Abstract
Several automated techniques exist to transform ciphertext into text that “looks like” natural-language text while retaining the ability to recover the original ciphertext. This transformation changes the ciphertext so that it doesn’t attract undue attention from, for example, attackers or agencies or organizations that might want to detect or censor encrypted communication. Although it is relatively easy to generate a small sample of quality text, it is challenging to be able to generate large texts that are “meaningful” to a human reader and which appear innocuous.
This paper expands on a previous approach that used sentence models and large dictionaries of words classified by part-of-speech [7]. By using an “extensible contextual template” approach combined with a synonymbased replacement strategy, much more realistic text is generated than was possible with NICETEXT.
PGP-KeyID: C783C736, PGP encrypted mail welcome
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
ftp://ftp.dcs.shef.ac.uk/share/ilash/moby/mthes.tar.z. FTP site.
http://www.dcs.shef.ac.uk/research/ilash/moby/index.html. World Wide Web URL.
http://www.webster.com/cgi-bin/dictionary. World Wide Web URL.
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers Principles, Techniques, and Tools. Addison-Wesley, Reading, Mass., 1986.
Ross J. Anderson and Fabien A.P. Peiticolas. On the limits of steganography. IEEE Journal of Selected Areas in Communications, 16(4):474–481, May 1998.
Evan L. Antworth. User’s Guide to PC-KIMMO Version 2. Summer Institute of Linguistics, Inc., 1995. http://www.sil.org/pckimmo/v2/doc/guide.html.
Mark Chapman and George Davida. Hiding the hidden: A software system for concealing ciphertext as innocuous text. In Sihan Qing Yongfei Han, tatsuaki Okamoto, editor, Information and Communications Security First International Conference, ICICS 97 Proceedings, pages 335–345. Springer-Verlag, 1997.
D. Kahn. The Codebreakers. MacMillan Publishing Co., New York, 1967.
J. R. Levine, T. Mason, and D. Brown. Lex & Yacc. O’Reilly & Associates, Inc., Sebastopol, CA, 1992.
Bruce Schneier. Applied Cryptography Second Edition: protocols, algorithms, and source code in C. John Wiley and Sons, New York., 1996.
Peter Wayner. Mimic functions. Cryptologia, XVI Number 3:193–214, 1992.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chapman, M., Davida, G.I., Rennhard, M. (2001). A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography. In: Davida, G.I., Frankel, Y. (eds) Information Security. ISC 2001. Lecture Notes in Computer Science, vol 2200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45439-X_11
Download citation
DOI: https://doi.org/10.1007/3-540-45439-X_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42662-2
Online ISBN: 978-3-540-45439-7
eBook Packages: Springer Book Archive