Natural Language Watermarking and Tamperproofing
Two main results in the area of information hiding in natural language text are presented. A semantically-based scheme dramatically improves the information-hiding capacity of any text through two tech- niques: (i) modifying the granularity of meaning of individual sentences, whereas our own previou...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 212 |
---|---|
container_issue | |
container_start_page | 196 |
container_title | |
container_volume | |
creator | Atallah, Mikhail J. Raskin, Victor Hempelmann, Christian F. Karahan, Mercan Sion, Radu Topkara, Umut Triezenberg, Katrina E. |
description | Two main results in the area of information hiding in natural language text are presented. A semantically-based scheme dramatically improves the information-hiding capacity of any text through two tech- niques: (i) modifying the granularity of meaning of individual sentences, whereas our own previous scheme kept the granularity fixed, and (ii) halving the number of sentences affected by the watermark. No longer a “long text”, short watermark. approach, it now makes it possible to wa- termark short texts, like wire agency reports. Using both the above- mentioned semantic marking scheme and our previous syntactically- based method hides information in a way that reveals any non-trivial tampering with the text (while re-formatting is not considered to be tampering.the problem would be solved trivially otherwise by hiding a hash of the text) with a probability 1-2-β(n+1), n being its number of sentences and β a small positive integer based on the extent of co- referencing. |
doi_str_mv | 10.1007/3-540-36415-3_13 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_14871039</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>14871039</sourcerecordid><originalsourceid>FETCH-LOGICAL-j290t-f580abd977881a7cd9ae33300281d018350bf3b1f4528eceebc501a2c8d1964d3</originalsourceid><addsrcrecordid>eNotkMtOwzAQRc1LopTuWWbD0mUm49T2ElW8pAo2RSytSeJEfSWR3S74e9yW1Uj3XI2ujhAPCFME0E8kCwWSZgoLSQ7pQtxRSk4BXYoRzhAlkbJXYmK1OTIAlaO9FiMgyKXVim7FJMZ1AkA5WV2MBHzy_hB4my24aw_c-uyH9z7sOGxWXZtxV2dL3g0-DKHvmxTdi5uGt9FP_u9YfL--LOfvcvH19jF_Xsh1bmEvm8IAl7XV2hhkXdWWPREB5AZrwLQPyoZKbFSRG195X1YFIOeVqdHOVE1j8Xj-O3CseNsE7qpVdENYpW2_DpXRCGRTb3ruxYS61gdX9v0mOgR39ObIJRPupMkdvdEf1ppZyQ</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Natural Language Watermarking and Tamperproofing</title><source>Springer Books</source><creator>Atallah, Mikhail J. ; Raskin, Victor ; Hempelmann, Christian F. ; Karahan, Mercan ; Sion, Radu ; Topkara, Umut ; Triezenberg, Katrina E.</creator><contributor>Petitcolas, Fabien A. P.</contributor><creatorcontrib>Atallah, Mikhail J. ; Raskin, Victor ; Hempelmann, Christian F. ; Karahan, Mercan ; Sion, Radu ; Topkara, Umut ; Triezenberg, Katrina E. ; Petitcolas, Fabien A. P.</creatorcontrib><description>Two main results in the area of information hiding in natural language text are presented. A semantically-based scheme dramatically improves the information-hiding capacity of any text through two tech- niques: (i) modifying the granularity of meaning of individual sentences, whereas our own previous scheme kept the granularity fixed, and (ii) halving the number of sentences affected by the watermark. No longer a “long text”, short watermark. approach, it now makes it possible to wa- termark short texts, like wire agency reports. Using both the above- mentioned semantic marking scheme and our previous syntactically- based method hides information in a way that reveals any non-trivial tampering with the text (while re-formatting is not considered to be tampering.the problem would be solved trivially otherwise by hiding a hash of the text) with a probability 1-2-β(n+1), n being its number of sentences and β a small positive integer based on the extent of co- referencing.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540004219</identifier><identifier>ISBN: 3540004211</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540364153</identifier><identifier>EISBN: 9783540364153</identifier><identifier>DOI: 10.1007/3-540-36415-3_13</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Cryptography ; Exact sciences and technology ; Image Watermark ; Information Hiding ; Information, signal and communications theory ; Short Text ; Signal and communications theory ; Syntax Tree ; Telecommunications and information theory ; Watermark Scheme</subject><ispartof>Information Hiding, 2003, p.196-212</ispartof><rights>Springer-Verlag Berlin Heidelberg 2003</rights><rights>2003 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/3-540-36415-3_13$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/3-540-36415-3_13$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,27925,38255,41442,42511</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=14871039$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Petitcolas, Fabien A. P.</contributor><creatorcontrib>Atallah, Mikhail J.</creatorcontrib><creatorcontrib>Raskin, Victor</creatorcontrib><creatorcontrib>Hempelmann, Christian F.</creatorcontrib><creatorcontrib>Karahan, Mercan</creatorcontrib><creatorcontrib>Sion, Radu</creatorcontrib><creatorcontrib>Topkara, Umut</creatorcontrib><creatorcontrib>Triezenberg, Katrina E.</creatorcontrib><title>Natural Language Watermarking and Tamperproofing</title><title>Information Hiding</title><description>Two main results in the area of information hiding in natural language text are presented. A semantically-based scheme dramatically improves the information-hiding capacity of any text through two tech- niques: (i) modifying the granularity of meaning of individual sentences, whereas our own previous scheme kept the granularity fixed, and (ii) halving the number of sentences affected by the watermark. No longer a “long text”, short watermark. approach, it now makes it possible to wa- termark short texts, like wire agency reports. Using both the above- mentioned semantic marking scheme and our previous syntactically- based method hides information in a way that reveals any non-trivial tampering with the text (while re-formatting is not considered to be tampering.the problem would be solved trivially otherwise by hiding a hash of the text) with a probability 1-2-β(n+1), n being its number of sentences and β a small positive integer based on the extent of co- referencing.</description><subject>Applied sciences</subject><subject>Cryptography</subject><subject>Exact sciences and technology</subject><subject>Image Watermark</subject><subject>Information Hiding</subject><subject>Information, signal and communications theory</subject><subject>Short Text</subject><subject>Signal and communications theory</subject><subject>Syntax Tree</subject><subject>Telecommunications and information theory</subject><subject>Watermark Scheme</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540004219</isbn><isbn>3540004211</isbn><isbn>3540364153</isbn><isbn>9783540364153</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2003</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNotkMtOwzAQRc1LopTuWWbD0mUm49T2ElW8pAo2RSytSeJEfSWR3S74e9yW1Uj3XI2ujhAPCFME0E8kCwWSZgoLSQ7pQtxRSk4BXYoRzhAlkbJXYmK1OTIAlaO9FiMgyKXVim7FJMZ1AkA5WV2MBHzy_hB4my24aw_c-uyH9z7sOGxWXZtxV2dL3g0-DKHvmxTdi5uGt9FP_u9YfL--LOfvcvH19jF_Xsh1bmEvm8IAl7XV2hhkXdWWPREB5AZrwLQPyoZKbFSRG195X1YFIOeVqdHOVE1j8Xj-O3CseNsE7qpVdENYpW2_DpXRCGRTb3ruxYS61gdX9v0mOgR39ObIJRPupMkdvdEf1ppZyQ</recordid><startdate>20030101</startdate><enddate>20030101</enddate><creator>Atallah, Mikhail J.</creator><creator>Raskin, Victor</creator><creator>Hempelmann, Christian F.</creator><creator>Karahan, Mercan</creator><creator>Sion, Radu</creator><creator>Topkara, Umut</creator><creator>Triezenberg, Katrina E.</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>20030101</creationdate><title>Natural Language Watermarking and Tamperproofing</title><author>Atallah, Mikhail J. ; Raskin, Victor ; Hempelmann, Christian F. ; Karahan, Mercan ; Sion, Radu ; Topkara, Umut ; Triezenberg, Katrina E.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-j290t-f580abd977881a7cd9ae33300281d018350bf3b1f4528eceebc501a2c8d1964d3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Applied sciences</topic><topic>Cryptography</topic><topic>Exact sciences and technology</topic><topic>Image Watermark</topic><topic>Information Hiding</topic><topic>Information, signal and communications theory</topic><topic>Short Text</topic><topic>Signal and communications theory</topic><topic>Syntax Tree</topic><topic>Telecommunications and information theory</topic><topic>Watermark Scheme</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Atallah, Mikhail J.</creatorcontrib><creatorcontrib>Raskin, Victor</creatorcontrib><creatorcontrib>Hempelmann, Christian F.</creatorcontrib><creatorcontrib>Karahan, Mercan</creatorcontrib><creatorcontrib>Sion, Radu</creatorcontrib><creatorcontrib>Topkara, Umut</creatorcontrib><creatorcontrib>Triezenberg, Katrina E.</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Atallah, Mikhail J.</au><au>Raskin, Victor</au><au>Hempelmann, Christian F.</au><au>Karahan, Mercan</au><au>Sion, Radu</au><au>Topkara, Umut</au><au>Triezenberg, Katrina E.</au><au>Petitcolas, Fabien A. P.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Natural Language Watermarking and Tamperproofing</atitle><btitle>Information Hiding</btitle><date>2003-01-01</date><risdate>2003</risdate><spage>196</spage><epage>212</epage><pages>196-212</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540004219</isbn><isbn>3540004211</isbn><eisbn>3540364153</eisbn><eisbn>9783540364153</eisbn><abstract>Two main results in the area of information hiding in natural language text are presented. A semantically-based scheme dramatically improves the information-hiding capacity of any text through two tech- niques: (i) modifying the granularity of meaning of individual sentences, whereas our own previous scheme kept the granularity fixed, and (ii) halving the number of sentences affected by the watermark. No longer a “long text”, short watermark. approach, it now makes it possible to wa- termark short texts, like wire agency reports. Using both the above- mentioned semantic marking scheme and our previous syntactically- based method hides information in a way that reveals any non-trivial tampering with the text (while re-formatting is not considered to be tampering.the problem would be solved trivially otherwise by hiding a hash of the text) with a probability 1-2-β(n+1), n being its number of sentences and β a small positive integer based on the extent of co- referencing.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/3-540-36415-3_13</doi><tpages>17</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Information Hiding, 2003, p.196-212 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_14871039 |
source | Springer Books |
subjects | Applied sciences Cryptography Exact sciences and technology Image Watermark Information Hiding Information, signal and communications theory Short Text Signal and communications theory Syntax Tree Telecommunications and information theory Watermark Scheme |
title | Natural Language Watermarking and Tamperproofing |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T03%3A51%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Natural%20Language%20Watermarking%20and%20Tamperproofing&rft.btitle=Information%20Hiding&rft.au=Atallah,%20Mikhail%20J.&rft.date=2003-01-01&rft.spage=196&rft.epage=212&rft.pages=196-212&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540004219&rft.isbn_list=3540004211&rft_id=info:doi/10.1007/3-540-36415-3_13&rft_dat=%3Cpascalfrancis_sprin%3E14871039%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540364153&rft.eisbn_list=9783540364153&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |