Linguistic Steganography for Messaging Applications

被引:0
|
作者
Serret, Elsa [1 ]
Lesueur, Antoine [1 ]
Gabillon, Alban [2 ]
机构
[1] Ecole Navale, Dept Informat, Brest, France
[2] Univ Polynesie Francaise, Faaa, French Polynesi, France
关键词
Linguistic Steganography; Cover Text; Context Free Grammar; Data Confidentiality;
D O I
10.5220/0010899300003120
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Steganography is a set of techniques to hide secret information in another medium called the cover. In the case of linguistic steganography, the cover is text itself. Different methods of linguistic steganography have been developed. They are grouped into two main categories: text generation systems and cover text modification methods. Text generation systems do not produce messages that fit naturally into a conversation within a messaging application. Text modification methods revolve around lexical substitution or syntactic modification. In this paper, we present a new method of linguistic steganography for messaging applications. Our method is based on cover text extension and synonym substitution. We analyse the performance of our system as well as its security and show that it outperforms other substitution methods in terms of bandwidth, i.e., average number of encoded secret bits per sentence.
引用
收藏
页码:519 / 527
页数:9
相关论文
共 50 条
  • [1] Neural Linguistic Steganography
    Ziegler, Zachary M.
    Deng, Yuntian
    Rush, Alexander M.
    [J]. 2019 CONFERENCE ON EMPIRICAL METHODS IN NATURAL LANGUAGE PROCESSING AND THE 9TH INTERNATIONAL JOINT CONFERENCE ON NATURAL LANGUAGE PROCESSING (EMNLP-IJCNLP 2019): PROCEEDINGS OF THE CONFERENCE, 2019, : 1210 - 1215
  • [2] Introduction to linguistic steganography
    Khan, Majid
    Shahab, Ali
    Asghar, Zeeshan
    [J]. Nonlinear Engineering, 2015, 4 (03) : 175 - 180
  • [3] Alternatives for multimedia messaging system steganography
    Papapanagiotou, K
    Kellinis, E
    Marias, GF
    Georgiadis, P
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 589 - 596
  • [4] Light Field Messaging with Deep Photographic Steganography
    Wengrowski, Eric
    Dana, Kristin
    [J]. 2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 1515 - 1524
  • [5] A comprehensive bibliography of linguistic steganography
    Bergmair, Richard
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX, 2007, 6505
  • [6] NEW USES FOR LINGUISTIC STEGANOGRAPHY
    Dzhunkovskiy, Andrey V.
    [J]. VESTNIK VOLGOGRADSKOGO GOSUDARSTVENNOGO UNIVERSITETA-SERIYA 2-YAZYKOZNANIE, 2024, 23 (03): : 124 - 133
  • [7] Effective Linguistic Steganography Detection
    Chen Zhi-Li
    Huang Liu-Sheng
    Yu Zhen-Shan
    Zhao Xin-Xin
    Zheng Xue-Ling
    [J]. 8TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY WORKSHOPS: CIT WORKSHOPS 2008, PROCEEDINGS, 2008, : 224 - 229
  • [8] Steganography in Multimedia Messaging Service of Mobile Intelligent Terminal
    Zhou, Fucheng
    Yang, Rener
    Zheng, Ziwei
    He, Jiaming
    [J]. 2012 5TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), 2012, : 1340 - 1343
  • [9] Matlist: Mature Linguistic Steganography Methodology
    Desoky, Abdelrahman
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (06) : 697 - 718
  • [10] Linguistic Steganography Detection Based on Perplexity
    Meng, Peng
    Huang, Liusheng
    Chen, Zhili
    Yang, Wei
    Li, Dong
    [J]. 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 217 - 220