版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、A New Data Hiding Method via Revision History Records on Collaborative Writing PlatformsA New Data Hiding Method via Revision History Records on Collaborative Writing PlatformsINTRODUCTIONBASIC IDEA OF PROPOSED METHODDATA HIDING VIA REVISION HISTORYCONTENTSEXPERIMENTAL RESULTSINTRODUCTIONBennett 200
2、4made a good survey about hiding data in text and classified related techniques into three categories:1. format-based methods;2. random and statistical generation;3. linguistic methods.Collaborative writing means an activity involving more than one author to create an article cooperatively on a comm
3、on platform.Many collaborative writing platforms are available, such as Google Drive, Office Web Apps, Wikipedia, etc., which record revisions generated during the collaborative writing process.The aforementioned methods can only be applied to documents with single authors and single revision versio
4、ns. A new data hiding method is proposed, which simulates a collaborative writing process to generate a fake document, consisting of an article and its revision history, as a camouflage for message bit embedding.BASIC IDEA OF PROPOSED METHODWe assume that only word sequence corrections occur during
5、a revision.Four characteristics of article revisions are identified and utilized to embed secret messages,1. the author of the revision;2. the number of changed word sequences of the revision;3. the changed word sequences in the revision;4. the word sequences selected from the collaborative writing
6、database DBcw, which replace those of (3).DATA HIDING VIA REVISION HISTORY1 Collaborative Writing Database ConstructionFor example, assume Di = “National Chia Tang University” andDi1 = “National Chiao Tung University.” Then, the correction pair = is generated and included into DBcw.LCS Algorithm2 Se
7、cret Message EmbeddingIn the phase of message embedding with a cover document D0 as the input, the proposed system is designed to generate a stego-document D with consecutive revisions D0, D1, D2, . . . , Dn by producing a previous revision Di from the current revision Di1 repeatedly until the entir
8、e message is embedded.2.1 Encoding the Authors of Revisions for Data HidingAt first we select a group of simulated authors, with each author being assigned a unique code a, called author a. Then, if the message bits to be embedded form a code aj , then we assign author aj to the previous revision Di
9、 as its author to achieve embedding of message bits aj into Di.2.2 Using the Number of Changed Word Sequences for Data HidingWe select some word sequences in Di1 and changedthem into other ones in Di . It is desired to use as well the number Ng of word sequences changed in this process as a message-
10、bit carrier.several problems:1. the dependency problem,2. the selection problem,3. the consecutiveness problem,1. the dependency problem,We say that two word sequences in Di1 are dependent if some identical words appear in both of them, and changing word sequences with this property in Di1 will caus
11、e conflicts, leading to a dependency problem.The solution:(1) Decompose Qr into a set of lists, I = I1, I2, . . . , Iu, with each list Ii including a group of mutually dependent word and every two word sequences in two different lists, respectively, in I being independent of each other;(2)Select onl
12、y word sequences from different lists in set I and change them to construct a new revision.2. the selection problem,We adopt the Huffman coding technique to create Huffman codes uniquely for the word sequences in Qr according to their usage frequencies, and select word sequences with their codes ide
13、ntical to the message bits to be embedded.The solution:To solve this selection problem, suppose that based on the use of a key, we randomly assign the word sequences in Qr consecutively into Ng groups G1 through GNg , each group including multiple,but distinct, word sequences.3. the consecutiveness problem,Di-1DiThe solution:We choose a splitting point:3 Secret message extractionEXPERIMENTAL RESULTSAn example of generated stego-documents on constructed Wiki site with input secret message “Art is long, life is short.”We have tried to apply Algorithm 1 to two adja
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2026年开封市鼓楼区网格员招聘考试模拟试题及答案解析
- 2026年黑龙江省佳木斯市网格员招聘笔试模拟试题及答案解析
- 2026年湖南省岳阳市网格员招聘考试参考试题及答案解析
- 2026年中级挖机技术模拟题附答案详解【完整版】
- 2026年中医师承-确有专长综合提升测试卷及答案详解【典优】
- 2026年“物业管理及公共服务”等知识考前冲刺训练试卷带答案详解(突破训练)
- 2026年质量员继续教育模考模拟试题带答案详解(培优)
- 初中九年级历史一轮复习教案:隋唐盛世下的制度创新、经济繁荣与文明交流
- 2025年心理咨询师高级认证模拟题及答案详解
- 2025年体育职业技能鉴定考试机考真题集(重点)附答案详解
- 2025年重庆市从“五方面人员”中选拔乡镇领导班子成员考试历年参考题库含答案详解
- 安徽省2025-2026学年八年级下学期期中道德与法治试卷(含答案)
- 2026年中国中煤能源集团有限公司校园招聘笔试参考试题及答案解析
- 中国电信网络工程师岗位介绍及招聘要求
- 工会事业单位财会制度
- 神经内科诊疗指南及技术操作规范
- esh知识培训教学课件
- 公务员压力管理能力提升
- 2025年那曲地区聂荣县辅警招聘考试题库附答案解析
- 甲状腺癌诊疗指南(2025版)
- 电力监理知识培训内容课件
评论
0/150
提交评论