Abstract
While data encryption is an effective means of keeping data private it does not conceal the presence of ‘hidden’ information, rather it serves as an indicator that such data is present. Concealing information and hiding the fact that information is hidden are both desirable traits of a confidential data exchange, especially if that exchange takes place across a public network such as the Internet. In the present paper, we describe an approach to textual steganography in which data is not only hidden, in virtue of its encoding, but the presence of hidden data is also concealed, through use of human-readable carrier texts. Information transmitted in this fashion remains confidential and its confidential nature is also concealed. The approach detailed addresses several shortcomings in previous work in this area. Specifically, we achieve a high rate of accuracy in message decoding and also produce carrier texts which are both coherent and plausible as human-readable plain text messages. These desirable features of textual steganography are accomplished through a system of sentence mapping and a genre-based approach to carrier text selection that produces contextually related content in the carrier messages.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Weir, G.R.S., Morran, M.: Hiding the Hidden Message: Approaches to Textual Steganography. International Journal of Electronic Security and Digital Forensics 3(3), 223–233 (2010)
Marwaha, P.: Visual Cryptographic Steganography in Images. In: Proceedings of the 2010 Second International Conference on Computing, Communication and Networking Technologies (ICCCNT 2010), pp. 1–6 (2010)
Delina, B.: Information Hiding: A New Approach in Text Steganography. In: Proceedings of the International Conference on Applied Computer and Applied Computational Science, World Scientific and Engineering Academy and Society (WSEAS 2008), pp. 689–695 (2008)
Kim, Y., Moon, K., Oh, I.: A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics. In: Proceedings of the Seventh International Conference on Document Analysis and Recognition (ICDAR 2003), pp. 775–779 (2003)
Shirali-Shahreza, M.: A New Synonym Text Steganography. In: Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1524–1526 (2008)
Mansor, S., Din, R., Samsudin, A.: Analysis of Natural Language Steganography. International Journal of Computer Science and Security (IJCSS) CSC Journals 3(2), 113–125 (2010)
Alattar, A., Alattar, O.: Watermarking Electronic Text Documents Containing Justified Paragraphs and Irregular Line Spacing. In: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 685–695 (2004)
Whitiak, D.: The Art of Steganography. SANS Institute, as part of GIAC Practical Repository, GSEC Practical (v.1.4b) (2003)
Shirali-Shahreza, M.: Text Steganography in SMS. In: Proceedings of the 2007 International Conference on Convergence Information Technology, November 21-23, pp. 2260–2265 (2008)
Shirali-Shahreza, M.: Text Steganography by Changing Words Spelling. In: 10th International Conference on Advanced Communication Technology (ICACT 2008), pp. 1912–1913 (2008)
Morran, M., Weir, G.: An Approach to Textual Steganography. Global Security, Safety, and Sustainability: Communications in Computer and Information Science 92, 48–54 (2010)
Chapman, M., Davida, G.: Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 333–345. Springer, Heidelberg (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ogilvie, R., Weir, G.R.S. (2012). Genre-Based Information Hiding. In: Georgiadis, C.K., Jahankhani, H., Pimenidis, E., Bashroush, R., Al-Nemrat, A. (eds) Global Security, Safety and Sustainability & e-Democracy. e-Democracy ICGS3 2011 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 99. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33448-1_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-33448-1_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33447-4
Online ISBN: 978-3-642-33448-1
eBook Packages: Computer ScienceComputer Science (R0)