2010 IEEE 34th Annual Computer Software and Applications Conference Workshops 2010
DOI: 10.1109/compsacw.2010.37
|View full text |Cite
|
Sign up to set email alerts
|

Natural Language Watermarking Based on Syntactic Displacement and Morphological Division

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…After deleting and tamper attack when some fragments are deleted or changed, the destroyed fragment is recovered using other correct fragments that are embedded in the phrases. Kim et al [66] proposed a method that is based on syntactic displacement and morphological division in natural language watermarking for Korean. Syntax-based watermarking is used in this approach, usually, a Korean Wireless Communications and Mobile Computing word consists of function morpheme and content morpheme.…”
Section: Existing Techniques Of Text Watermarkingmentioning
confidence: 99%
“…After deleting and tamper attack when some fragments are deleted or changed, the destroyed fragment is recovered using other correct fragments that are embedded in the phrases. Kim et al [66] proposed a method that is based on syntactic displacement and morphological division in natural language watermarking for Korean. Syntax-based watermarking is used in this approach, usually, a Korean Wireless Communications and Mobile Computing word consists of function morpheme and content morpheme.…”
Section: Existing Techniques Of Text Watermarkingmentioning
confidence: 99%
“…The text typically consists of several words, sentences, verbs, nouns, adverbs, adjectives, and so on. Several linguistic-based approaches have used characteristics such as synonyms, abbreviations, the similarity of words, and so on, to embed secret bits into a CM [ 17 , 62 , 70 , 71 , 80 , 81 , 82 , 83 , 84 , 85 , 106 , 109 ]. In general, we can classify the linguistic based approaches into two types: syntactic and semantic.…”
Section: Various Types Of Text Hiding Techniquesmentioning
confidence: 99%
“…Semantic methods work based on the specific language characteristics by modifying the semantic attributes of the CM to mark/embed the SM bits . These attributes include the spelling of words, abbreviations, synonyms, acronyms, and so on [ 62 , 70 , 71 , 75 , 82 , 84 ]. The advantage of the semantic-based methods is that they protect the HM against retyping attacks or the use of OCR software [ 111 ].…”
Section: Various Types Of Text Hiding Techniquesmentioning
confidence: 99%
“…The authors utilized displacing syntactic adverbials attribute that most languages allow displacement of syntactic adverbials within its part. Moreover, they claim that proposed method does not change the general meaning of the sentences, but practically it alters the meaning of text slightly [38]. Halvani et al (2013) proposed four methods to hide the watermark bits either by lexical or syntactic alteration, and those are designed for the German language.…”
Section: Linguistic (Natural Languagementioning
confidence: 99%