Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation. Atallah, M. J., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., & Naik, S. In Information Hiding, of Lecture Notes in Computer Science, pages 185–200. Springer Berlin Heidelberg, April, 2001. 00000
Paper doi abstract bibtex We describe a scheme for watermarking natural language text by embedding small portions of the watermark bit string in the syntactic structure of a number of selected sentences in the text, with both the selection and embedding keyed (via quadratic residue) to a large prime number. Meaning-preserving transformations of sentences of the text (e.g., translation to another natural language) cannot damage the watermark. Meaning-modifying transformations have a probability, of damaging the watermark, proportional to the watermark length over the number of sentences. Having the key is all that is required for reading the watermark. The approach is best suited for longish meaning-rather than style-oriented ”expository” texts (e.g., reports, directives, manuals, etc.), of which governments and industry produce in abundance and which need protection more frequently than fiction or poetry, which are not so tolerant of the small meaning-preserving syntactic changes that the scheme implements.
@incollection{atallah_natural_2001,
series = {Lecture {Notes} in {Computer} {Science}},
title = {Natural {Language} {Watermarking}: {Design}, {Analysis}, and a {Proof}-of-{Concept} {Implementation}},
copyright = {©2001 Springer-Verlag Berlin Heidelberg},
isbn = {978-3-540-42733-9 978-3-540-45496-0},
shorttitle = {Natural {Language} {Watermarking}},
url = {http://link.springer.com/chapter/10.1007/3-540-45496-9_14},
abstract = {We describe a scheme for watermarking natural language text by embedding small portions of the watermark bit string in the syntactic structure of a number of selected sentences in the text, with both the selection and embedding keyed (via quadratic residue) to a large prime number. Meaning-preserving transformations of sentences of the text (e.g., translation to another natural language) cannot damage the watermark. Meaning-modifying transformations have a probability, of damaging the watermark, proportional to the watermark length over the number of sentences. Having the key is all that is required for reading the watermark. The approach is best suited for longish meaning-rather than style-oriented ”expository” texts (e.g., reports, directives, manuals, etc.), of which governments and industry produce in abundance and which need protection more frequently than fiction or poetry, which are not so tolerant of the small meaning-preserving syntactic changes that the scheme implements.},
language = {en},
number = {2137},
urldate = {2016-07-15},
booktitle = {Information {Hiding}},
publisher = {Springer Berlin Heidelberg},
author = {Atallah, Mikhail J. and Raskin, Victor and Crogan, Michael and Hempelmann, Christian and Kerschbaum, Florian and Mohamed, Dina and Naik, Sanket},
editor = {Moskowitz, Ira S.},
month = apr,
year = {2001},
doi = {10.1007/3-540-45496-9_14},
note = {00000 },
keywords = {Business Strategy/Leadership, Computers and Society, Data Encryption, Management of Computing and Information Systems, Operating Systems, Special Purpose and Application-Based Systems},
pages = {185--200},
}
Downloads: 0
{"_id":"XBdNtYRugZE9xGCkC","bibbaseid":"atallah-raskin-crogan-hempelmann-kerschbaum-mohamed-naik-naturallanguagewatermarkingdesignanalysisandaproofofconceptimplementation-2001","author_short":["Atallah, M. J.","Raskin, V.","Crogan, M.","Hempelmann, C.","Kerschbaum, F.","Mohamed, D.","Naik, S."],"bibdata":{"bibtype":"incollection","type":"incollection","series":"Lecture Notes in Computer Science","title":"Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation","copyright":"©2001 Springer-Verlag Berlin Heidelberg","isbn":"978-3-540-42733-9 978-3-540-45496-0","shorttitle":"Natural Language Watermarking","url":"http://link.springer.com/chapter/10.1007/3-540-45496-9_14","abstract":"We describe a scheme for watermarking natural language text by embedding small portions of the watermark bit string in the syntactic structure of a number of selected sentences in the text, with both the selection and embedding keyed (via quadratic residue) to a large prime number. Meaning-preserving transformations of sentences of the text (e.g., translation to another natural language) cannot damage the watermark. Meaning-modifying transformations have a probability, of damaging the watermark, proportional to the watermark length over the number of sentences. Having the key is all that is required for reading the watermark. The approach is best suited for longish meaning-rather than style-oriented ”expository” texts (e.g., reports, directives, manuals, etc.), of which governments and industry produce in abundance and which need protection more frequently than fiction or poetry, which are not so tolerant of the small meaning-preserving syntactic changes that the scheme implements.","language":"en","number":"2137","urldate":"2016-07-15","booktitle":"Information Hiding","publisher":"Springer Berlin Heidelberg","author":[{"propositions":[],"lastnames":["Atallah"],"firstnames":["Mikhail","J."],"suffixes":[]},{"propositions":[],"lastnames":["Raskin"],"firstnames":["Victor"],"suffixes":[]},{"propositions":[],"lastnames":["Crogan"],"firstnames":["Michael"],"suffixes":[]},{"propositions":[],"lastnames":["Hempelmann"],"firstnames":["Christian"],"suffixes":[]},{"propositions":[],"lastnames":["Kerschbaum"],"firstnames":["Florian"],"suffixes":[]},{"propositions":[],"lastnames":["Mohamed"],"firstnames":["Dina"],"suffixes":[]},{"propositions":[],"lastnames":["Naik"],"firstnames":["Sanket"],"suffixes":[]}],"editor":[{"propositions":[],"lastnames":["Moskowitz"],"firstnames":["Ira","S."],"suffixes":[]}],"month":"April","year":"2001","doi":"10.1007/3-540-45496-9_14","note":"00000 ","keywords":"Business Strategy/Leadership, Computers and Society, Data Encryption, Management of Computing and Information Systems, Operating Systems, Special Purpose and Application-Based Systems","pages":"185–200","bibtex":"@incollection{atallah_natural_2001,\n\tseries = {Lecture {Notes} in {Computer} {Science}},\n\ttitle = {Natural {Language} {Watermarking}: {Design}, {Analysis}, and a {Proof}-of-{Concept} {Implementation}},\n\tcopyright = {©2001 Springer-Verlag Berlin Heidelberg},\n\tisbn = {978-3-540-42733-9 978-3-540-45496-0},\n\tshorttitle = {Natural {Language} {Watermarking}},\n\turl = {http://link.springer.com/chapter/10.1007/3-540-45496-9_14},\n\tabstract = {We describe a scheme for watermarking natural language text by embedding small portions of the watermark bit string in the syntactic structure of a number of selected sentences in the text, with both the selection and embedding keyed (via quadratic residue) to a large prime number. Meaning-preserving transformations of sentences of the text (e.g., translation to another natural language) cannot damage the watermark. Meaning-modifying transformations have a probability, of damaging the watermark, proportional to the watermark length over the number of sentences. Having the key is all that is required for reading the watermark. The approach is best suited for longish meaning-rather than style-oriented ”expository” texts (e.g., reports, directives, manuals, etc.), of which governments and industry produce in abundance and which need protection more frequently than fiction or poetry, which are not so tolerant of the small meaning-preserving syntactic changes that the scheme implements.},\n\tlanguage = {en},\n\tnumber = {2137},\n\turldate = {2016-07-15},\n\tbooktitle = {Information {Hiding}},\n\tpublisher = {Springer Berlin Heidelberg},\n\tauthor = {Atallah, Mikhail J. and Raskin, Victor and Crogan, Michael and Hempelmann, Christian and Kerschbaum, Florian and Mohamed, Dina and Naik, Sanket},\n\teditor = {Moskowitz, Ira S.},\n\tmonth = apr,\n\tyear = {2001},\n\tdoi = {10.1007/3-540-45496-9_14},\n\tnote = {00000 },\n\tkeywords = {Business Strategy/Leadership, Computers and Society, Data Encryption, Management of Computing and Information Systems, Operating Systems, Special Purpose and Application-Based Systems},\n\tpages = {185--200},\n}\n\n","author_short":["Atallah, M. J.","Raskin, V.","Crogan, M.","Hempelmann, C.","Kerschbaum, F.","Mohamed, D.","Naik, S."],"editor_short":["Moskowitz, I. S."],"key":"atallah_natural_2001","id":"atallah_natural_2001","bibbaseid":"atallah-raskin-crogan-hempelmann-kerschbaum-mohamed-naik-naturallanguagewatermarkingdesignanalysisandaproofofconceptimplementation-2001","role":"author","urls":{"Paper":"http://link.springer.com/chapter/10.1007/3-540-45496-9_14"},"keyword":["Business Strategy/Leadership","Computers and Society","Data Encryption","Management of Computing and Information Systems","Operating Systems","Special Purpose and Application-Based Systems"],"metadata":{"authorlinks":{}},"html":""},"bibtype":"incollection","biburl":"https://bibbase.org/zotero/brunocpt","dataSources":["9N7FyBLqJ5Q2Suqzs"],"keywords":["business strategy/leadership","computers and society","data encryption","management of computing and information systems","operating systems","special purpose and application-based systems"],"search_terms":["natural","language","watermarking","design","analysis","proof","concept","implementation","atallah","raskin","crogan","hempelmann","kerschbaum","mohamed","naik"],"title":"Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation","year":2001}