Dissertation > Excellent graduate degree dissertation topics show

The Research on Natural Language Information Hiding

Author: LiuYuLing
Tutor: SunXingMing
School: Hunan University
Course: Applied Computer Technology
Keywords: Information hiding Text steganography Natural language steganography Natural language watermarking Covert communication Copyright protection
CLC: TP309.7
Type: PhD thesis
Year: 2008
Downloads: 149
Quote: 1
Read: Download Dissertation


With the development and popularization of computer and Internet technology, information hiding has become one of the hot spots in the field of information security, and has been extensively used for copyright protection, covert communication, authentication, etc. At present, most have focused on information hiding of video, image and audio documents. However, digital texts form one of the largest chunk of digital data people encounter daily, thus covert communication, copyright management and authentication for text documents are more serious than they are for video, image, and audio documents.Comparing with other media documents, such as image, audio and video, text documents lack redundancies of the human visual system and human auditory system. Additionally, there are few of strong theories and practical automatic techniques in natural language processing area to understand, transform and generate texts. Thus the research of text steganography is very challenging. The early methods of text steganography are based on the physical format of texts. Due to those methods exploited tolerances in typesetting by making minute changes in line placement and kerning, making them vulnerable to simple reformatting and OCR (short for Optical Character Recognition) attacks, their applications are limited. Natural language steganography, as a new area, directs the text steganography.This dissertation mainly concerns about Chinese texts, and proposes several methods for natural language steganography on word level, sentence level and paragraph level. Additionally, due to the limit of the amount of hidden information and the sensitivity of modifying a given cover text, a new method based on Mimic is proposed. The main contributions are summarized as follows.(1) According to characteristics of Chinese texts, two methods on the word level are proposed. The first method exploits the substitution of variant forms of the same word and synonyms. In the method, the neighboring words are deemed as context words. When substituting, a Chinese morphological analyzer is introduced to evaluate whether the text is correctly segmented. The method is easy to implement. It can achieve a high degree of capacity and resist machine analysis. The second method is substitution of synonyms based on the semantic adjacent words. Firstly, the synonymy sets are created and classified with HowNet and Tongyicicilin. For the non-totally interchangeable synonymy sets, the context words are obtained from the semantic adjacent words by analyzing the dependency relationships, and then the synonym is selected with high probability of its cooccurrence of the semantic adjacent words. The method can effectively obtain the context words, and avoid the improper substitutions.(2) As present work on natural language steganography on the sentence level is mainly designed for English texts, this dissertation proposes two methods on the sentence level of Chinese texts. The first method is based on the transformation of syntactic parser trees. Firstly, a parser based on BP neural network is designed and implemented. And then, all the syntactic parser trees are encoded. Then, secret information is embedded by modifying the trees according to the transformation rules. The second method is based on shift conversion. Firstly, a method based on Chinese mathematical expression is presented to encode Chinese texts. Then, secret information is embedded according to the shift conversion rules.(3) Presently, there is little work on natural language steganography on the paragraph level. This dissertation proposes a Chinese natural language watermarking method on the paragraph level. The method is based on named entity and coreference resolution. Additionally, the spread spectrum technique is introduced to encode the watermark. The experimental results show that the method is robust, and can resist some active attacks.(4) For the existing text mimicking methods, it is necessary for the communication parties to share the dictionary and sentence templates. Additionally, the generated texts are easy to incur suspicion. This dissertation proposes a new method of natural language steganography based on Mimic. The method needs not construct sophisticated dictionaries and sentence templates beforehand. Moreover, it can improve the efficiency and security of transmitting secret information. A tool, called MIMIC-PPT, is implemented by combining text mimicking techniques with characteristics of PPT documents.

Related Dissertations

  1. The Research of Vector CAD Electronic Drawing Protection System,TP391.72
  2. Network literature research its copyright protection mode,D923.41
  3. Research on the Application of Image Information Hiding Technique,TP309.7
  4. Research on Information Hiding Based on Images,TP309.7
  5. The Study of Image Watermark Base on Discrete Wavelet Transformation,TP309.7
  6. In Copyright Protection of the Character of Works,D923.41
  7. The Study on Copyright Protection for Computer Fonts,D923.41
  8. Research on the Issues of Copyright in Internet Map,D923.41
  9. Collaborative learning and digital fingerprint based on copyright protection and tracking technology,TP309
  10. Based on real-time voice communications Information Hiding Technology,TP309
  11. Network covert channel detection technology,TP393.08
  12. Chaotic systems based digital image watermarking algorithm,TP309.7
  13. Based on Voronoi diagram of image information hiding method,TP309
  14. Research and Implementation of covert communication of multimedia data network communication system,TP393.08
  15. Traitor Tracing and Revocation Mechanisms with Privacy Preserving,TN918.1
  16. Research on Reversible Video Data Hiding Based on H.264/avc Standard,TN919.81
  17. On Network Copyright Protection,D923.41
  18. Network software copyright protection and infringement relief,D923.41
  19. Research on the Photography Copyright Protection,D923.41
  20. Study on Digital Image Encryption and Information Hiding Algorithm Based on Chaos,TP309.7
  21. Convert Communication Based on Quantum Cryptography,O413

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality > Encryption and decryption
© 2012 www.DissertationTopic.Net  Mobile