Proceedings of the 2000 Workshop on New Security Paradigms 2001
DOI: 10.1145/366173.366190
|View full text |Cite
|
Sign up to set email alerts
|

Natural language processing for information assurance and security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
40
0
1

Year Published

2005
2005
2017
2017

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 92 publications
(41 citation statements)
references
References 7 publications
0
40
0
1
Order By: Relevance
“…Un ejemplo puede ser el diseño de sistemas que mediante el uso del lenguaje natural permiten crear sistemas de memorización de claves de acceso (password) más seguros, claves más difíciles de deducir por un atacante pero fáciles de memorizar para el usuario legítimo (Atallah, McDonough, Raskin y Nirenburg, 2000).…”
Section: Lingüística Computacional Y Esteganogra-fía Lingüística Ocuunclassified
“…Un ejemplo puede ser el diseño de sistemas que mediante el uso del lenguaje natural permiten crear sistemas de memorización de claves de acceso (password) más seguros, claves más difíciles de deducir por un atacante pero fáciles de memorizar para el usuario legítimo (Atallah, McDonough, Raskin y Nirenburg, 2000).…”
Section: Lingüística Computacional Y Esteganogra-fía Lingüística Ocuunclassified
“…To the best of our knowledge, the only NL watermarking systems are those proposed by Atallah et al. 13,24,25 …”
Section: Previous Work On Natural Language Watermarkingmentioning
confidence: 99%
“…The idea of employing the semantics and syntax of text for inserting watermarks was first proposed by Atallah et al 24 in 2000, where ASCII values of the words were used for embedding information into text by performing lexical substitution in synonym sets.…”
Section: Synonym Substitution Based On Quadratic Residuesmentioning
confidence: 99%
“…The format-based methods always hide message by character spaces assignment, line shifting and word shifting [1], changing font format in compound documents or some sole characteristics in specific documents [2]. Linguistic steganography referred to natural language steganogra- phy [3], mainly uses mimicking techniques to directly generate a new cover text [4], or linguistically modifies content of cover text by synonym substitution (SS) [5]- [11], syntactic transformation [12], [13], or translation [14], [15] to camouflage the secret message. Synonym substitution is the major and famous transformation used in linguistic steganography.…”
Section: Introductionmentioning
confidence: 99%