Skip to main content

Natural Language Watermarking

  • Chapter
  • First Online:
Digital Watermarking

Abstract

Nowadays, a mass traffic of Internet is occupied by text data transactions. Because text data is widely distributed, searched, and reused in various applications, it is essential to control the copyright over text as well as other forms of data including video, image, and audio. Semantic and syntactic structures of text are good candidates for embedding watermarks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Manning, C.D., and H. Schütze. 1999. Foundations of statistical natural language processing, vol. 999. MIT Press.

    Google Scholar 

  2. Topkara, M.K. 2007. New designs for improving the efficiency and resilience of natural language watermarking. ProQuest.

    Google Scholar 

  3. Linguistic Data Consortium.

    Google Scholar 

  4. Miller, G., and C. Fellbaum. 1998. Wordnet: An electronic lexical database. MIT Press Cambridge.

    Google Scholar 

  5. Topkara, M., U. Topkara, and M.J. Atallah. 2007. Information hiding through errors: a confusing approach. In Proceedings of the SPIE international conference on security, steganography, and watermarking of multimedia contents.

    Google Scholar 

  6. Meral, H.M., et al. 2007. Syntactic tools for text watermarking. In International society for optics and photonics electronic imaging 2007.

    Google Scholar 

  7. Atallah, M.J., et al. 2002. Natural language watermarking and tamperproofing. In Information hiding. Springer.

    Google Scholar 

  8. Bergmair, R., and S. Katzenbeisser. 2004. Towards human interactive proofs in the text-domain. In Information security, 257–267. Springer.

    Google Scholar 

  9. Ide, N., and J. Vronis. 1998. Word sense disambiguation: the current state of the art. Computational Linguistics, 24(1).

    Google Scholar 

  10. Murphy, B. 2001. Syntactic information hiding in plain text. Trinity College.

    Google Scholar 

  11. Singh, R., and S. Gulwani. 2012. Learning semantic string transformations from examples. Proceedings of the VLDB Endowment 5(8): 740–751.

    Article  Google Scholar 

  12. Ng, V., and C. Cardie. 2002. Improving machine learning approaches to coreference resolution. In Proceedings of the 40th annual meeting on association for computational linguistics. Association for Computational Linguistics.

    Google Scholar 

  13. Jurafsky, D. 2000. Speech & language processing. Pearson Education India.

    Google Scholar 

  14. Xia, F., and M. Palmer. 2001. Converting dependency structures to phrase structures. In Proceedings of the first international conference on Human language technology research. Association for Computational Linguistics.

    Google Scholar 

  15. Manning, D.K.C.D. 2003. Natural language parsing. In Advances in neural information processing systems 15: proceedings of the 2002 conference. MIT Press.

    Google Scholar 

  16. Yuan, D., et al. 2016. Word sense disambiguation with neural language models. arXiv preprint arXiv:1603.07012.

  17. Stolcke, A. 2002. SRILM-an extensible language modeling toolkit. In INTERSPEECH.

    Google Scholar 

  18. Taskiran, C.M., et al. 2006. Attacks on lexical natural language steganography systems. In Electronic Imaging 2006. International Society for Optics and Photonics.

    Google Scholar 

  19. Reiter, E., R. Dale, and Z. Feng. 2000. Building natural language generation systems. Vol. 33. MIT Press.

    Google Scholar 

  20. Bourbeau, L., et al. 1990. Bilingual generation of weather forecasts in an operations environment. In Proceedings of the 13th conference on Computational linguistics, vol 3. Association for Computational Linguistics.

    Google Scholar 

  21. Reiter, E. 2010. Natural language generation. The handbook of computational linguistics and natural language processing, 574–598.

    Google Scholar 

  22. Barzilay, R., and L. Lee. 2003. Learning to paraphrase: An unsupervised approach using multiple-sequence alignment. In Proceedings of the 2003 conference of the North American chapter of the association for computational linguistics on human language technology, Vol. 1. Association for Computational Linguistics.

    Google Scholar 

  23. Rivest, R.L., A. Shamir, and L. Adleman. 1978. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2): 120–126.

    Article  MathSciNet  MATH  Google Scholar 

  24. Schleimer, S., D.S. Wilkerson, and A. Aiken. 2003. Winnowing: local algorithms for document fingerprinting. In Proceedings of the 2003 ACM SIGMOD international conference on Management of data. ACM.

    Google Scholar 

  25. Soricut, R., and D. Marcu. Stochastic language generation using WIDL-expressions and its application in machine translation and summarization. In Proceedings of the 21st international conference on computational linguistics and the 44th annual meeting of the Association for Computational Linguistics. Association for Computational Linguistics.

    Google Scholar 

  26. Atallah, M.J., et al. 2001. Natural language watermarking: Design, analysis, and a proof-of-concept implementation. In Information Hiding. Springer.

    Google Scholar 

  27. Murphy, B., and C. Vogel. 2007. The syntax of concealment: Reliable methods for plain text information hiding. In Electronic Imaging 2007. International Society for Optics and Photonics.

    Google Scholar 

  28. Stutsman, R., et al. 2006. Lost in just the translation. In Proceedings of the 2006 ACM symposium on applied computing. ACM.

    Google Scholar 

  29. Topkara, M., U. Topkara, and M.J. Atallah. 2006. Words are not enough: sentence level natural language watermarking. In Proceedings of the 4th ACM international workshop on Contents protection and security. ACM.

    Google Scholar 

  30. Winstein, K. 1998. Lexical steganography through adaptive modulation of the word choice hash. Unpublished. http://wwwimsa.edu/~keithw/tlex.

  31. Wayner, P. 1992. Mimic functions. Cryptologia 16(3): 193–214.

    Article  MathSciNet  MATH  Google Scholar 

  32. Bergmair, R. 2004. Towards linguistic steganography: A systematic investigation of approaches, systems, and issues. Final year thesis, B. Sc.(Hons.) in Computer Studies, The University of Derby.

    Google Scholar 

  33. Chapman, M., and G. Davida, 2002. Plausible deniability using automated linguistic stegonagraphy. In Infrastructure Security, 276–287. Springer.

    Google Scholar 

  34. Chapman, M., and G. Davida. 1997. Hiding the hidden: A software system for concealing ciphertext as innocuous text. In Information and Communications Security, 335–345.

    Google Scholar 

  35. Bergmair, R. 2007. A bibliography of linguistic steganography. In Proceedings of the SPIE international conference on security, steganography, and watermarking of multimedia contents. Citeseer.

    Google Scholar 

  36. Bender, W., et al. 1996. Techniques for data hiding. IBM Systems Journal, 35(3.4), 313–336.

    Google Scholar 

  37. Atallah, M.J., et al. 2001. Natural language processing for information assurance and security: an overview and implementations. In Proceedings of the 2000 workshop on new security paradigms. ACM.

    Google Scholar 

  38. Nirenburg, S., and V. Raskin, 2004. Ontological semantics.MIT Press.

    Google Scholar 

  39. Ellegård, A., English for the computer: The SUSANNE corpus and analytic scheme.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Ali Nematollahi .

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this chapter

Cite this chapter

Nematollahi, M.A., Vorakulpipat, C., Rosales, H.G. (2017). Natural Language Watermarking. In: Digital Watermarking . Springer Topics in Signal Processing, vol 11. Springer, Singapore. https://doi.org/10.1007/978-981-10-2095-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2095-7_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2094-0

  • Online ISBN: 978-981-10-2095-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics