Processing. Kaohsiung, 2007, 481-484
    [157] Zhao S Q, Liu T, Yuan X C, et al. Web Mining for Lexical Context-Specific Paraphrases. In: Proc of AIRS’2006. 2006, LNCS 4182: 673-679
    [158] Zhao S Q, Zhao L, Zhang Y, et al. HIT: Web based Scoring Method for English Lexical Substitution. In: Proc of the 4th Int Workshop on Semantic Evaluations. Prague, 2007, 173-176
    [159] Zhao S Q, Liu T, Yuan X C, et al. Automatic Acquisition of Context-Specific Lexical Paraphrases. In: Proc of IJCAI’07. 2007, 1789-1794
    [160]肖海青,刘高嵩.一种基于自然语言信息隐藏的容量提高算法.计算机工程, 2006, 32(3): 82-84
    [161] George A M, Richard B, Christiane F, et al. Introduction to WordNet: An on-line lexical database. http://www.cogsci.princeton.edu/~wn/5papers.ps, 2007-10-10
    [162]异形词. http://baike.baidu.com/view/763082.htm, 2006-03-12
    [163] PFR Corpus. www.icl.pku.edu.cn, 2006-03-12
    [164]蒙应杰,郭喜平,张文,等.一种基于句长的文本水印算法.计算机工程与应用,2007, 43(32): 52-54, 134
    [165]王玉美,阮晓钢.基于BP网络的汉语句法分析专家系统.昆明理工大学学报(理工版), 2003, 28(3): 93-96
    [166]王玉美,阮晓钢.基于改进的BP网络的语法分析系统设计.计算机应用研究, 2003, 20(11): 95-97
    [167]小规模树库. www.nlp.org.cn/docs/20030724/resource/mini-corpus/treebank- sample.txt, 2006-12-03
    [168] Aura T. Practical Invisibility in Digital Communication. In: Proc of the 1st Int Workshop on information Hiding. Cambridge, 1996, 265-278
    [169] Atallah M J, Wagstaff S S. Watermarking with Quadratic Residues. In: Proc of the SPIE Int Conf on Security, Steganography, and Watermarking of Multimedia Contents. San Jose, 1999, 283-288
    [170]刘颖.计算语言学.北京:清华大学出版社, 2002
    [171]李临定.汉语比较变换语法.北京:中国社会科学出版社, 1988
    [172] Tirkel A Z, Rankin G A, Schyndel R V. Electronic Watermark. In: Proc of DigitalImage Computing, Technology and Applications. Macquarie University, 1993, 666-673
    [173] Valery K, Guillermo M L, Moon H L. On the Existence of Perfect Stegosystems. In: Proc of IWDW’05. Siena, 2005, 30-38
    [174] Cox I J, Kilian J, Leighton T, et al. A Secure, Robust Watermark for Multimedia. In: Proc of Workshop on Information Hiding. Cambridge, 1996, 185-206
    [175] Cox I J, Kilian J, Leighton T, et al. Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans on Image Processing, 1997,6(12): 1673-1687
    [176]张晓艳,王挺,陈火旺.命名实体识别研究.计算机科学, 2005, 32(4): 44-48
    [177]王厚峰,何婷婷.汉语中人称代词的消解研究.计算机学报, 2001, 24(2): 136-143
    [178] Lang J, Qin B, Liu T, et al. Intra-document Coreference Resolution: The state of the art. Journal of Chinese Language and Computing, 2007,17(4):227-253
    [179] Salton G, Lesk M E. Computer Evaluation of Indexing and Text Processing. Journal of the ACM, 1968, 15(1): 8-36
    [180] Wu Y H, Guan X, Kankanhalli M S, et al. Robust Invisible Watermarking of Volume Data Using the 3D DCT. In: Proc of CGI’2001. Hong Kong, 2001, 359-362
    [181] Lin C H, Lee T C. A Confused Document Encrypting Scheme and Its Implementation. Computers & Security, 1998, 17(6): 543-551
    [182] Yeh W H, Hwang J J. Hiding Digital Information Using A Novel System Scheme. Computers & Security, 2001, 20(6): 533-538
    [183] Parts Of Speech. http://www.towson.edu/ows/PtsSpch.htm, 2007-08-20
    [184] The Stanford Natural Language Processing Group. Stanford Log-linear Part-Of-Speech. http://nlp.stanford.edu/software/tagger.shtml, 2007-08-20
    [185]吴明巧,金士尧.针对文本隐写工具Stego的隐写分析方法.计算机工程, 2006, 32(23): 10-12
    [186] Sui X G. Luo H, Zhu Z L. A Steganalysis Method Based on the Distribution of First Letters of Words. In: Proc of 2006 Int Conf on Intelligent Information Hiding and Multimedia Signal Processing. Pasadena, 2006, 369-372
    [187] Sui X G. Luo H, Zhu Z. A Steganalysis Method Based on the Distribution of Characters. In: Proc of IEEE Int Conf on Signal Processing. Beijing, 2006, 2599-2602

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700