Abstract
Numerous schemes have been designed for watermarking multimedia contents. Many of these schemes are vulnerable to watermark erasing attacks. Naturally, such methods are ineffective on text unless the text is represented as a bitmap image, but in that case, the watermark can be erased easily by using Optical Character Recognition (OCR) to change the representation of the text from a bitmap to ASCII or EBCDIC. This study attempts to develop a method for embedding watermark in the text that is as successful as the frequency-domain methods have been for image and audio. The novel method embeds the watermark in original text, creating ciphertext, which preserves the meaning of the original text via various semantic replacements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Brassil, J., Low, S., Maxemchuk, N., O’ Gorman, L.: Electronic marking and identification techniques to discourage document copying. In: Proceedings of IEEE INFOCOM 1994, pp. 1278–1287 (1994)
Brassil, J., Low, S., Maxemchuk, N., O’ Gorman, L.: Hiding information in document images. In: Proceedings of the 29th Annual Conference on Information Sciences and Systems, pp. 482–489 (1995)
Charniak, E.: Statistical parsing with a context-free grammar and word statistics. In: Proceedings of NCAI 1997, pp. 598–603 (1997)
Hardy, G.H., Wright, E.M.: Quadratic Residues, 5th edn. §6.5 in An Introduction to the Theory of Numbers, pp. 67–68. Clarendon Press, Oxford (1979)
Johnson, M.: The effect of alternative tree representations on tree bank grammars. In: Proceedings of the Joint Conference on New methods in Language Processing and Computational Natural Language Learning (NeMLaP3/CoNLL 1998), pp. 39–48 (1998)
Low, S., Maxemchuk, N., Brassil, J., O’ Gorman, L.: Document marking and identification using both line and word shifting. In: Proceedings of IEEE INFOCOM 1995 (1995)
Atallah, M., Raskin, V., Hempelmann, C.F., Karahan, M., Sion, R., Triezenberg, K.E., Topkara, U.: Natural Language Watermarking and Tamperproofing. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 196–212. Springer, Heidelberg (2003)
Atallah, M.J., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., Naik, S.: Natural Language Watermarking: Design, Analysis, and Proof-of-Concept Implementation. Published in the Proceedings of the 4th International Information Hiding Workshop, Pittsburgh, Pennsylvania, April 25-27 (2001)
Xia, F., Palmer, M., Xue, N., Okurowski, M.E., Kovarik, J., Chiou, F.-D., Kroch, T., Marcus, M.: Developing Guidelines and Ensuring Consistency for Chinese Text Annotation. In: Second International Conference on Language Resources and Evaluation (LREC 2000), pp. 3–10 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chiang, YL., Chang, LP., Hsieh, WT., Chen, WC. (2004). Natural Language Watermarking Using Semantic Substitution for Chinese Text. In: Kalker, T., Cox, I., Ro, Y.M. (eds) Digital Watermarking. IWDW 2003. Lecture Notes in Computer Science, vol 2939. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24624-4_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-24624-4_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21061-0
Online ISBN: 978-3-540-24624-4
eBook Packages: Springer Book Archive