




版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領
文檔簡介
1、A New Data Hiding Method via Revision History Records on Collaborative Writing PlatformsA New Data Hiding Method via Revision History Records on Collaborative Writing PlatformsINTRODUCTIONBASIC IDEA OF PROPOSED METHODDATA HIDING VIA REVISION HISTORYCONTENTSEXPERIMENTAL RESULTSINTRODUCTIONBennett 200
2、4made a good survey about hiding data in text and classified related techniques into three categories:1. format-based methods;2. random and statistical generation;3. linguistic methods.Collaborative writing means an activity involving more than one author to create an article cooperatively on a comm
3、on platform.Many collaborative writing platforms are available, such as Google Drive, Office Web Apps, Wikipedia, etc., which record revisions generated during the collaborative writing process.The aforementioned methods can only be applied to documents with single authors and single revision versio
4、ns. A new data hiding method is proposed, which simulates a collaborative writing process to generate a fake document, consisting of an article and its revision history, as a camouflage for message bit embedding.BASIC IDEA OF PROPOSED METHODWe assume that only word sequence corrections occur during
5、a revision.Four characteristics of article revisions are identified and utilized to embed secret messages,1. the author of the revision;2. the number of changed word sequences of the revision;3. the changed word sequences in the revision;4. the word sequences selected from the collaborative writing
6、database DBcw, which replace those of (3).DATA HIDING VIA REVISION HISTORY1 Collaborative Writing Database ConstructionFor example, assume Di = “National Chia Tang University” andDi1 = “National Chiao Tung University.” Then, the correction pair = is generated and included into DBcw.LCS Algorithm2 Se
7、cret Message EmbeddingIn the phase of message embedding with a cover document D0 as the input, the proposed system is designed to generate a stego-document D with consecutive revisions D0, D1, D2, . . . , Dn by producing a previous revision Di from the current revision Di1 repeatedly until the entir
8、e message is embedded.2.1 Encoding the Authors of Revisions for Data HidingAt first we select a group of simulated authors, with each author being assigned a unique code a, called author a. Then, if the message bits to be embedded form a code aj , then we assign author aj to the previous revision Di
9、 as its author to achieve embedding of message bits aj into Di.2.2 Using the Number of Changed Word Sequences for Data HidingWe select some word sequences in Di1 and changedthem into other ones in Di . It is desired to use as well the number Ng of word sequences changed in this process as a message-
10、bit carrier.several problems:1. the dependency problem,2. the selection problem,3. the consecutiveness problem,1. the dependency problem,We say that two word sequences in Di1 are dependent if some identical words appear in both of them, and changing word sequences with this property in Di1 will caus
11、e conflicts, leading to a dependency problem.The solution:(1) Decompose Qr into a set of lists, I = I1, I2, . . . , Iu, with each list Ii including a group of mutually dependent word and every two word sequences in two different lists, respectively, in I being independent of each other;(2)Select onl
12、y word sequences from different lists in set I and change them to construct a new revision.2. the selection problem,We adopt the Huffman coding technique to create Huffman codes uniquely for the word sequences in Qr according to their usage frequencies, and select word sequences with their codes ide
13、ntical to the message bits to be embedded.The solution:To solve this selection problem, suppose that based on the use of a key, we randomly assign the word sequences in Qr consecutively into Ng groups G1 through GNg , each group including multiple,but distinct, word sequences.3. the consecutiveness problem,Di-1DiThe solution:We choose a splitting point:3 Secret message extractionEXPERIMENTAL RESULTSAn example of generated stego-documents on constructed Wiki site with input secret message “Art is long, life is short.”We have tried to apply Algorithm 1 to two adja
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年微機保護測控裝置合作協(xié)議書
- 糖尿病病足的預防
- 2025年不見面審批合作協(xié)議書
- 2025年叔丁基苯酚項目發(fā)展計劃
- 職業(yè)健康預防措施
- 2025年光通信計量和監(jiān)測儀器合作協(xié)議書
- 金屬工藝品專門零售企業(yè)縣域市場拓展與下沉戰(zhàn)略研究報告
- 汽車舊車零售企業(yè)數(shù)字化轉型與智慧升級戰(zhàn)略研究報告
- 皮革內(nèi)衣企業(yè)ESG實踐與創(chuàng)新戰(zhàn)略研究報告
- 箱包掛件企業(yè)縣域市場拓展與下沉戰(zhàn)略研究報告
- 中國革命戰(zhàn)爭的戰(zhàn)略問題(全文)
- 航空機載設備履歷本
- 企業(yè)風險管理-戰(zhàn)略與績效整合(中文版)
- 高效能人士的七個習慣The7HabitsofHighlyEffectivePeople課件
- 小學體育與健康教育科學二年級下冊第一章體育基本活動能力立定跳遠教案 省一等獎
- 工程分包管理計劃
- 民事訴訟法學整套ppt課件完整版教學教程最全電子講義(最新)
- 河北省自然科學基金資助項目申請書模板
- 四年級奧數(shù)-容斥問題
- 常用標準波導和法蘭尺寸
- 損益平衡點的計算方法
評論
0/150
提交評論