基于数字水印的文本信息隐藏方法的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
进入21世纪,人们对网络逐渐从认识过渡到熟悉,互联网的使用呈爆炸性的增长。通过互联网可以实现各种信息的交流,快捷方便地获得数字信息(影视、文学作品、技术资料等)和在线服务(网银、购物等等)。但事物总是双面的,网络既给人们合法使用提供了方便,同时也使盗版变得更加轻易,因此数字作品的管理、保护不仅成为业界迫切需要解决的问题,而且司法界有效执行版权判定的要求。
     文本水印作为一种保护文本数据信息的技术,它的目的是使文本载体中隐藏的信息可以不受侵犯地保留在数据中,并可根据需要随时把水印提取和恢复出来。从而为确定对作品的侵权行为提供有力的证据。由于文本文档在空间域和频率域缺乏足够的冗余,所以在多媒体中应用的隐藏算法难以被直接引入到文本中。早期文本水印是利用字间距、行间距和字体的微小变化可以不被人眼察觉来实现的,一旦遭遇重新排版或者光学字符识别攻击,就会受到严重损坏,导致应用有限。文本作为载体有其特殊性,它属于自然语言范畴。当前基于自然语言处理实现文本信息隐藏日益成为文本水印研究的主要方向,很多研究机构为此投入大量人力物力,到现在为止涌现出大量成果,但还没有形成各方都完全认可的统一标准,这也使自然语言处理领域文本信息隐藏的研究工作极具挑战性。
     本文以中文自然语言文本为研究对象,研究了几种在词汇层、句子层进行文本信息隐藏的方法。其主要创新点如下:
     提出了一种基于连词替换的文本水印算法。根据混沌系统对初值极端敏感和连词替换后文本语义变化极其微小的特点,通过对原始水印信息进行混沌加密,对同义连词建立同义词替换表,把文本中的连词按照加密信息进行替换以实现水印嵌入,生成含水印文本。其特点是水印嵌入灵活,通过实验证明生成的含水印文本隐蔽性好,对于各种攻击有较强的鲁棒性。
     提出一种基于汉字文本中常用字的文本信息隐藏方法。根据汉字常用字在不同文本中出现的频次总体比较稳定的特点,以及“的”字的隐现规则,按照隐秘信息,通过“的”的增删来改变常用字之间字符数量的奇偶值,由此在文本中嵌入水印。其特点是适用范围广,不受文本种类的影响。经过实验证明水印容量大,隐蔽性较好。
     提出一种基于文本句子层分析的信息隐藏方法。由于文本中大量存在的与核心词紧密相关SBV(?)ADV和SBV(?)ADV(?)POB句法结构,而这种ADV结构中的副词及POB结构中的介词由于与核心词紧密相关,通常都有很强的表意作用,所以在句子中起着比较重要的作用。基于这个句法特点,采用副词同义词替换和介词同义词替换,并结合混沌加密和序列映射等多重加密方法,实现将信息嵌入到文本中的目的。通过实验与其他相近算法相比,该算法水印容量较大,有较强的鲁棒性和隐蔽性。
     提出一种基于文本关键词和汉字常用字的零水印算法。根据零水印不改变原始文本内容,以及某一文本中关键词和汉字常用字出现频次能够反映文本的重要特征,以及在第三方处进行加密及添加时间戳的机制,来实现信息隐藏和版权保护。针对实际中可能出现的对文本的微小改动所造成的排序变化,又增加了拼音排序以加强算法的鲁棒性,实验证明改进算法对各类攻击的抵御能力更强。
From the beginning of the 21st century people have been familiar to the network gradually,the uses of the internet have been in explosive growth.People could exchange variety of information and access digital information (films, literature, technical information), online services(online banking,herbmylife,and so on) easily through internet, but the pirate became also easier. So the management and protection of digital works become not only the urgent need to solve the problem,but also the request to ascertain the rights towards the illegal use of digital works.
     As a kind of technology for saving text digital information, text watermarking can protect the hiding information in text media and could be saved in datas retrievably so as to realize confirming the rights of the text and tailing the infringing behaviors to the text. Because text documents lack redundancies of the space fields and frequency fields, the hiding techniques in multimedia could not be used to generate text watermarking.The early methods of text steganography were relized by that human visual system can not recognize the minute changing of the texts physical formats, such as word space, line space and character font.Once the text is attacked by typeset or optical character recognition,the watermarking would be damaged and its applications would be limited.As a carrier text has its particularity,it belongs to the category of natural language.Now the research of text information hiding based on natural language processing become the main direction, many research institutions put a lot of manpower and resources to it.Until now a large number of results have emerged, however,a unified standard which can be accepted by all parties have not been formed.thus the research is challenging.
     The paper mainly concerned about Chinese texts watermarking,and proposes several methods for natural language steganography on word level and sentence level.The main contributions are summarized as follows:
     A method based on exchanging conjunctions is proposed. Based on the characters that the chaotic systems is sentitive to the initial values extremely and the text sematic features have tiny changes after synonyms' exchanging,the algorithm encrypt the original watermarking information through chaotic system,create the substitution table of synonym conjunctions,then replace the conjunctions in accordance with encrypted watermarking to realize hiding information. By the experiments' proof the watermarking has good invisibility and strong robustness to attacks.
     A method based on Chinese characters frequently used is proposed.Based on the steady emergence frequency of the frequently used characters, and the looming rules of 'de' word, according to the hiding information,the algorithm changes the parity value of character numbers between two frequently used words through adding or deleting'de',then the watermarking is embedded.lt has a wide range of applications and can not be effected by text types.The experiments results show that the watermarking has large capacity and better invisibility.
     A method on sentence layer is proposed.Because there are many sentence structures such as 'SBV(?)ADV' and 'SBV (?) ADV (?) POB' existing in text.The adverbs in 'ADV' structures and the prepositions in 'POB' structures have tight relations with head words of the text, they are always ideographic strongly and play a more importment role.Based on this character, combined with chaos encryption and sequence mapping,the information is embedded in the text by the synonyms'swapping of adverbs,the same as the prepositions.Combined with other similar algorithms through experiments.the algorithm has large watermarking capacity, strong robustness and good invisibility.
     A zero watermarking method is proposed that based on text key words and Chinese high frequency characters.Because the zero watermarking doesn't change the original text a little,while the key words and Chinese frequently used characters can reflect the importment features of the text,the algorithm realize the information hiding and copyrights reservation through encryption and adding time stamp by the third certification authority. For enhancing the robustness the algorithm add phonetic sequencing to reduce the effects of changing sequence by modifying the text. The method has a better ability to resist many kinds of attacks.
引文
[1]中国互联网络信息中心.第27次中国互联网络发展状况统计报告http://www.cnnic.net.cn/dtygg/dtgg /201101/t20110118_20250.html 2011-1
    [2]安华山,宗文君.应用水印技术提高产品的防伪手段.天津造纸.2003(4).29-30.
    [3]Walker. "Personal Communication" Muzak Corporation, June.2001
    [4]TirkelA. Z., RankinGA., R. M. vanSchyndel, HOW. J, MeeN. R. A., OsborneC. F. "Eleetronic Water Mark. " DICTA-93. Macquarie University, Sydney. Decmeber 1993, PP.666-672.
    [5]The Oxford English Dictionary (corrected reissue). Oxford, U.K.:Clarendon,1933.
    [6]白剑,杨榆,徐迎晖等.基于文本的信息隐藏算法[J].计算机系统应用,2005,4:32-35.
    [7]孙圣和,陆哲明,牛夏牧等.数字水印技术及应用.第一版.北京:科学出版社,2004
    [8]王炳锡,陈琦,邓峰森.数字水印技术.第一版.西安:西安电子科技大学出版社,2003
    [9]江铭炎,许国平,黄春华.基于复小波变换和人类视觉模型的数字水印算法.山东大学学报.2005(2):32-35
    [10]A. Werner, J. Oomen, M E. Groenewegen, R. G. van der Waal, and R. N. Veldhuis, "A variable-bit-rate buried-data channel for compact disc," J. Audio Eng. Soc., vol.43, no.1/2, pp.23-28, Jan./Feb.1995.
    [11]D. Kahn, The Codebreakers—The Story of Secret Writing. New York:Scribner,1996.
    [12]PanRong GaoYouxing. Anewwaveletwatennarkingtechnique. Proeeedingsof 4th World Congress Intelligent Controland Automation,2002, vol.3:2065-2069
    [13]庞晓红.图像数字水印理论与技术研究.哈尔滨工程大学博士学位论文,2006.4
    [14]K. Su, D. Kundur, andD. Hatzinakos.Statistieal invisibility for Collusion resistant digital video watermarking. IEEE Trans. Multimedia, Feb.2005,7(1):52-54
    [15]HuangD, YanH. Interword distance changed represented by sinewaves for Watermarking text images. IEEE Transaction Circuits and System for Video Technology,2001,11 (12):1237 - 124
    [16]Wbstego4.2. www.8ung.at/wbailer/Wbstego/,2009-09-02
    [17]Atallah M J, RaskinV, CroganMetal. Natural language watermarking:Design, Analysis and Proof-of-Concept implementation. In:Proc of the 4th Information Hiding Workshop. pittsburgh,2001,193- 208
    [18]戴祖旭,洪帆,崔国华,等.基于词性标记串统计特性的文本数字水印算法.通信学报,2007,28(4):108-113
    [19]Keith W. Lexical steganography through adaptive modulation of the word choice hash. WWW.imsa.edu/keithw/tlex,2009-05-10
    [20]Bolshakov I A. A method of linguistic steganography based on Collocationally-verified synonymy. In:Proc of Int Information Hiding Workshop. Toronto,2004,180 - 191
    [21]Aiallah M J, MeDonoughCJ, RaskinV, Natural language Processing for Information assurance and security An overview and implementations. In:Proc of Workshop on New Paradigms in Information Security. Ireland, 2000,51-65
    [22]Brassil JT, Low S, Maxemchuk NF, et al.1995.Electronic marking and identification techniques to discourage document copying [J]. IEEE Journal on Selected Areas in Communications,13(8):1495-1504.
    [23]赵铁军.机器翻译原理[M].哈尔滨工业大学出版社,2001.
    [24]Atallah MJ, McDonough CJ, Raskin V, et al.2001 Natural language processing for information assurance and security:An overview and implementations[C].//Proceedings of the 2000 workshop on New security paradigms:51-65.
    [25]沃兴化.中国书法史[M].上海:上海古籍出版社,2011.11-13
    [26]高明.中国古文字学通论[M].北京:北京大学出版社,1996.32-41
    [27]刘开瑛.中文文本自动分词和标注.北京:商务印书馆.2000:56-95
    [28]Bender W, Gruhl D, Morimoto N, et al.1996. Techniques for data hiding [J]. IBM systems journal, 35 (3&4):313-336.
    [29]孙圣和,陆哲明,牛夏牧.数字水印技术及应用[M].北京:科学出版社,2004,1—385,536—575
    [30]温泉,孙铰锋,王树勋.零水印的概念与应用.电子学报,2003,31(2):214-216
    [31]S. Craver, B-L. Yeo, M. Yeung. Technical Trial and Legal Tribulations. Communications of the ACM,1998,41(7):45-54
    [32]C. I. Podilchuk, W. Zeng. Image-adaptive Watermarking Using Visual Models. IEEE Communication,1998,16(4):525-539
    [33]J. F. Delaigle, C. D. Vleeschouwer, B. Macq. Watermarking Algorithm Based on a Human Visual Model. Signal Processing,1998,66(3):319-335
    [34]DING Wei, YAN Weiqi, Qi Dongxu. Digital image scramlbling teehnology based on Anlold transformation [J]Journal of Computer Aided Design&Computer Graphies,2001,13(4):338-341(in Chinese)
    [35]唐振军,路兴,魏为民,王朔中.基于位交换的图像置乱[J].光电子·激光,2007,12:1486-1488,1495
    [36]R A J Matthews. On the derivation of a chaotic encryption algorithm[J]. Cryptologia,1989,4:29-42
    [37]纪震,李慧慧,肖薇薇等.给予混沌序列的数字水印信号研究[J1.电子学报,2004,32(7):1131-1134
    [38]张雪峰,罗祖军,高川.基于混沌序列的数字图像加密算法[J].计算机工程与应用,2006,19:61-62
    [39]孟君.文档图像压缩的RLC实现.贵州工业大学学报(自然科学版),2002年:第31卷(4):105.
    [40]韩俊英等Huffman算法的分析与改进.兰州铁道学院(自然科学版),2003年22(3):120-121.
    [41]王丽娜,郭迟,李鹏.信息隐藏技术实验教程.武汉:武汉大学出版社,2004:48-50
    [42]吴华.汉语自然语言生成的理论、方法的研究及系统实现[D].北京:中国科学院自动化研究所,2001,6:5-15.
    [43]Victor H A Yngve. Random Generation of English Sentences[DB]. London:In The conference on MachineTranslation of Languages Languages and Applied Language Analysis,Her Majesty'Stationery Office,1962:99-110.
    [44]Terry Winorgrad. Understanding Natural Language[DB]. New York:Academic Press,1972:70-80.
    [45]王常亮,滕至阳.语句相似度计算在FAQ中的应用[J].计算机时代,2006,(2):24-26.
    [46]赵妍妍,秦彬,刘挺,等.基于多特征融合的句子相似度算[C]//全国第八届计算语言学联合学术会议(JSCL-2005)论文集.北京:清华大学出版社,2005.
    [47]王慧琴,李人厚.二值文本数字水印技术的研究与仿真.系统仿真学报,2004,16(3):521-214
    [48]戴祖旭,洪帆,崔国华,等.基于词性标记串统计特性的文本数字水印算法[J].通信学报,2007,28(4):108-113.
    [49]辛友强,刘东苏.一种基于汉字特征和语义的文本数字水印算法[J].计算机应用,2007,27(S2):134-135.
    [50]赵敏之,孙星明,向华政,等.基于不完整语义理解的文本数字水印算法研究[J].计算机应用研究,2006,23(4):118-120
    [51]谢锐.数据库水印技术的研究[D].广州:广东工业大学,2006
    [52]RakeshAgrawal, JeKieman, watermarking Relational Databases[c]. proeeeding of the 28th VLDB Conferenee, HongKong, China 2002:155 - 166
    [53]吴荣,曹加恒,黄敏,曾承.关系数据库的数字水印新技术[J].武汉大学学报(理学版)2005,51(5):611-615
    [54]周利军,周源华.基于直接序列扩频码的图像空间域水印技术[J],软件学报,2002,13(2):298-303
    [55]J H Lee. Fingerprinting in Information Hiding Techniques for Steganography and Digital Watermarking. In:Crypto'99. Proceedings of Crypto'99. Norwood:Artech House,1999.175-190
    [56]Alon N, Spencer J. The Probabilistic Method. First edition. New York:John Wiley&Sons, Inc,1992.234 -240.
    [57]陈晓苏,朱大立.一种基于随机序列的数字指纹编码和跟踪算法.小型微型计算机系统2007,28(5):823-825
    [58]张洁勇,刘守义,数字指纹技术的攻击方法概述,计算机与信息技术,2008(12)24:69-71
    [59]StoneH. Analysis of Attacks on Image Watermarks with Randomized CoeffiCients. TechRep of NEC Researeh Institute,1996,10(16):202-216
    [60]同济大学应用数学系.线性代数.第四版.北京:高等教育出版社,2003,113-118
    [61]岳殿武.分组编码学.西安:西安电子科技大学出版社,2007,15-16
    [62]卢开澄.组合数学.第二版.北京:清华大学出版社,1991,251-259
    [63]丁仲昌.抗共谋攻击数字指纹系统的研究:[南京理工大学硕士学位论文].南京:南京理工大学,2009,13-14
    [64]丁仲昌.抗共谋攻击数字指纹系统的研究:[硕士学位论文].南京:南京理工大学.2008
    [65]孙圣和,陆哲明,牛夏牧等.数字水印技术及应用.北京:科学出版社,2004,75-109
    [66]Tirkel AZ, Rankin GA, Van RM, etal. Eleetronic Watermark. Digital Image Computing Techniques and applications,1993,16(5):666-67
    [67]高耀文,郭军海,钱卫平.一种基于Logistic映射的数据加密算法[J].系统工程与电子技术,2004(8).
    [68]M.Naor, A. Shamir. Visual cryptography. Advances in Cryptology-Proceedings of Eurocypto 94, Lecture Notes in Computer SCience, Springer-Verlag, New York,1995,950:1 - 12.
    [69]刘坚等.近代汉语虚词研究[M].北京:语文出版社,1992.[7]
    [70]赵玉霞,康宝生基于混沌系统与提升小波的彩色图像盲水印算法,计算机应用研究.2010.1
    [71]杨秀丽,王陆唐,黄肇明.混沌通信技术概述[J].微机算计信息,2004,20(12):120-122.
    [72]Yang J L, Wang J M, Wang C K, et al.A Novel Scheme for Watermarking Natural Language Text. In:Proc of the 3rdInt Conf on Intelligent Information Hiding andMultimedia Signal Processing. Kaohsiung,2007,481 -484
    [73]睢新光,罗慧.一种安全的基于文本的信息隐藏技术,计算机工程.2004,30(19):104-106
    [74]Chiang Y L, Chang L P, Hsieh W T, et al. Natural Language Watermarking Using Semantic Substitution for Chinese Text. In:Proc of IWDW 2003. Heidelberg,2004,129-140
    [75]Meral H M, Sankur B, Ozsoy S. Syntactic Tools for Natural LanguageWatermarking. In:Proc of the SPIE Int Conf on Security, Steganography, and Watermarking of Multimedia Contents. San Jose,2007
    [76]Atallah M J, Raskin V, Crogan M, et al. Natural Language Watermarking:Design, Analysis, and a Proof-of-Concept Implementation. In:Proc of the 4th InformationHiding Workshop. Pittsburgh, 2001,20(2):193-208
    [77]《现代汉语常用字表》 国家语言文字工作委员会,国家教育委员会1988,1
    [78]Topkara M, Topkara U, Atallah M J. Words Are Not Enough:Sentence Level Natural Language Watermarking. In:Proc of ACM Workshop on ContentProtection and Security. Santa Barbara,2006,12(3):37-46
    [79]The Stanford Natural Language Processing Group. Stanford Log-linear Part-Of-Speech. http://nlp. Stanford.edu/software/tagger.shtml,2007,08-20
    [80]陈永红.基于混沌系统的数字水印技术[J].重庆师范大学学报(自然科学版)2004,3(21):11-13
    [81]王利峰.现代汉语双音形容词定语后“的”字隐现的定量研究[D].南京师范大学硕士学位论文,2006
    [82]蒙应杰,吴超,张文,张秀娟.关系数据库零水印注册方案研究.计算机工程,2007,33(2):133-135
    [83]F Apap, A Honig, S Hershkop, E Eskin, S Stolfo. Detecting malicious software by monitoring anomalous windows registry accesses[C]//. Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection(RAID 2002),2002
    [84]王晓龙,严承华.基于汉字使用频率的文本零水印算法,计算机应用.2009.9
    [85]王晓龙,关毅等.计算机自然语言处理.北京:清华大学出版社.2005
    [86]辛友强,刘东苏.一种基于汉字特征和语义的文本数字水印算[J].计算机应用,2007,27(Z2):134-135
    [87]GUPTA G, PIEPRZYK J, WANGH X. An attack-localizingwater- marking scheme for natural language documents[C]//ASIACCS 06:Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security. New York:ACM Press,2006:157-165
    [88]ATALLAH. M J, MCDONOUGH C J, RASKIN V. Natural language processing for information assurance and security:An overview andimplementations [C]//Proceedings of the 2000Workshop on New Security Paradigms. New York:ACM Press,2000:51-65
    [89]潘西明,赵红洲,刘良文.零水印算法在工程图中的应用实现[J].微计算机信息,2007,22(30):310-312
    [90]王晓龙,严承华.基于汉字使用频率的文本零水印算法[J].计算机应用,2009,29(9):2366-2368
    [91]朱月秀,用于内容防篡改的文本零水印算法[J],漳州师范学院学报.2010.3
    [92]余振山,自然语言文本中数字水印的设计与研究:[博士学位论文].合肥:中国科技大学,2008
    [93]老舍,老舍全集,三联出版社,2004
    [94]R. Gallager, K. F. Hau. Information theory and reliable communication. Journal of Computer Science and Technology.2006,4(3):102-115
    [95]AtallahMJ, RaskinV, CroganM, etal. Naturallanguagewatermarking:design, analysis, and a Proof ofeonce Ptim Plemeniation. hi:InformationHiding2001. Pittsburgh, PA, USA,2001,185 - 199
    [96]吴树峰.信息隐藏技术研究:[中国科学技术大学硕士学位论文].安徽:中国科学技术大学,2003
    [97]朱岩,杨永田.合谋安全的卷积指纹信息码.软件学报,2006,17(7):1617-1626
    [98]邢福义,《语言学概论》.华中师大出版社2006,P103-145
    [99]Richard P Lippmann. The 1999 DARPA off-line intrusion detection evaluation[J]. Computer Networks (S1389~1286),2000,34 (4):579-59
    [100]Miehael Collins. A New Statistical Parser Based on Bigram Lexieal Dependeneies. In:proeeedings of 34th AeL.1996
    [101]Lueien Tesniere. Elements de syntaxe structurale. Books.1959
    [102]Robinson, J. J. Dependency structures and transformational rules. Language 46. pages 259-285.1970
    [103]姜传贤,陈孝威.基于文本重要内容的鲁棒水印算法.自动化学报.2010.9
    [104]马金山.基于统计方法的汉语依存句法分析研究[D].博士毕业论文,哈尔滨工业大学,2007
    [105]David M. Magerman. Natural language parsing as statistical pattern recognition[D]. Ph.D. thesis,Stanford University.1994
    [106]党政法,周强.短语树到依存树的自动转换研究[J].中文信息学报,2005(3):21-27
    [107]Juang, B·H. AndRabiner, L. R. (1991). Hidden Markov models for speech recognition. Technometrics 33:251-272
    [108]赵力,邹采荣,吴镇扬,HMM在说话人识别中的应用,电路与系统学报,2001,9(6):178-182
    [109]W. Gale and K. Church. A program for aligning sentences in bilingual corpora. Proceedings of the annual Conference of the association for computational Linguistics, pages 177-184,1991
    [110]LiuTing,Ma Jinshan, Li Sheng. Building a dependency treebank for improving Chinese parser. Journal of Chinese Language and Computing,2006,16(4):207-224
    [111]Wu ge,Li guiying Semi-fragile Watermarking Resisting Geometrical Attacks Based on EBCOT (ICCASM2010) 2010.10
    [112]张谊生,《现代汉语副词研究》2000,学林出版社
    [113]明琴。试论现代汉语范围副词的分类及语义指向[M].硕士毕业论文,四川师范大学,2007
    [114]崔程恩,现代汉语情态副词研究[D].[博士毕业论文].北京:中国社会科学院研究生院.2002
    [115]李临定.汉语比较变换语法.北京:中国社会科学出版社,1988
    [116]孙星明,殷建平,陈火旺,等.汉字的数学表达式研究.计算机研究与发展,2002,9(6):707-711
    [117]刘玉玲.自然语言信息隐藏研究[D].博士毕业论文.湖南大学.2008
    [118]Gupta G, Pieprzyk J, Wang H X. An attack-localizingwatermarking scheme for natural language documents [C]//Proceedings of the ACM Symposium on Information, Computer and Communications Security, Taipei,2006: 157 - 165
    [119]T.Y. Li, J.A. Yorke. Period Three Implies Chaos. American Mathematical Monthly,1975,82:985-992
    [120]曹建福,韩崇昭,方洋旺.非线性系统理论及应用.西安,西安交通大学出版社.2001
    [121]纪飚,陆估人.“一种新的混沌同步及保密通信方式”.通信学报,1998,19(9):47-53
    [122]T. L. Carroll and L.M. Pecora, "Cascading synchronized chaotic systems. "Physica D, vol.67, pp.126-140,1993
    [123]Y. H. Yu, K. Kwak, and T. K. Lim, "Secure communication using small time continuous feedback. "Physics Letters A, vol.197, pp.311-316,1995
    [124]关治洪,王笋.基于Chen'S混沌系统的新的自适应水印[J].信息安全与通信保密,2004(6):26-28
    [125]刘东.新型文本数字水印技术及其典型应用研究[D].博士毕业论文.成都:电子科技大学.2007
    [126]孙燕飞,王凤英,周运明,贾永新.基于双混沌系统的数字水印技术[J].微电子学与计算机,2005,22(8):114-116
    [127]Cox I J, Miller M L.The First 50 Years of Electronic Watermarking. Journal of Applied Signal Processing,2002,2:126-132
    [128]Frank Hariung and Bernd Girod. Watermarking of uncompressed and compressed video Signal Processing, May1998, vol.66, no.3:283-301
    [129]梁华庆,王磊,双凯,杨义先.一种在原始视频帧中嵌入的鲁棒的数字水印.电子与信息学报,2003,25(9):1250-1254
    [130]吕述望,王彦,刘振华.数字指纹综述[J].中国科学院研究生院学报,加04,21(3):289-298
    [131]Pitas1. A Method for Watermark Casting on Digital Images. In:IEEE International Conference on Image Processing 1996. Lausanne:IEEE,1998,775-780
    [132]Pitas1. A Method for Watermark Casting on Digital Images. In:IEEE International Conference on Image Processing 1996. Lausanne:IEEE,1998,775-780
    [133]Furedi2. On r-Cover-free Families. Journal of Combinatorial Theory Series A,1996,73(1):172-173
    [134]PFR Corpus. www.icl.pku.edu.cn,2006-03-12
    [135]马华.一种基于线性同余算法的伪随机数产生器[J].纯粹数学与应用数学,2005,21(3):206-209.
    [136]戴祖旭.基于LFSR的随机整数发生器设计.学术研究.2008,4(2):576-579
    [137]M. Costa. WdtingonDirtyPaPer[J]. IEEETransactionsInformTheory,1983,29(3):439-441
    [138]A.Cohen, A. LaPidoth. Generalized Writing on Dirty Paper[A]. In:Proeeedings of the Intemational. Symposium on Information Theory(ISIT)[C], Lausanne, Switzerland, June2002:227.
    [139]RMoulin, J. A. Sullivan. information theoretic analysis of information hiding[J]. IEEE Transactions on Information Theory,2003,49(3):563-593.
    [140]A. Somekh-Barueh, N. Merhav. On the capacity game of Public watermarking system. IEEE Transactions Information Theory,2004,50(3):511-524
    [141]徐迎晖,杨榆,钮心忻,等.基于语义的文本隐藏方法.计算机系统应用,2006,6:91-94
    [142]赵敏之,孙星明,向华政.基于虚词变换的自然语言信息隐藏算法研究.计算机工程与应用,2006,42(3):158-160
    [143]Gupta G, Pieprzyk J, Wang H X. An attack-localizing watermarking scheme for natural language documents. In Proceedings of the ACM Symposium on Information, Computer and Communications Security. Taipei, China:ACM,2006.157-165
    [144]鲁芳,孙星明.基于汉语拼音的鲁棒性文本水印算法.计算机工程与设计.2006,1:35-38
    [145]赵理,崔杜武.基于汉字拼音声调的文本水印算法.计算机工程.2009,5:142-144
    [146]肖尚勤.鲁棒数字水印算法研究:[博士毕业论文].武汉:华中科技大学2009
    [147]Lang J,Qin B,Liu T,et al.Intra-document Coreference Resolution:The state ofthe art.Journal of Chinese Language and Computing,2007,17(4):227-253
    [148]Salton G, Lesk M E. Computer Evaluation of Indexing and Text Processing. Journal of the ACM,1968,15(1):8-36
    [149]Wu Y H, Guan X, Kankanhalli M S, et al. Robust Invisible Watermarking ofVolume Data Using the 3D DCT. In:Proc of CGI' 2001. Hong Kong,2001,359-362
    [150]Lin C H, Lee T C. A Confused Document Encrypting Scheme and It Implementation. Computers & Security, 1998,17(6):543-551
    [151]Yeh W H, Hwang J J. Hiding Digital Information Using A Novel System Scheme. Computers & Security,2001,20(6):533-538
    [152]Parts Of Speech. http://www.towson.edu/ows/PtsSpch.htm,2007-08-20
    [153]The Stanford Natural Language Processing Group. Stanford Log-linear Part-Of-Speech. http://nlp.stanford.edu/software/tagger.shtml,2007-08-20
    [154]吴明巧,金士尧.针对文本隐写工具Stego的隐写分析方法.计算机工程,2006,32(23):10-12
    [155]肖海青,刘高嵩.一种基于自然语言信息隐藏的容量提高算法.计算机工程,2006,32(3):82-84
    [156]George A M, Richard B, Christiane F, et al. Introduction to WordNet:An on-line lexical database. http://www.cogsci.princeton.edu/~wn/5papers, ps,2007-10-10
    [157]异形词http://baike.baidu.com/view/763082.htm,2006-03-12
    [158]PFR Corpus. www.icl.pku.edu.cn,2006-03-12
    [159]蒙应杰,郭喜平,张文,等.一种基于句长的文本水印算法.计算机工程与应用,2007,43(32):52-54
    [160]王玉美,阮晓钢.基于BP网络的汉语句法分析专家系统.昆明理工大学学报(理工版),2003,28(3):93-96
    [161]王玉美,阮晓钢.基于改进的BP网络的语法分析系统设计.计算机应用研究,2003,20(11):95-97
    [162]王道顺,梁敬弘,戴一奇,等.图像水印系统有效性的评价框架.计算机学报,2003,26(7):779-788
    [163]Simmons G J. The Prisoners'Problem and the Subliminal Channel. In:Proc of the CRYPTO'83.1984,51-67
    [164]刘宝艳,林鸿飞,赵晶.基于改进编辑距离和依存文法的汉语句子相似度计算.计算机应用与软件,2008,25(7):33-34
    [165]苑春法,基于语义知识的汉语句法结构排歧.中文信息学报,1998,(13):1-8
    [166]孙宏林.浅层句法分析方法概述.当代语言学,2000,2(2):74-83
    [167]赵铁军等.一种生成复杂特征集句法树的汉语句法分析方法与系统实现[J].中文信息学报,1992;6(4):11-23
    [168]哈尔滨工业大学信息检索研究室LTP. http://ir.hit.edu.cn/demo/ltp/,2008-01-12
    [169]Murphy B, Vogel C. The Syntax of Concealment:Reliable Methods for Plain TextInformation Hiding. In:Proc of the SPIE Int Conf on Security, Steganography, and Watermarking of Multimedia Contents. San Jose,2007
    [170]Vybornova O, Macq B.A Method of Text Watermarking using Presuppositions. In:Proc of the SPIE Int Conf Security, Steganography, and Watermarking of Multimedia Contents. San Jose,2007,1-10
    [171]Cuneyt M T, Topkara U, Topkara M, et al. Attacks on Lexical Natural Language Steganography Systems.In:Proc of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents. San Jose,2006

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700