Abstract
In this paper, we investigate the problem of how to prove the authorship of textual documents. We propose to use natural language watermarks to solve the problem. We identify two essential requirements for an authorship proof scheme (APS) to be secure against watermark erasing attacks. We evaluate the security of existing natural language watermarking schemes, and we propose two new APS with improved security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Atallah, M., Raskin, V., Hempelmann, C.F., Karahan, M., Sion, R., Topkara, U., Triezenberg, K.E.: Natural Language Watermarking and Tamperproofing. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 196–212. Springer, Heidelberg (2003)
Atallah, M., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., Naik, S.: Natural language watermarking: design, analysis, and a proof-of-concept implementation. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 185–199. Springer, Heidelberg (2001)
Beale, S., Nirenburg, S., Mahesh, K.: Semantic Analysis in the MikroKosmos Machine Translation Project. In: Proc. of the 2nd SNLP 1995, Bangkok, Thailand (1995)
Brassil, J., Low, S., Maxemchuk, N., O’Gorman, L.: Marking text features of document images to deter illicit dissemination. In: Proc. of the 12th IAPR International Conference on Computer Vision and Image Processing, Jerusalem, Israel, vol. 2, pp. 315–319 (1994)
Brassil, J., Low, S., Maxemchuk, N.F., O’Gorman, L.: Hiding information in documents images. In: Conference on Information Sciences and Systems (CISS 1995) (1995)
Chotikakamthorn, N.: Electronic document data hiding technique using inter-character space. In: Proc. of The 1998 IEEE Asia-Pacific Conference on Circuits and Systems, IEEE APCCAS 1998, Chiangmai, Thailand, pp. 419–422 (1998)
Chotikakamthorn, N.: Document image data hiding techniques using character spacing width sequence coding. In: Proc. IEEE Intl. Conf. Image Processing, Japan (1999)
Gupta, G., Pieprzyk, J., Wang, H.X.: An attack-localizing watermarking scheme for natural language documents. In: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, Taipei, Taiwan (2006)
Ji, H., Sook, J., Young, H.: A new digital watermarking for text document images using diagonal profile. In: Shum, H.-Y., Liao, M., Chang, S.-F. (eds.) PCM 2001. LNCS, vol. 2195, p. 748. Springer, Heidelberg (2001)
Kankanhalli, M.S., Hau, K.F.: Watermarking of electronic text documents. Electronic Commerce Research 2(1-2), 169–187 (2002)
Kim, Y., Moon, K., Oh, I.: A text watermarking algorithm based on word classification and inter-word space statistics. In: Conference on Document Analysis and Recognition (ICDAR 2003) (1995)
Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions, and reversals. Dokl. Akad. Nauk SSSR 163, 845–848 (Russian); Translated as Soviet Physics Dokl. 10, 707–710 (1965)
Low, S., Maxemchuk, N., Brassil, J., O’Gorman, L.: Document marking and identification using both line and word shifting. In: Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Bringing Information to People, INFOCOM 1995, Boston, USA, vol. 2, pp. 853–860 (1995)
Mahesh, K., Nirenburg, S.: Meaning Representation for Knowledge Sharing in Practical Machine Translation. In: Proc. the FLAIRS 1996 Track on Information Interchange. Florida AI Research Symposium (1996)
Nirenburg, S.: Application-Oriented Computational Semantics. In: Johnson, R., Rosner, M. (eds.) Computational Linguistics and Formal Semantics (1991)
Onyshkevych, B.: An Ontological- Semantic Framework for Text Analysis. Ph.D. Diss., School of Computer Science, Carnegie Mellon University (1997)
Sun, X., Luo, G., Huang, H.: Component-based digital watermarking of Chinese texts. In: Proceedings of the 3rd international conference on Information security, Shanghai, China (2004)
Topkara, M., Riccardi, G., Hakkani-Tur, D., Atallah, M.J.: Natural Language Watermarking: Challenges in Building a Practical System. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA (2006)
Topkara, M., Taskiran, C., Delp, E.J.: Natural Language Watermarking. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA (2005)
Helmreich, S., Farwell, D.: Text Meaning Representation as a Basis for Representation of Text Interpretation. In: White, J.S. (ed.) AMTA 2000. LNCS (LNAI), vol. 1934, pp. 179–188. Springer, Heidelberg (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wu, J., Stinson, D.R. (2008). Authorship Proof for Textual Document. In: Solanki, K., Sullivan, K., Madhow, U. (eds) Information Hiding. IH 2008. Lecture Notes in Computer Science, vol 5284. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88961-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-88961-8_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88960-1
Online ISBN: 978-3-540-88961-8
eBook Packages: Computer ScienceComputer Science (R0)