An Anti-attack Watermarking Based on Synonym Substitution for Chinese Text

被引:3
|
作者
He Lu [1 ]
Lin JianBin [1 ]
Li TianZhi [1 ]
Fang DingYi [1 ]
机构
[1] Northwest Univ, Sch Informat Sci & Technol, Xian, Peoples R China
关键词
Information hiding; Natural Language Watemarking; Synonym Substitution; Anti-attack;
D O I
10.1109/IAS.2009.66
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Current research of natural language steganographic algorithms based on synonymy substitution mostly focused on invisibility, but ignored robustness. However, automatic disambiguation of Chinese word senses(WSD) achieves high accuracy, the adversary could destroyed the watermark easily if he disambiguated the stego-text and did the synonym substitution again. In this paper, against the high accuracy of WSD algorithm, two indicators are proposed, which are Lexical Similarity and Sense Similarity. For reducing the accuracy rate of WSD, we argued that it should choose the word, which is low Lexical Similarity and high Senses Similarity, in the synonym substitution. Therefore, the automatically attack will failure. The experiment showed that the algorithm reduced the accuracy of WSD from 90.4% to 74.5%. The robustness of watermarking has been improved.
引用
收藏
页码:356 / 359
页数:4
相关论文
共 50 条
  • [1] Enhanced sensitivity attack on watermarking scheme with anti-attack capability
    School of Communication and Information Engineering, Shanghai University, Shanghai 200072, China
    Dongnan Daxue Xuebao, 2007, SUPPL. (53-57):
  • [2] Cross-Modal Text Steganography Against Synonym Substitution-Based Text Attack
    Peng, Wanli
    Wang, Tao
    Qian, Zhenxing
    Li, Sheng
    Zhang, Xinpeng
    IEEE SIGNAL PROCESSING LETTERS, 2023, 30 : 299 - 303
  • [3] An Application Anti-attack Model
    He, Hongjun
    Luo, Li
    Wang, Yang
    Duan, Zhipeng
    Fang, Zhihe
    Zhang, Wenzheng
    ADVANCES IN CIVIL ENGINEERING, PTS 1-6, 2011, 255-260 : 2197 - +
  • [4] Attack Model of Text Watermarking Based on Communications
    Zhou, Xinmin
    Wang, Zhicheng
    Zhao, Weidong
    Yu, Jianping
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 4, PROCEEDINGS, 2009, : 283 - +
  • [5] Natural language watermarking using semantic substitution for Chinese text
    Chiang, YL
    Chang, LP
    Hsieh, WT
    Chen, WC
    DIGITAL WATERMARKING, 2004, 2939 : 129 - 140
  • [6] An Automatic Anti-Attack Scheme for MySQL Database
    Sun, Qiao
    Fu, Lanmei
    Qiu, Weihao
    Sun, Jiasong
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRIAL ENGINEERING (AIIE 2016), 2016, 133 : 397 - 400
  • [7] Anti-Attack Intrusion Detection Model Based on MPNN and Traffic Spatiotemporal Characteristics
    Lu, Jiazhong
    Lan, Jin
    Huang, Yuanyuan
    Song, Maojia
    Liu, Xiaolei
    JOURNAL OF GRID COMPUTING, 2023, 21 (04)
  • [8] Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning
    Zhang, Rui
    Xia, Hui
    Liu, Chao
    Jiang, Ruo-bing
    Cheng, Xiang-guo
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [9] FedIM: An Anti-attack Federated Learning Based on Agent Importance Aggregation
    Gao, Zhipeng
    Qiu, Chenhao
    Zhao, Chen
    Yang, Yang
    Mo, Zijia
    Lin, Yijing
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 1445 - 1451
  • [10] Anti-Attack Intrusion Detection Model Based on MPNN and Traffic Spatiotemporal Characteristics
    Jiazhong Lu
    Jin Lan
    Yuanyuan Huang
    Maojia Song
    Xiaolei Liu
    Journal of Grid Computing, 2023, 21