Cryptologia
Natural language processing for information assurance and security: an overview and implementations
Proceedings of the 2000 workshop on New security paradigms
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Stretching the Limits of Steganography
Proceedings of the First International Workshop on Information Hiding
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Proving Ownership over Categorical Data
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
A hierarchical protocol for increasing the stealthiness of steganographic methods
Proceedings of the 2004 workshop on Multimedia and security
Rights Protection for Relational Data
IEEE Transactions on Knowledge and Data Engineering
Component-based digital watermarking of Chinese texts
InfoSecu '04 Proceedings of the 3rd international conference on Information security
COLING-Roadmap '02 Proceedings of the 2002 COLING workshop: A roadmap for computational linguistics - Volume 13
Proceedings of the 2006 ACM symposium on Applied computing
A robust watermarking system based on SVD compression
Proceedings of the 2006 ACM symposium on Applied computing
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Recognition in software watermarking
Proceedings of the 4th ACM international workshop on Contents protection and security
Words are not enough: sentence level natural language watermarking
Proceedings of the 4th ACM international workshop on Contents protection and security
Query-based watermarking for XML data
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Resilient rights protection for sensor streams
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Watermarking Relational Databases Using Optimization-Based Techniques
IEEE Transactions on Knowledge and Data Engineering
Natural language watermarking via morphosyntactic alterations
Computer Speech and Language
Authorship Proof for Textual Document
Information Hiding
Chinese text watermarking based on occlusive components
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Translation-based steganography
Journal of Computer Security - Best papers of the Sec Track at the 2006 ACM Symposium
A new watermark approach for protection of databases
AIC'09 Proceedings of the 9th WSEAS international conference on Applied informatics and communications
Semantic forensics: an application of ontological semantics to information assurance
TextMean '04 Proceedings of the 2nd Workshop on Text Meaning and Interpretation
Content-aware steganography: about lazy prisoners and narrow-minded wardens
IH'06 Proceedings of the 8th international conference on Information hiding
A fractal watermark solution for product data
CSCWD'06 Proceedings of the 10th international conference on Computer supported cooperative work in design III
Comprehensive linguistic steganography survey
International Journal of Information and Computer Security
Linguistic steganography using automatically generated paraphrases
HLT '10 Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics
Practical linguistic steganography using contextual synonym substitution and vertex colour coding
EMNLP '10 Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing
Ontological semantic technology for detecting insider threat and social engineering
Proceedings of the 2010 workshop on New security paradigms
A novel watermark technique for relational databases
AICI'10 Proceedings of the 2010 international conference on Artificial intelligence and computational intelligence: Part II
Headstega: e-mail-headers-based steganography methodology
International Journal of Electronic Security and Digital Forensics
Baseline Semantic Spam Filtering
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03
A blind reversible method for watermarking relational databases based on a time-stamping protocol
Expert Systems with Applications: An International Journal
Edustega: an Education-Centric Steganography methodology
International Journal of Security and Networks
Rights protection for data cubes
ISC'06 Proceedings of the 9th international conference on Information Security
Content-Based information security technique for chinese text
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
Solvability of a system of bivariate polynomial equations over a finite field
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
A method of linguistic steganography based on collocationally-verified synonymy
IH'04 Proceedings of the 6th international conference on Information Hiding
A natural language watermarking based on chinese syntax
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part III
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Translation-based steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
UniSpaCh: A text-based data hiding method using Unicode space characters
Journal of Systems and Software
Adaptive-capacity and robust natural language watermarking for agglutinative languages
Security and Communication Networks
Copyright for web content using invisible text watermarking
Computers in Human Behavior
Content-Based Web Watermarking
International Journal of Knowledge Society Research
Hi-index | 0.00 |
Two main results in the area of information hiding in natural language text are presented. A semantically-based scheme dramatically improves the information-hiding capacity of any text through two techniques: (i) modifying the granularity of meaning of individual sentences, whereas our own previous scheme kept the granularity fixed, and (ii) halving the number of sentences affected by the watermark. No longer a "long text, short watermark" approach, it now makes it possible to watermark short texts, like wire agency reports. Using both the above-mentioned semantic marking scheme and our previous syntactically-based method hides information in a way that reveals any non-trivial tampering with the text (while re-formatting is not considered to be tampering--the problem would be solved trivially otherwise by hiding a hash of the text) with a probability 1-2-脽 (n+1), n being its number of sentences and 脽 a small positive integer based on the extent of co-referencing.