基于維基百科的歷史修改記錄的數(shù)據(jù)隱藏算法_第1頁
基于維基百科的歷史修改記錄的數(shù)據(jù)隱藏算法_第2頁
基于維基百科的歷史修改記錄的數(shù)據(jù)隱藏算法_第3頁
基于維基百科的歷史修改記錄的數(shù)據(jù)隱藏算法_第4頁
基于維基百科的歷史修改記錄的數(shù)據(jù)隱藏算法_第5頁
已閱讀5頁,還剩23頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡介

1、A New Data Hiding Method via Revision History Records on Collaborative Writing PlatformsA New Data Hiding Method via Revision History Records on Collaborative Writing PlatformsINTRODUCTIONBASIC IDEA OF PROPOSED METHODDATA HIDING VIA REVISION HISTORYCONTENTSEXPERIMENTAL RESULTSINTRODUCTIONBennett 200

2、4made a good survey about hiding data in text and classified related techniques into three categories:1. format-based methods;2. random and statistical generation;3. linguistic methods.Collaborative writing means an activity involving more than one author to create an article cooperatively on a comm

3、on platform.Many collaborative writing platforms are available, such as Google Drive, Office Web Apps, Wikipedia, etc., which record revisions generated during the collaborative writing process.The aforementioned methods can only be applied to documents with single authors and single revision versio

4、ns. A new data hiding method is proposed, which simulates a collaborative writing process to generate a fake document, consisting of an article and its revision history, as a camouflage for message bit embedding.BASIC IDEA OF PROPOSED METHODWe assume that only word sequence corrections occur during

5、a revision.Four characteristics of article revisions are identified and utilized to embed secret messages,1. the author of the revision;2. the number of changed word sequences of the revision;3. the changed word sequences in the revision;4. the word sequences selected from the collaborative writing

6、database DBcw, which replace those of (3).DATA HIDING VIA REVISION HISTORY1 Collaborative Writing Database ConstructionFor example, assume Di = “National Chia Tang University” andDi1 = “National Chiao Tung University.” Then, the correction pair = is generated and included into DBcw.LCS Algorithm2 Se

7、cret Message EmbeddingIn the phase of message embedding with a cover document D0 as the input, the proposed system is designed to generate a stego-document D with consecutive revisions D0, D1, D2, . . . , Dn by producing a previous revision Di from the current revision Di1 repeatedly until the entir

8、e message is embedded.2.1 Encoding the Authors of Revisions for Data HidingAt first we select a group of simulated authors, with each author being assigned a unique code a, called author a. Then, if the message bits to be embedded form a code aj , then we assign author aj to the previous revision Di

9、 as its author to achieve embedding of message bits aj into Di.2.2 Using the Number of Changed Word Sequences for Data HidingWe select some word sequences in Di1 and changedthem into other ones in Di . It is desired to use as well the number Ng of word sequences changed in this process as a message-

10、bit carrier.several problems:1. the dependency problem,2. the selection problem,3. the consecutiveness problem,1. the dependency problem,We say that two word sequences in Di1 are dependent if some identical words appear in both of them, and changing word sequences with this property in Di1 will caus

11、e conflicts, leading to a dependency problem.The solution:(1) Decompose Qr into a set of lists, I = I1, I2, . . . , Iu, with each list Ii including a group of mutually dependent word and every two word sequences in two different lists, respectively, in I being independent of each other;(2)Select onl

12、y word sequences from different lists in set I and change them to construct a new revision.2. the selection problem,We adopt the Huffman coding technique to create Huffman codes uniquely for the word sequences in Qr according to their usage frequencies, and select word sequences with their codes ide

13、ntical to the message bits to be embedded.The solution:To solve this selection problem, suppose that based on the use of a key, we randomly assign the word sequences in Qr consecutively into Ng groups G1 through GNg , each group including multiple,but distinct, word sequences.3. the consecutiveness problem,Di-1DiThe solution:We choose a splitting point:3 Secret message extractionEXPERIMENTAL RESULTSAn example of generated stego-documents on constructed Wiki site with input secret message “Art is long, life is short.”We have tried to apply Algorithm 1 to two adja

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論