An active attack on chaotic based text zero-watermarking

Without modified cover text, zero-watermarking technology makes steganalysis technology is completely ineffective. However, as far as the resilient of active attack, there's no deep study currently. In this paper, the text zero-watermarking algorithm based on chaotic map, which has a better robustness, is regarded as the attack target. By synonym substitution, two kinds of attack methods: Sync-attack and Birthday-attack has been determined. Then a text watermark algorithm for lexical active attack was proposed by combining the two methods. Experiments show that the algorithm can effectively destroy the zero-watermark without massive rewrite texts.

[1]  Mikhail J. Atallah,et al.  Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation , 2001, Information Hiding.

[2]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[3]  Radu Sion,et al.  Natural Language Watermarking and Tamperproofing , 2002, Information Hiding.

[4]  Cheng Yu-zhu Text zero-watermarking algorithm based on chaotic mapping , 2005 .

[5]  C. Orhan Orgun,et al.  Exploiting Linguistic Features in Lexical Steganography: Design and Proof-of-Concept Implementation , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[6]  Edward J. Delp,et al.  Attacks on lexical natural language steganography systems , 2006, Electronic Imaging.