版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
1、A New Data Hiding Method via Revision History Records on Collaborative Writing PlatformsA New Data Hiding Method via Revision History Records on Collaborative Writing PlatformsINTRODUCTIONBASIC IDEA OF PROPOSED METHODDATA HIDING VIA REVISION HISTORYCONTENTSEXPERIMENTAL RESULTSINTRODUCTIONBennett 200
2、4made a good survey about hiding data in text and classified related techniques into three categories:1. format-based methods;2. random and statistical generation;3. linguistic methods.Collaborative writing means an activity involving more than one author to create an article cooperatively on a comm
3、on platform.Many collaborative writing platforms are available, such as Google Drive, Office Web Apps, Wikipedia, etc., which record revisions generated during the collaborative writing process.The aforementioned methods can only be applied to documents with single authors and single revision versio
4、ns. A new data hiding method is proposed, which simulates a collaborative writing process to generate a fake document, consisting of an article and its revision history, as a camouflage for message bit embedding.BASIC IDEA OF PROPOSED METHODWe assume that only word sequence corrections occur during
5、a revision.Four characteristics of article revisions are identified and utilized to embed secret messages,1. the author of the revision;2. the number of changed word sequences of the revision;3. the changed word sequences in the revision;4. the word sequences selected from the collaborative writing
6、database DBcw, which replace those of (3).DATA HIDING VIA REVISION HISTORY1 Collaborative Writing Database ConstructionFor example, assume Di = “National Chia Tang University” andDi1 = “National Chiao Tung University.” Then, the correction pair = is generated and included into DBcw.LCS Algorithm2 Se
7、cret Message EmbeddingIn the phase of message embedding with a cover document D0 as the input, the proposed system is designed to generate a stego-document D with consecutive revisions D0, D1, D2, . . . , Dn by producing a previous revision Di from the current revision Di1 repeatedly until the entir
8、e message is embedded.2.1 Encoding the Authors of Revisions for Data HidingAt first we select a group of simulated authors, with each author being assigned a unique code a, called author a. Then, if the message bits to be embedded form a code aj , then we assign author aj to the previous revision Di
9、 as its author to achieve embedding of message bits aj into Di.2.2 Using the Number of Changed Word Sequences for Data HidingWe select some word sequences in Di1 and changedthem into other ones in Di . It is desired to use as well the number Ng of word sequences changed in this process as a message-
10、bit carrier.several problems:1. the dependency problem,2. the selection problem,3. the consecutiveness problem,1. the dependency problem,We say that two word sequences in Di1 are dependent if some identical words appear in both of them, and changing word sequences with this property in Di1 will caus
11、e conflicts, leading to a dependency problem.The solution:(1) Decompose Qr into a set of lists, I = I1, I2, . . . , Iu, with each list Ii including a group of mutually dependent word and every two word sequences in two different lists, respectively, in I being independent of each other;(2)Select onl
12、y word sequences from different lists in set I and change them to construct a new revision.2. the selection problem,We adopt the Huffman coding technique to create Huffman codes uniquely for the word sequences in Qr according to their usage frequencies, and select word sequences with their codes ide
13、ntical to the message bits to be embedded.The solution:To solve this selection problem, suppose that based on the use of a key, we randomly assign the word sequences in Qr consecutively into Ng groups G1 through GNg , each group including multiple,but distinct, word sequences.3. the consecutiveness problem,Di-1DiThe solution:We choose a splitting point:3 Secret message extractionEXPERIMENTAL RESULTSAn example of generated stego-documents on constructed Wiki site with input secret message “Art is long, life is short.”We have tried to apply Algorithm 1 to two adja
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 二零二四年度專業(yè)展覽場地租賃合同涵蓋展臺(tái)搭建與拆解3篇
- 二零二四年度新能源設(shè)備投資合作合同范本大全3篇
- 2025年勞務(wù)派遣合同風(fēng)險(xiǎn)協(xié)議
- 二零二五年度大型活動(dòng)安保服務(wù)項(xiàng)目合同范本2篇
- 北京版二下期末數(shù)學(xué)試卷
- 包頭市高考數(shù)學(xué)試卷
- 大連高三模擬數(shù)學(xué)試卷
- MOF-EG-MWCNT基復(fù)合相變材料性能及在鋰電池?zé)峁芾響?yīng)用
- 基于深度確定性策略梯度算法的量子系統(tǒng)控制
- 2025年度葡萄酒年份酒投資管理合同
- 國家中醫(yī)藥管理局發(fā)布的406種中醫(yī)優(yōu)勢病種診療方案和臨床路徑目錄
- 2024年全國甲卷高考化學(xué)試卷(真題+答案)
- 汽車修理廠管理方案
- 人教版小學(xué)數(shù)學(xué)一年級(jí)上冊(cè)小學(xué)生口算天天練
- (正式版)JBT 5300-2024 工業(yè)用閥門材料 選用指南
- 三年級(jí)數(shù)學(xué)添括號(hào)去括號(hào)加減簡便計(jì)算練習(xí)400道及答案
- 蘇教版五年級(jí)上冊(cè)數(shù)學(xué)簡便計(jì)算300題及答案
- 澳洲牛肉行業(yè)分析
- 老客戶的開發(fā)與技巧課件
- 計(jì)算機(jī)江蘇對(duì)口單招文化綜合理論試卷
- 成人學(xué)士學(xué)位英語單詞(史上全面)
評(píng)論
0/150
提交評(píng)論