Abstract
The paper gives analysis of feasibility of using linguistic steganographic trigger-containers as means of linguistic-based text watermarking. The proposed approah is based on the previous experimental research in the context of Russian native speaker text juncture perception. It was posited that specific minimal text modifications addressed in the paper may be used as means of text watermarking with the aim of tracking the leak of information for the purposes of taking legal actions, enforcing non-disclosure agreements, and testing for internal vulnerabilities. There is analyzed the viability of altering paragraph juncture points in Russian texts and, through the use of the corresponding trigger-containers, usage of this alteration as a means of linguistic watermarking.
Highlights
There are two main approaches to protecting sensitive information: cryptography and steganography
It was posited that specific minimal text modifications addressed in the paper may be used as means of text watermarking with the aim of tracking the leak of information for the purposes of taking legal actions, enforcing non-disclosure agreements, and testing for internal vulnerabilities
There is analyzed the viability of altering paragraph juncture points in Russian texts and, through the use of the corresponding trigger-containers, usage of this alteration as a means of linguistic watermarking
Summary
There are two main approaches to protecting sensitive information: cryptography and steganography. The basis of cryptography is altering a message in such a way as to encrypt it using various ciphers In this way the message is altered and protected, but the fact is that an attempt to conceal or protect information is evident. Our previous research has allowed us to gain and interpret data pertaining to how Russian native speakers choose to re-separate into words and paragraphs a sensical text that has been altered by deleting spaces between words, removing capital letters, punctuation symbols, and paragraph breaks. This data has been gathered for the purposes of trigger-container based steganographic inquiry. We are ready to propose a new application for these trigger-containers in text watermarking
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.