版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
1、A New Data Hiding Method via Revision History Records on Collaborative Writing PlatformsA New Data Hiding Method via Revision History Records on Collaborative Writing PlatformsINTRODUCTIONBASIC IDEA OF PROPOSED METHODDATA HIDING VIA REVISION HISTORYCONTENTSEXPERIMENTAL RESULTSINTRODUCTIONBennett 200
2、4made a good survey about hiding data in text and classified related techniques into three categories:1. format-based methods;2. random and statistical generation;3. linguistic methods.Collaborative writing means an activity involving more than one author to create an article cooperatively on a comm
3、on platform.Many collaborative writing platforms are available, such as Google Drive, Office Web Apps, Wikipedia, etc., which record revisions generated during the collaborative writing process.The aforementioned methods can only be applied to documents with single authors and single revision versio
4、ns. A new data hiding method is proposed, which simulates a collaborative writing process to generate a fake document, consisting of an article and its revision history, as a camouflage for message bit embedding.BASIC IDEA OF PROPOSED METHODWe assume that only word sequence corrections occur during
5、a revision.Four characteristics of article revisions are identified and utilized to embed secret messages,1. the author of the revision;2. the number of changed word sequences of the revision;3. the changed word sequences in the revision;4. the word sequences selected from the collaborative writing
6、database DBcw, which replace those of (3).DATA HIDING VIA REVISION HISTORY1 Collaborative Writing Database ConstructionFor example, assume Di = “National Chia Tang University” andDi1 = “National Chiao Tung University.” Then, the correction pair = is generated and included into DBcw.LCS Algorithm2 Se
7、cret Message EmbeddingIn the phase of message embedding with a cover document D0 as the input, the proposed system is designed to generate a stego-document D with consecutive revisions D0, D1, D2, . . . , Dn by producing a previous revision Di from the current revision Di1 repeatedly until the entir
8、e message is embedded.2.1 Encoding the Authors of Revisions for Data HidingAt first we select a group of simulated authors, with each author being assigned a unique code a, called author a. Then, if the message bits to be embedded form a code aj , then we assign author aj to the previous revision Di
9、 as its author to achieve embedding of message bits aj into Di.2.2 Using the Number of Changed Word Sequences for Data HidingWe select some word sequences in Di1 and changedthem into other ones in Di . It is desired to use as well the number Ng of word sequences changed in this process as a message-
10、bit carrier.several problems:1. the dependency problem,2. the selection problem,3. the consecutiveness problem,1. the dependency problem,We say that two word sequences in Di1 are dependent if some identical words appear in both of them, and changing word sequences with this property in Di1 will caus
11、e conflicts, leading to a dependency problem.The solution:(1) Decompose Qr into a set of lists, I = I1, I2, . . . , Iu, with each list Ii including a group of mutually dependent word and every two word sequences in two different lists, respectively, in I being independent of each other;(2)Select onl
12、y word sequences from different lists in set I and change them to construct a new revision.2. the selection problem,We adopt the Huffman coding technique to create Huffman codes uniquely for the word sequences in Qr according to their usage frequencies, and select word sequences with their codes ide
13、ntical to the message bits to be embedded.The solution:To solve this selection problem, suppose that based on the use of a key, we randomly assign the word sequences in Qr consecutively into Ng groups G1 through GNg , each group including multiple,but distinct, word sequences.3. the consecutiveness problem,Di-1DiThe solution:We choose a splitting point:3 Secret message extractionEXPERIMENTAL RESULTSAn example of generated stego-documents on constructed Wiki site with input secret message “Art is long, life is short.”We have tried to apply Algorithm 1 to two adja
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 智能硬件創(chuàng)新企業(yè)評審
- 國際工藝品設(shè)備租賃協(xié)議
- 通信設(shè)備運(yùn)輸招投標(biāo)文件
- 會員消費(fèi)IC卡積分規(guī)則
- 無人機(jī)駕駛員聘用合同范本
- 執(zhí)行院務(wù)公開管理辦法
- 鐵路工程供貨施工合同范本
- 金屬材料采購授權(quán)委托書
- 通訊設(shè)備項(xiàng)目獎勵政策
- 煤炭供應(yīng)商運(yùn)輸合作協(xié)議
- 《花木蘭》兒童故事繪本課件(圖文演講)
- DB12T 1341-2024 消防產(chǎn)品使用和維護(hù)管理規(guī)范
- AQ/T 1119-2023 煤礦井下人員定位系統(tǒng)通 用技術(shù)條件(正式版)
- 幼兒園班級幼兒圖書目錄清單(大中小班)
- 2024-2034年全球及中國年糕行業(yè)市場發(fā)展分析及前景趨勢與投資發(fā)展研究報(bào)告
- 烈士陵園的數(shù)字化轉(zhuǎn)型與智能服務(wù)
- 生理學(xué)重點(diǎn)復(fù)習(xí)資料全
- 初中生理想信念教育班會(3篇模板)
- (高清版)JGT 225-2020 預(yù)應(yīng)力混凝土用金屬波紋管
- 2024年上海市奉賢區(qū)中考一模英語試題(含答案解析)
- 農(nóng)產(chǎn)品加工與貯藏原理復(fù)習(xí)資料
評論
0/150
提交評論