{"title":"An active attack on chaotic based text zero-watermarking","authors":"Lu He, Xiaolin Gui","doi":"10.1109/ANTHOLOGY.2013.6784740","DOIUrl":null,"url":null,"abstract":"Without modified cover text, zero-watermarking technology makes steganalysis technology is completely ineffective. However, as far as the resilient of active attack, there's no deep study currently. In this paper, the text zero-watermarking algorithm based on chaotic map, which has a better robustness, is regarded as the attack target. By synonym substitution, two kinds of attack methods: Sync-attack and Birthday-attack has been determined. Then a text watermark algorithm for lexical active attack was proposed by combining the two methods. Experiments show that the algorithm can effectively destroy the zero-watermark without massive rewrite texts.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Conference Anthology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTHOLOGY.2013.6784740","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Without modified cover text, zero-watermarking technology makes steganalysis technology is completely ineffective. However, as far as the resilient of active attack, there's no deep study currently. In this paper, the text zero-watermarking algorithm based on chaotic map, which has a better robustness, is regarded as the attack target. By synonym substitution, two kinds of attack methods: Sync-attack and Birthday-attack has been determined. Then a text watermark algorithm for lexical active attack was proposed by combining the two methods. Experiments show that the algorithm can effectively destroy the zero-watermark without massive rewrite texts.