Presentation is loading. Please wait.

Presentation is loading. Please wait.

Natural Language Watermarking and Steganography Cuneyt Taskiran.

Similar presentations


Presentation on theme: "Natural Language Watermarking and Steganography Cuneyt Taskiran."— Presentation transcript:

1 Natural Language Watermarking and Steganography Cuneyt Taskiran

2 Secrecy Is Important

3

4 Even More Secrecy What if nobody notices that you are sending a message? Hide message in an innocent looking cover

5 How Do I Hide My Message? Generate cover based on the message

6 How Do I Hide My Message? Modify cover based on the message imperceptible hard to remove Usually message is a copyright notice or metadata information

7 Up Against Eve and Mallory Steganography Watermarking Communication, passive eavesdropper Authentication, malicious eavesdropper

8 Tamper-Proofing Is A Must

9 Why You Need Watermarking? Prove authorship for email, Wikipedia entries Fight blog scraping

10 The Basic Idea Ned kissed Jody. Jody is kissed by Ned. Same meaning =

11 Other Syntactic Transformations A unicorn is in the garden. There’s a unicorn in the garden. It is difficult to believe that. To believe that is difficult.

12 Synonym Swap This robot is very smart. Choose candidate to maximize ambiguity

13 Synonym Swap This robot is very smart. Is the robot polished or smart? This robot is very bright.

14 That Doesn’t Seem Hard To Do I run by the river every morning. The river run me every morning.

15 That Doesn’t Seem Hard To Do I run by the river every morning. I manage by the river every morning. Iraqi head seeks arms. Even worse:

16 Keeping The Style Intact... and make it still better, and say nothing of the bad...... and make it still better, and say nada of the bad... Nada sis, just chillin at home with the fam.

17 Watermarking Cursory Text Embed information using typos Hard to remove with spell checker dur to ambiguity

18 Watermarking Cursory Text Many people concluded that the web was overhyped, when in fact bumbler and consequent shakeouts appal to be a common feature of all technological revolutions. 4 bits embedded using two typos

19 Take Aways Tools exist for you to experiment Challenging Come on in!

20 For More Information mercan.topkara.org Thanks to my collaborators Mercan Topkara and Umut Topkara for their help


Download ppt "Natural Language Watermarking and Steganography Cuneyt Taskiran."

Similar presentations


Ads by Google