A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography | SpringerLink
Skip to main content

A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography

  • Conference paper
  • First Online:
Information Security (ISC 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2200))

Included in the following conference series:

Abstract

Several automated techniques exist to transform ciphertext into text that “looks like” natural-language text while retaining the ability to recover the original ciphertext. This transformation changes the ciphertext so that it doesn’t attract undue attention from, for example, attackers or agencies or organizations that might want to detect or censor encrypted communication. Although it is relatively easy to generate a small sample of quality text, it is challenging to be able to generate large texts that are “meaningful” to a human reader and which appear innocuous.

This paper expands on a previous approach that used sentence models and large dictionaries of words classified by part-of-speech [7]. By using an “extensible contextual template” approach combined with a synonymbased replacement strategy, much more realistic text is generated than was possible with NICETEXT.

PGP-KeyID: C783C736, PGP encrypted mail welcome

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ftp://ftp.dcs.shef.ac.uk/share/ilash/moby/mthes.tar.z. FTP site.

  2. http://www.dcs.shef.ac.uk/research/ilash/moby/index.html. World Wide Web URL.

  3. http://www.webster.com/cgi-bin/dictionary. World Wide Web URL.

  4. A. V. Aho, R. Sethi, and J. D. Ullman. Compilers Principles, Techniques, and Tools. Addison-Wesley, Reading, Mass., 1986.

    Google Scholar 

  5. Ross J. Anderson and Fabien A.P. Peiticolas. On the limits of steganography. IEEE Journal of Selected Areas in Communications, 16(4):474–481, May 1998.

    Article  Google Scholar 

  6. Evan L. Antworth. User’s Guide to PC-KIMMO Version 2. Summer Institute of Linguistics, Inc., 1995. http://www.sil.org/pckimmo/v2/doc/guide.html.

  7. Mark Chapman and George Davida. Hiding the hidden: A software system for concealing ciphertext as innocuous text. In Sihan Qing Yongfei Han, tatsuaki Okamoto, editor, Information and Communications Security First International Conference, ICICS 97 Proceedings, pages 335–345. Springer-Verlag, 1997.

    Google Scholar 

  8. D. Kahn. The Codebreakers. MacMillan Publishing Co., New York, 1967.

    Google Scholar 

  9. J. R. Levine, T. Mason, and D. Brown. Lex & Yacc. O’Reilly & Associates, Inc., Sebastopol, CA, 1992.

    Google Scholar 

  10. Bruce Schneier. Applied Cryptography Second Edition: protocols, algorithms, and source code in C. John Wiley and Sons, New York., 1996.

    Google Scholar 

  11. Peter Wayner. Mimic functions. Cryptologia, XVI Number 3:193–214, 1992.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chapman, M., Davida, G.I., Rennhard, M. (2001). A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography. In: Davida, G.I., Frankel, Y. (eds) Information Security. ISC 2001. Lecture Notes in Computer Science, vol 2200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45439-X_11

Download citation

  • DOI: https://doi.org/10.1007/3-540-45439-X_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42662-2

  • Online ISBN: 978-3-540-45439-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics