Computational Linguistics and Linguistic Steganography. Distributing Hidden Information with Minimal Resources
DOI:
https://doi.org/10.3989/arbor.2013.760n2007Keywords:
linguistic steganography, watermarking, NLW, algorithmAbstract
Computational linguistics and linguistic steganography could allow to design useful systems in the protection / privacy of digital communications and digital language watermarking. However, building these systems is not always possible provided a series of conditions are not met. This article investigates whether it is possible to design procedures to hide information in natural language using minimal linguistic and computational resources. An algorithm is proposed and implemented, arguing for the usefulness and security of such proposals.
Downloads
References
Atallah, M.; McDonough, C.; Raskin, V. y Nirenburg, S. (2000). Natural language processing for information assurance and security: an overview and implementations. Proceeding NSPW '00 Proceedings of the 2000 workshop on New security paradigms. Pages 51-65 ISBN:1-58113-260-3.
Bergmair, R. (2007). A comprehensive bibliography of linguistic steganography. Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents. http://dx.doi.org/10.1117/12.711325
Blasco, J.; Hernandez-Castro, J.; Tapiador, J. y Ribagorda, A. (2008). Csteg: Talking in C code. In Proceedings of SECRYPT International Conference. Oporto: INSTICC. pp. 399–406, July 2008.
Chapman, M. y Davida, G. (1997). Hiding the hidden: A software system for concealing ciphertext as innocuous text. Proceedings of the International Conference on Information and Communication Security. Lecture Notes in Computer Sciences 1334. http://dx.doi.org/10.1007/BFb0028489
Chapman, M.; Davida, G. y Rennhard, M. (2001). A practical and effective approach to large-scale automated linguistic steganography. ISC '01 Proceedings of the 4th International Conference on Information. ISBN:3-540-42662-0.
Chen, Z.; Liu-sheng, H.; Zhen-shan, Y.; Xin-xin, Z. y Xue-ling, Z. (2008). Effective Linguistic Steganography Detection. IEEE 8th International Conference on Computer and Information Technology Workshops, 2008. ISBN: 978-0-7695-3242-4.
Cox, I.; Miller, M.; Bloom, J.; Fridrich, J. y Kalker, T. (2007). Digital Watermarking and Steganography. Morgan Kaufmann, 2 edition (Nov 13 2007). ISBN-13: 978-0123725851.
Daemen, J. y Rijmen, V. (2002). The Design of RijndaeL: AES - The Advanced Encryption Standard: Springer. 1 edition (March 22, 2002). ISBN-10: 3540425802. http://dx.doi.org/10.1007/978-3-662-04722-4
Dai, W.; Yu, Y. y Deng, B. (2009). BinText steganography based on Markov state transferring probability. ACM International Conference Proceeding Series. Vol. 403, 2009. Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human. ISBN:978-1-60558-710-3.
Grothoff, C.; Grothoff, K.; Alkhutova, L.; Stutsman, R. y Atallah, M. (2005). Translation-Based Steganography. Computer Science Information Hiding Lecture Notes in Computer Science. Volume 3727/2005, 219-233, DOI: 10.1007/11558859_17. http://dx.doi.org/10.1007/11558859_17
Huang, H.; Sun, X.; Li, Z. y Sun, G. (2007a). Detection of Hidden Information in Webpage 2007. Fuzzy Systems and Knowledge Discovery. Fourth International Conference, pp. 317-321. ISBN 978-0-7695-2874-8. http://dx.doi.org/10.1109/FSKD.2007.247
Huang, H.; Xingming, S.; Guang, S. y Junwei, H. (2007b). Detection of Steganographic Information in Tags of Webpage Based on Tag-Mismatch. Intelligent Information Hiding and Multimedia Signal Processing. IIHMSP 2007. Third International Conference on Volume 1, pp. 257-260.
Huang, J.; Sun, X.; Guang, S.; Huang, H. y Luo, G. (2007). Detection of Hidden Information in Webpages Based on Randomness. Information Assurance and Security, 2007. Doi: 10.1109/IAS.2007.74 . http://dx.doi.org/10.1109/IAS.2007.74
Kahn, D. (1996). The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Publisher: Scribner; Rev Sub edition (December 5, 1996). ISBN-10: 0684831309. Hardcover: 1200 pages.
Kerckhoffs, A. (1883). La cryptographie militaire. Journal des sciences militaires, IX. http://www.petitcolas.net/fabien/kerckhoffs [Mayo 2012].
Lingjun, L.; Liusheng, H. y Xinxin, Z. (2008). A statistical attack on Kind of Word-Shift Text-Steganography. IIH-MSP 2008. pp. 1503-1507. ISBN:978-0-7695-3278-3.
Lingyun, X.; Xingming, S.; Gang, L. y Can, G. (2007). Research on Steganalysis fort text steganography based on font format. IAS 2007. pp. 490-495. ISBN: 0-7695-2876-7.
Lingyun, X.; Xingming, S. y Gang, L. (2011). Bin X, Steganalysis of Syntactic Transformation based Steganography. JDCTA: International Journal of Digital Content Technology and its Applications, 5 (5), pp. 320-330.
Meng, P.; Huang, L.; Chen, Z.; Yang, W. y Li, D. (2008). Linguistic Steganography Detection Based on Perplexity. International Conference on MultiMedia and Information Technology. ISBN: 978-0-7695-3556-2.
Meng, P.; Hang, L.; Yang, W.; Chen, Z. y Zheng, H. (2009). Linguistic Steganography Detection Algorithm Using Statistical Language Model. International Conference on Information Technology and Computer Science. ISBN: 978-0-7695-3688-0.
Meng, P.; Hang, L.; Liusheng, H.; Chen, Z.; Zhili, C.; Yuchong, H. y W, Y. (2010). STBS: A Statistical Algorithm for Steganalysis of Translation-Based Steganography. Lecture Notes in Computer Science, 2010. Volume 6387/2010, pp. 208-220. http://dx.doi.org/10.1007/978-3-642-16435-4_16
Mu-oz, A.; Argüelles, I.; Carracedo, J.; Okubo, Y. y Doré, J.C. (2009). Modificaciones sintácticas en lengua espa-ola con utilidad en esteganografía lingüística. Revista Electrónica de Lingüística Aplicada, RAEL, nº 8, pp. 229-247.
Mu-oz, A.; Argüelles, I. y Carracedo, J. (2010). Improving N-Gram linguistic steganography based on templates. International Conference on Security and Cryptography. Secrypt 2010. Athens, Greece. http://stelin.sourceforge.net [Mayo 2012].
Mu-oz, A. y Argüelles, I. (2012). Modificaciones Sintácticas basadas en la reordenación de complementos del verbo con utilidad en esteganografía lingüística. Revista Electrónica de Lingüística Aplicada, RAEL, nº10, pp. 31-54. (ISSN 1885-9089).
Raskin, V.; Nirenburg, S.; Atallah, M.; Hempelmann, C. y Triezenberg, K. (2002). Why NLP should move into IAS. International Conference on Security and Cryptography. Secrypt 2010. Athens, Greece. Proceeding COLING-Roadmap '02 Proceedings of the 2002 COLING workshop: A roadmap for computational linguistics - Volume 13 Pages 1-7.
Tenenbaum, A. (2002). Linguistic steganography: Passing covert data using text-based mimicry. Toronto: University of Toronto. Final year thesis, April 2002, submitted in partial fulfillment of the requirements for the degree of "Bachelor of Applied Science" to the University of Toronto. Wikipedia_es (2012). Derechos Humanos. https://es.wikipedia.org/wiki/Derechos_ humanos [Mayo 2012]. Wikipedia_en (2012). Human Rights. https://en.wikipedia.org/wiki/Human_rights [Mayo 2012].
Topkara, M.; Topkara, U. y Atallah, M. (2007). Information Hiding through Errors: A Confusing Approach. Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Content. San Jose. January 29- February 1, 2007. http://dx.doi.org/10.1117/12.706980
Wayner, P. (1992). Mimic functions. Cryptologia, XVI, pp. 193-214. http://dx.doi.org/10.1080/0161-119291866883
Wayner, P. (1995). Strong theoretical steganography. Cryptologia, XVI, pp. 285-299. http://dx.doi.org/10.1080/0161-119591883962
Zhenshan, Y.; Liusheng, H.; Zhili, C.; Lingjun, L.; Xinxin, Z. y Youwen, Z. (2009). Steganalysis of Synonym-Substitution Based Natural Language Watermarking. International Journal of Multimedia and Ubiquitous Engineering, 4 (2).
Zhi-li, C.; Liusheng, H.; Zhen-shan, Y.; Lingjun, L.; Wei, Y. y Youwen, Z. (2008a). A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words. IEEE Computer Society. Proceedings of the 2008 Third International Conference on Availability, Reliability and Security. pp. 558-563. ISBN: 978-0-7695-3102-1. http://dx.doi.org/10.1109/ARES.2008.61
Zhi-li, C.; Liusheng, H.; Zhen-shan, Y.; Wei, Y.; Lingjun, L.; Xueling, Z. y Xinxin, Z. (2008b). Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words. Lecture Notes In Computer Science. Information Hiding, 2008. ISBN: 978-3-540-88960-1.
Zuxu, D.; Fan, H.; Muxiang, Y. y Guohua, C. (2007). Text Information Hiding Based on Part of Speech Grammar. Proceedings of the 2007 International Conference on Computational Intelligence and Security Workshops. pp. 632-635. ISBN: 0-7695-3073-7. http://dx.doi.org/10.1109/CISW.2007.4425575
Published
How to Cite
Issue
Section
License
Copyright (c) 2013 Consejo Superior de Investigaciones Científicas (CSIC)

This work is licensed under a Creative Commons Attribution 4.0 International License.
© CSIC. Manuscripts published in both the printed and online versions of this Journal are the property of Consejo Superior de Investigaciones Científicas, and quoting this source is a requirement for any partial or full reproduction.
All contents of this electronic edition, except where otherwise noted, are distributed under a “Creative Commons Attribution 4.0 International” (CC BY 4.0) License. You may read the basic information and the legal text of the license. The indication of the CC BY 4.0 License must be expressly stated in this way when necessary.
Self-archiving in repositories, personal webpages or similar, of any version other than the published by the Editor, is not allowed.