The subworld concept lexicon and the lexicon management system
Computational Linguistics - Special issue of the lexicon
Cryptologia
Natural language processing for information assurance and security: an overview and implementations
Proceedings of the 2000 workshop on New security paradigms
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Proceedings of the Second International Workshop on Information Hiding
Proceedings of the Second International Workshop on Information Hiding
Proceedings of the Third International Workshop on Information Hiding
IH '99 Proceedings of the Third International Workshop on Information Hiding
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography and Watermarking - Attacks and Countermeasures
Ontology in information security: a useful theoretical foundation and methodological tool
Proceedings of the 2001 workshop on New security paradigms
Natural Language Watermarking and Tamperproofing
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Rights protection for relational data
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Authentication of LZ-77 compressed data
Proceedings of the 2003 ACM symposium on Applied computing
COLING-Roadmap '02 Proceedings of the 2002 COLING workshop: A roadmap for computational linguistics - Volume 13
An attack-localizing watermarking scheme for natural language documents
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Words are not enough: sentence level natural language watermarking
Proceedings of the 4th ACM international workshop on Contents protection and security
Natural language watermarking via morphosyntactic alterations
Computer Speech and Language
Authorship Proof for Textual Document
Information Hiding
Text watermarking by syntactic analysis
ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Translation-based steganography
Journal of Computer Security - Best papers of the Sec Track at the 2006 ACM Symposium
A reversible information hiding scheme using left-right and up-down chinese character representation
Journal of Systems and Software
Semantic forensics: an application of ontological semantics to information assurance
TextMean '04 Proceedings of the 2nd Workshop on Text Meaning and Interpretation
A Novel Application for Text Watermarking in Digital Reading
AICI '09 Proceedings of the International Conference on Artificial Intelligence and Computational Intelligence
Content-aware steganography: about lazy prisoners and narrow-minded wardens
IH'06 Proceedings of the 8th international conference on Information hiding
Watermarking techniques for electronic circuit design
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
The dining freemasons: security protocols for secret societies
Proceedings of the 13th international conference on Security protocols
Comprehensive linguistic steganography survey
International Journal of Information and Computer Security
Linguistic steganography using automatically generated paraphrases
HLT '10 Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics
Practical linguistic steganography using contextual synonym substitution and vertex colour coding
EMNLP '10 Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing
Ontological semantic technology for detecting insider threat and social engineering
Proceedings of the 2010 workshop on New security paradigms
Headstega: e-mail-headers-based steganography methodology
International Journal of Electronic Security and Digital Forensics
Baseline Semantic Spam Filtering
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03
Edustega: an Education-Centric Steganography methodology
International Journal of Security and Networks
A method of linguistic steganography based on collocationally-verified synonymy
IH'04 Proceedings of the 6th international conference on Information Hiding
A natural language watermarking based on chinese syntax
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part III
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
UniSpaCh: A text-based data hiding method using Unicode space characters
Journal of Systems and Software
Adaptive-capacity and robust natural language watermarking for agglutinative languages
Security and Communication Networks
Natural language watermarking for german texts
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |
We describe a scheme for watermarking natural language text by embedding small portions of the watermark bit string in the syntactic structure of a number of selected sentences in the text, with both the selection and embedding keyed (via quadratic residue) to a large prime number. Meaning-preserving transformations of sentences of the text (e.g., translation to another natural language) cannot damage the watermark. Meaning-modifying transformations have a probability, of damaging the watermark, proportional to the watermark length over the number of sentences. Having the key is all that is required for reading the watermark. The approach is best suited for longish meaning-rather than style-oriented "expository" texts (e.g., reports, directives, manuals, etc.), of which governments and industry produce in abundance and which need protection more frequently than fiction or poetry, which are not so tolerant of the small meaning-preserving syntactic changes that the scheme implements.