Browse > Article
http://dx.doi.org/10.3745/KIPSTB.2009.16-B.1.79

Text Watermarking Based on Syntactic Constituent Movement  

Kim, Mi-Young (성신여자대학교 컴퓨터정보학부)
Abstract
This paper explores a method of text watermarking for agglutinative languages and develops a syntactic tree-based syntactic constituent movement scheme. Agglutinative languages provide a good ground for the syntactic tree-based natural language watermarking because syntactic constituent order is relatively free. Our proposed natural language watermarking method consists of seven procedures. First, we construct a syntactic dependency tree of unmarked text. Next, we perform clausal segmentation from the syntactic tree. Third, we choose target syntactic constituents, which will move within its clause. Fourth, we determine the movement direction of the target constituents. Then, we embed a watermark bit for each target constituent. Sixth, if the watermark bit does not coincide with the direction of the target constituent movement, we displace the target constituent in the syntactic tree. Finally, from the modified syntactic tree, we obtain a marked text. From the experimental results, we show that the coverage of our method is 91.53%, and the rate of unnatural sentences of marked text is 23.16%, which is better than that of previous systems. Experimental results also show that the marked text keeps the same style, and it has the same information without semantic distortion.
Keywords
Natural Language Watermarking; Text Security; Syntactic Constituent Movement; Syntactic Analysis;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H. M. Meral, E. Sevinc, E. Unkar, B. Sankur, A. S. Ozsoy and T. Gungor, “Syntactic tools for text watermarking,” In Proc. of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, pp.1-12, 2007
2 I.Cox, M. L. Miller, J. A. Bloom and M. Kaufman, “Digital Watermarking,” Digital Watermarking, pp.1-40, 2002
3 M. Topkara, C. M. Taskiran and E. J. Delp, “Natural language watermarking,” SPIE Conf. On Security, Steganography and Watermarking of Multimedia Contents, pp.441-452, 2005   DOI
4 권재일, “한국어 문법의 연구”, 서울:박이정, 1994
5 K. Papineni, S. Roukos, T. Ward and W. Zhu, “Blue: a method for automatic evaluation of machine translation” In Proc. of 40th Annual Meeting of the ACL, pp.311-318, 2002
6 National Institute of Standards and Technology. Machine translations benchmark tests provided by national institute of standards and technology. In http://www.nist.gov/speech/tests/mt/resources/
7 C. M. Taskiran, M. Topkara and E. J. Delp, “Attacks on linguistic steganography systems using text analysis,” SPIE Conf. On Security, Steganography and Watermarking of Multimedia Contents, pp.313-336, 2006
8 U. Topkara, M. Topkara and M. J. Atallah, “The hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural language Text through Synonym Substitutiions,” In Proc. Of ACM Multimedia and Security Conference, pp.164-174, 2006
9 M. J. Atallah, V. Raskin, M. Crogan, C. Hempelmann, F. Kerschbaum, D. Mohamed and S. Naik. “Natural language watermarking: design, analysis, and proof-of-concept implementation,” In Proc. of the International Information Hiding Workshop, pp.185-199, 2001
10 M. Atallah, V. Raskin, C. F. Hempelmann, M. Karahan, R. Sion, K. E. Triezenberg and U. Topkara, “Natural language watermarking and tamperproofing,” Lecture Notes in Computer Sciences, pp.196-212, 2002   DOI   ScienceOn
11 Osamu Takizawa, Kyoko Makino, Tsutomu Matsumoto, Hiroshi Nakagawa and Ichiro Murase, “Method of Hiding Information in Agglutinative Language Documents Using Adjustment to New Line Positions”. Knowledge-Based Intelligent Information and Engineering Systems(KES) (3) pp.1039-1048, 2005
12 M. Y. Kim, S. J. Kang and J. H. Lee, “Resolving Ambiguity in Inter-chunk Dependency Parsing,” Proc. of the Sixth Natural Language Processing Pacific Rim Symposium(NLPRS), pp.263-270, 2001
13 Y. L. Chiang, L. P. Chang, W. T. Hsieh and W. C. Chen, “Natural language watermarking using semantic substitution for Chinese text,” Lecture Notes in Computer Science, pp. 129-140, 2004
14 M. Topkara, U. Topkara and M. J. Atallah, “Words are not enough: sentence level natural language watermarking”, In Proc. of 4th ACM Workshop on Content Protection and Security (in conjunction with ACM Multimedia), pp.37-46, 2006   DOI