Natural language processing for information assurance and security: an overview and implementations
Proceedings of the 2000 workshop on New security paradigms
Watermarking of Electronic Text Documents
Electronic Commerce Research
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Natural Language Watermarking and Tamperproofing
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
An information-theoretic model for steganography
Information and Computation
Dependency Parsing with an Extended Finite-State Approach
Computational Linguistics
Proceedings of the 2006 ACM symposium on Applied computing
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Words are not enough: sentence level natural language watermarking
Proceedings of the 4th ACM international workshop on Contents protection and security
SenseLearner: word sense disambiguation for all words in unrestricted text
ACLdemo '05 Proceedings of the ACL 2005 on Interactive poster and demonstration sessions
ICCPOL'06 Proceedings of the 21st international conference on Computer Processing of Oriental Languages: beyond the orient: the research challenges ahead
A method of linguistic steganography based on collocationally-verified synonymy
IH'04 Proceedings of the 6th international conference on Information Hiding
A natural language watermarking based on chinese syntax
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part III
Translation-based steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
Adaptive-capacity and robust natural language watermarking for agglutinative languages
Security and Communication Networks
Text split-based steganography in OOXML format documents for covert communication
Security and Communication Networks
Hi-index | 0.00 |
We develop a morphosyntax-based natural language watermarking scheme. In this scheme, a text is first transformed into a syntactic tree diagram where the hierarchies and the functional dependencies are made explicit. The watermarking software then operates on the sentences in syntax tree format and executes binary changes under control of Wordnet and Dictionary to avoid semantic drops. A certain level of security is provided via key-controlled randomization of morphosyntactic tools and the insertion of void watermark. The security aspects and payload aspects are evaluated statistically while the imperceptibility is measured using edit-hit counts based on human judgments. It is observed that agglutinative languages are somewhat more amenable to morphosyntax-based natural language watermarking and the free word order property of a language, like Turkish, is an extra bonus.