首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--一般性问题论文--安全保密论文

Constituent Structures Based Technique of Natural Language Watermarking

TABLE OF CONTENTS第5-7页
List of Figures第7-8页
List of Tables第8-10页
ABSTRACT第10-11页
CHAPTER 1. INTRODUCTION第12-15页
    1.1 Background and motivation第12-14页
    1.2 Aims第14页
    1.3 Organization of the thesis第14-15页
CHAPTER 2. DIGITAL WATERMARKING TECHNIQUES第15-27页
    2.1 Introduction第15-17页
    2.2 Basic Watermarking Principles第17-20页
    2.3 Watermarking Terminologies第20-21页
    2.4 Watermarking Applications第21-23页
        2.4.1 Watermarking for Copyright Protection第21-22页
        2.4.2 Fingerprinting for Traitor Tracking第22页
        2.4.3 Watermarking for Copy Protection第22-23页
        2.4.4 Watermarking for Media Authentication第23页
    2.5 Requirements and Algorithmic Design Issues第23-27页
        2.5.1 Imperceptibility第24-25页
        2.5.2 Robustness第25-27页
CHAPTER 3. WATERMARKING NATURAL LANGUAGE TEXT第27-36页
    3.1 Natural Language watermarking overview第27-28页
    3.2 Natural Language Transformations and Resources第28-34页
        3.2.1 Applying Linguistic Transformations第28-31页
        3.2.2 Natural Language Parsing and Processing (NLP)第31-33页
        3.2.3 Natural Language Generation第33-34页
    3.3 Previous Work on Natural Language Steganography第34-36页
        3.3.1 Using Probabilistic Context Free Grammars第34-35页
        3.3.2 Information Embedding Through Synonym Substitutions第35页
        3.3.3 Generating Cover Text Using Hybrid Techniques第35-36页
CHAPTER 4. IMPLEMENTATION AND RESULTS第36-58页
    4.1 Project Development第36页
    4.2 Resources第36-38页
        4.2.1 The Link Grammar Parser第36-37页
        4.2.2 Cryptographic pseudorandom sequences第37页
        4.2.3 Quadratic residues第37页
        4.2.4 Synonymizer第37-38页
    4.3 Algorithm第38-41页
    4.4 Text selection第41-45页
    4.5 Watermark embedding第45-50页
    4.6 Watermark recovery第50-51页
    4.7 Experimental Results and Performance Analysis第51-58页
        4.7.1 Regular Tests第51-53页
        4.7.2 Attack tests第53-54页
        4.7.3 Synonym substitution, deletions, additions and passivizing attacks第54-58页
CONCLUSION第58-60页
    1. Conclusion第58页
    2. Future Research第58-60页
References第60-65页
List of Published Papers第65-66页
ACKNOWLEDGMENTS第66页
DEDICATION第66页

论文共66页,点击 下载论文
上一篇:g-期望的一个性质
下一篇:Research on Sequence Similarity Search Using Fractal Features of Proteins