{"title":"基于混沌的文本零水印主动攻击","authors":"Lu He, Xiaolin Gui","doi":"10.1109/ANTHOLOGY.2013.6784740","DOIUrl":null,"url":null,"abstract":"Without modified cover text, zero-watermarking technology makes steganalysis technology is completely ineffective. However, as far as the resilient of active attack, there's no deep study currently. In this paper, the text zero-watermarking algorithm based on chaotic map, which has a better robustness, is regarded as the attack target. By synonym substitution, two kinds of attack methods: Sync-attack and Birthday-attack has been determined. Then a text watermark algorithm for lexical active attack was proposed by combining the two methods. Experiments show that the algorithm can effectively destroy the zero-watermark without massive rewrite texts.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"An active attack on chaotic based text zero-watermarking\",\"authors\":\"Lu He, Xiaolin Gui\",\"doi\":\"10.1109/ANTHOLOGY.2013.6784740\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Without modified cover text, zero-watermarking technology makes steganalysis technology is completely ineffective. However, as far as the resilient of active attack, there's no deep study currently. In this paper, the text zero-watermarking algorithm based on chaotic map, which has a better robustness, is regarded as the attack target. By synonym substitution, two kinds of attack methods: Sync-attack and Birthday-attack has been determined. Then a text watermark algorithm for lexical active attack was proposed by combining the two methods. Experiments show that the algorithm can effectively destroy the zero-watermark without massive rewrite texts.\",\"PeriodicalId\":203169,\"journal\":{\"name\":\"IEEE Conference Anthology\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Conference Anthology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ANTHOLOGY.2013.6784740\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Conference Anthology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTHOLOGY.2013.6784740","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An active attack on chaotic based text zero-watermarking
Without modified cover text, zero-watermarking technology makes steganalysis technology is completely ineffective. However, as far as the resilient of active attack, there's no deep study currently. In this paper, the text zero-watermarking algorithm based on chaotic map, which has a better robustness, is regarded as the attack target. By synonym substitution, two kinds of attack methods: Sync-attack and Birthday-attack has been determined. Then a text watermark algorithm for lexical active attack was proposed by combining the two methods. Experiments show that the algorithm can effectively destroy the zero-watermark without massive rewrite texts.