期刊文献+

针对文本水印摘要攻击的语义损失量评估方法 被引量:2

Method of meaning loss evaluation for summary attack in text watermarking
在线阅读 下载PDF
导出
摘要 为了控制文本水印自动摘要攻击造成的语义信息损失,在已有的自动摘要评估方法的基础上,针对自动摘要文本水印攻击算法提出一种评估文本语义损失度的算法。该方法通过量化句子语义,合理计算摘要攻击造成的语义损失;并分析了攻击造成语义损失的主要因素,以及这些因素和语义损失量之间的数学关系。该方法能够从语义信息损失的角度更真实地评测摘要攻击算法的失真度,实现了自动化评估。 Summary attack on natural language watermarking was likely to cause excessive loss of the texts’ original meaning.In order to control the loss,this paper proposed a method based on the existing evaluation method of automatic summarization.It quantized the meaning of every sentences,then evaluated the meaning loss which caused by the summary attack.It analyzed the major factors of meaning loss,as well as the relationship between these factors and the meaning loss.This method gave the attack algorithm’s distortion a more realistic evaluation and was an automatic evaluation method
出处 《计算机应用研究》 CSCD 北大核心 2012年第9期3483-3485,3488,共4页 Application Research of Computers
基金 陕西省教育厅2009年度科学研究计划资助项目(09JK751)
关键词 语义损失量 摘要攻击 文本水印 自动摘要 meaning loss summary attack text watermarking automatic summarization
作者简介 张雅轩(1987-),女,陕西西安人,硕士,主要研究方向为自然语言信息隐藏技术(zhangyaxuan310@163.com); 何路,男,讲师,博士研究生,主要研究方向为网络与信息安全、数字内容安全、自然语言信息隐藏; 房鼎益,男,教授,博导,主要研究方向为网络与信息安全、分布计算系统和软件安全与保护等.
  • 相关文献

参考文献11

  • 1HE Lu,GUI Xiao-lin, JIN Yao-ping. Summary attack on spread spectrum vector natural language watermarking [ J ]. Journal of Computational Information Systems, 2012,8(4) :l-8.
  • 2薛存金,苏奋振,周军其.最佳结构元素尺寸的自适应确定算法[J].中国图象图形学报,2006,11(3):317-324. 被引量:5
  • 3张培颖.基于语义相似度的自动文摘评价方法[J].计算机工程与应用,2009,45(25):145-147. 被引量:3
  • 4蒋勇铭,陈微熙,张仲贵.基于句子相似度的自动文摘评价方法[J].中国西部科技,2011,10(29):22-23. 被引量:4
  • 5刘挺,王开铸.自动文摘的四种主要方法[J].情报学报,1999,18(1):10-19. 被引量:55
  • 6RADEV D R, JING Hong-yan, BUDZIKOWSKA M. Centroid-based summarization of multiple documents [ J ]. Information Processing and Management, 2004,40(6) :919-938.
  • 7RADEV D,BLITZER J, WINKEL A, et al. MEAD [EB/OL].(2003-11-21). http://www. summarization, com/mead/.
  • 8西北大学信息学院数字内容安全研究小组.自动攻击[EB/0L]. http ://dc-security. org/download/autoattacker. html.
  • 9ANI H A, NENKOVA A,PASSONNEAU R,et al. Automation of summary evaluation by the pyramid method [ C ] //Proc of Conference of Recent Advances in Natural Language Processing. 2005,.
  • 10RADEV D, ALLISON T,GOLDENSOHN S B ,et al. MEAD:a platform for multidocument multilingual text summarization [ C ] //Proc of the 4th International Conference on Language Resources and Evaluation. 2004.

二级参考文献35

  • 1苏海菊,王永成.中文科技文献文摘的自动编写[J].情报学报,1989,8(6):433-439. 被引量:26
  • 2莫燕,王永成.中文文献摘要的自动编制[J].现代图书情报技术,1993(3):10-12. 被引量:15
  • 3金博,史彦军,滕弘飞.基于语义理解的文本相似度算法[J].大连理工大学学报,2005,45(2):291-297. 被引量:80
  • 4李明.从字频统计出发的中文文摘自动编写[J].现代图书情报技术,1996(3):42-45. 被引量:20
  • 5Radev D R,Jing Hong yan,Stysm,et al.Centroid based summarization of multiple documents[J].Information Processing and Management, 2004,40: 919-938.
  • 6Gong Yi hong,LIU Xin.Genefic text summarization using relevance measure and latent semantic analysis[C]//Proc of ACM SIGIR'01. New Orleans:ACM Press , 2001:19-25.
  • 7Yang Lingpeng,Ji Donghong,Li Tang.Document re-ranking based on global and local terms[C]//Proceedings of 3rd ACL SIGHAN Workshop.Barcelona, Spain: [s.n.], 2004: 17-23.
  • 8Hofmann T.Probabilistic latent semantic indexing[C]//Proceedings of the 22nd International Conference on Research and Development in Information Retrieval.Berkeley,California:[s.n.],1999:50-57.
  • 9Hofmann T.Probabilistic latent semantic analysis[C]//Proceedings of the 15th Conference on Uncertainty in Artificial Intelligence.Stockholm: [s.n.], 1999: 289-296.
  • 10杨晓兰,全国第四届计算语言学联合学术会议论文集,1997年,313页

共引文献63

同被引文献39

  • 1张宇,刘挺,陈毅恒,赵世奇,李生.自然语言文本水印[J].中文信息学报,2005,19(1):56-62. 被引量:51
  • 2戴祖旭,洪帆,崔国华,付敏.基于词性标记串统计特性的文本数字水印算法[J].通信学报,2007,28(4):108-113. 被引量:11
  • 3Atallah M J, Raskin V, Crogan M, Hempelmann C, Ker- schbaum F, Mohamed D, Naik S. Natural language water- marking: Design, analysis, and a proof- of- concept imple- mentation//Proeeedings of the 4th Information Hiding. Pittsburgh, PA, 2001: 185-200.
  • 4Stefan K, Fabien A P P. Information Hiding Techniques for Steganography and Digital Watermarking. Boston, USA: Artech House, Inc. , 2000.
  • 5Jack T B, Steven L, Maxemehuk Nicholas F, O' Gnrman Lawrence. Electronic marking and identification techniques to discourage document copying. IEEE Journal on Selected Areas in Communications, 1995, 13(8): 1495-1504.
  • 6Moulin P, Koetter R. Data-hiding codes. Proceedings of the IEEE, 2005, 93(12): 2083-2126.
  • 7Gupta Gaurav, Pieprzyk Josef, Wang Hua Xiong. An attack- localizing watermarking scheme for natural language docu- ments//Proceedings of the ACM Symposium on Information, Computer and Communications Security' 06. Taipei: ACM Press, 2006:157-165.
  • 8Kerckhoffs A. La cryptography militaire. Journal des Sci- ences Militaires, 1983, 9(1):5-83.
  • 9马广平,张雅轩,何路等.针对语法变换信息隐藏的主动攻击算法//第9届全国信息隐藏暨多媒体信息安全学术大会论文集.成都,中国,2010.
  • 10Yang J L, Wang J M, WangCK, LiDY. A novel scheme for watermarking natural language text//Proceedings of the Intelligent Information Hiding and Multimedia Signal Pro- cessing. Kaohsiung, Taiwan, China, 2007:481-484.

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部