Text watermarking algorithm based on semantic role labeling

This paper proposes a new approach for text watermarking that uses the semantic roles to embed watermark information. The technology of natural language processing is applied to find and label the three types of semantic roles A0, A1 and ADV in a text. A watermark message is converted into the hexadecimal Unicode and then compressed with the Huffman encoding to form a digit string that consists of the digits 0, 1 and 2. Let the three types of the semantic roles correspond to the three kinds of the digits one to one. The watermark digits are embedded by mapping each digit into the location of a semantic role of the corresponding type. The algorithm does not make any change to the format and content of a text. It has good features of concealment and robustness and can resist various text format transformations and watermark attacks.

[1]  J. B. Patil,et al.  Implementation of Text Watermarking Technique Using Natural Language Watermarks , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[2]  Edward J. Delp,et al.  Natural language watermarking , 2005, IS&T/SPIE Electronic Imaging.

[3]  Hu Jing-jing A Survey on Text Watermarking , 2005 .

[4]  Steven H. Low,et al.  Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.

[5]  Wanxiang Che,et al.  LTP: A Chinese Language Technology Platform , 2010, COLING.

[6]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[7]  Sergei Nirenburg,et al.  Natural language processing for information assurance and security: an overview and implementations , 2001, NSPW '00.

[8]  Zunera Jalil,et al.  A Review of Digital Watermarking Techniques for Text Documents , 2009, 2009 International Conference on Information and Multimedia Technology.

[9]  Huang Ming Text digital watermarking algorithm based on line spacing code , 2008 .

[10]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[11]  Mikhail J. Atallah,et al.  Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation , 2001, Information Hiding.

[12]  Guodong Zhou,et al.  Semantic Role Labeling in Chinese Language for Nominal Predicates: Semantic Role Labeling in Chinese Language for Nominal Predicates , 2011 .