|
|
Articles
by
Yuling Liu |
Total Records (
5 ) for
Yuling Liu |
|
 |
|
|
|
Hong Wang
,
Xingming Sun
,
Yuling Liu
and
Yongping Liu
|
|
In this study, a novel natural language
watermarking scheme of Chinese texts based on syntactic transformations
is proposed. In the proposed scheme, the so-called sentence weight defined
in the study is used to carry the watermark bit. During the embedding
process, the transformable sentences are first grouped and then their
sequence is permuted to enhance the imperceptibility of watermark bit
hiding positions. To improve watermarking reliability and capacity, error
correcting coding is also applied. |
|
|
|
|
Yuling Liu
,
Xingming Sun
,
Yongping Liu
and
Chang-Tsun Li
|
|
Communications via Microsoft Power Point (PPT for short)
documents are commonplace, so it is crucial to take advantage of PPT documents
for information security and digital forensics. In this study, we propose
a new method of text steganography, called MIMIC-PPT, which combines text
mimicking technique with characteristics of PPT documents. Firstly, a
dictionary and some sentence templates are automatically created by parsing
the body text of a PPT document. Then, cryptographic information is converted
into innocuous sentences by using the dictionary and the sentence templates.
Finally, the sentences are written into the note pages of the PPT document.
With MIMIC-PPT, there is no need for the communication parties to share
the dictionary and sentence templates while the efficiency and security
are greatly improved. |
|
|
|
|
Zhijie Liu
,
Xingming Sun
,
Yuling Liu
,
Lincong Yang
,
Zhangjie Fu
,
Zhihua Xia
and
Wei Liang
|
|
In some critical application areas, it is not allowed to modify the contents of the text, like military, legal and literature fields. Therefore, restoring the original contents of the text becomes a practical and important issue for text watermarking. This study aims to deal with this problem. We firstly present the concept of reversible text watermarking and then bring forth an effective scheme to achieve reversible text watermarking. Based on the synonym substitution method, the proposed algorithm applies an invertible transform to embed watermark, extract watermark and recover the original contents of the text. By using the reversible watermarking scheme, one can not only protect the interests of the author of the text, but also get the original contents of the text, if the receiver has the wish and right to revert the original contents of the text. Moreover, the scheme improves the payload capacity via using high embedding level, compressing the watermark or repeating the algorithm more than one time. |
|
|
|
|
Lingyun Xiang
,
Xingming Sun
,
Yuling Liu
and
Hengfu Yang
|
|
In this study, a novel secure steganographic method was proposed by taking advantage of Multiple-Choice Questions (MCQs). Selecting a series of MCQs to automatically generate a stego text could conceal secret information. The proposed method could achieve a considerable embedding bit rate while being able to hide more information by reordering the options of the generated MCQs. The final outputting stego texts were kept the same linguistic and statistic characteristics as normal texts, thus the hidden information had good imperceptibility and could survive under potential steganalysis attacks, which was also demonstrated by experiments. More experimental results showed that the average embedding bit rate achieved more than 1 bit per sentence, which was superior to the bit rate of most existing linguistic steganographic methods. |
|
|
|
|
Xiaoliang Wang
,
Yuling Liu
and
Hengfu Yang
|
|
In P2P network, the existing researches focus on protecting the security of information transmission, or ensuring users privacy. Security certification is a basic demand of P2P network, including the general authenticity, credibility, integrity and so on. Privacy protection for transactions is the high-level requirement of security, including confidentiality, copyright management, access control. One-sided pursuit of certification will affect the privacy rights of users while one-sided pursuit of anonymous will bring a series of anonymous abuse problems. However, little research has paid attention to urgency of this dilemma, leading to the emergence of a large number of problems in the applications. This study presents an anonymous authentication scheme based on homomorphic encryption, called FHET (Fully homomorphic encryption trust). FHET makes use of trust certificates and can also be combined with existing P2P reputation system which effectively prevents the selfish behavior of peers and ensures scalability, portability and practicality. |
|
|
|
|
|
|