Text-based Steganography Using Cover Text Free Human-Generated Natural Language (HGNL) Approach

Authors

  • R. Thamaraiselvan Assistant Professor, Department of Computer Applications, M.G.R. College (Arts & Science), Hosur - 635 109, Tamil Nadu, India.
  • A. Saradha Professor and Head, Department of Computer Science and Engineering, Institute of Road and Transport Technology, Erode - 638 316, Tamil Nadu, India.

DOI:

https://doi.org/10.51983/ajcst-2013.2.1.1710

Keywords:

Lexical, Steganography, Stego-Text, Text-Based

Abstract

A common pitfall of existing encryption procedures using lexical (text-based) steganography is the fact that the encrypted text may be recognized as such by someone who intercepts it. We introduce a new procedure which combines an automated algorithm with human input. The resulting texts are novel and therefore not searchable or otherwise easily recognized as encoding a hidden message

References

R. Bergmair, “Towards linguistic steganography: A systematic investigation of approaches, systems, and issues”, Tech. rep., University of Derby, August 2004.

V. Chand, and C. O. Orgun. Exploiting linguistic features in lexical steganography: Design and proof-of-concept implementation. Proceedings of the 39th Annual Hawaii International Conference on System Sciences, Vol. 6. IEEE: New York, 2006.

M. Chapman and G. Davida, Hiding the hidden: A software system for concealing cipher text in innocuous text. Proceedings of the International Conference on Information and Communications Security, vol. LNCS 133, Beijing, China, 1997.

M. Chapman, and G. Davida. Plausible deniability using automated linguistic stegonagraphy. Proceedings of the International Conference on Infrastructure Security, October 1-3 2002, Bristol, UK, pp.276- 287, 2002.

Chapman, M. et al., A practical and effective approach to large-scale automated linguistic steganography. Proceedings of the information security conference (ISC 01), Malaga, Spain, pp.156-165, 2001.

Chen Zhi-li, Huang Liu-sheng, Yu Zhen-shan, Li Ling-jun, and Yang Wei. 2008a. A Statistical Algo- rithm for Linguistic Steganography Detection Based on Distribution of Words. Third International Conference on Availability Reliability and Security, no. 60773032.

Chen Zhi-li, Huang Liu-sheng, Yu Zhen-shan, Zhao Xin-xin, and Zheng Xue-ling, “Effective Linguistic Steganography Detection”, CIT Workshops Australia, no. 60773032, 2008b.

Chen, Z., L. Huang, Z. Yu, W. Yang, L. Li, X. Zheng, and X. Zhao. 2008c. Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words. Information Hiding 10th International Workshop 2008, Santa Barbara CA USA May 19-21 2008; Revised Selected pp.224.

Desoky, A. et al, Auto-Summarization-Based Steganography, Proceedings of the 5th IEEE International Conference on Innovations in Information Technology, Al-Ain, UAE, December 2008.

A. Desoky, Listega: List-Based Steganography Methodology, International Journal of Information Security, Springer-Verlag, April 2009.

A. Desoky, Notestega: Notes-Based Steganography Methodology, Information Security Journal: A Global Perspective, Vol. 18, No 4, pp. 178-193, January 2009.

A. Desoky, NORMALS: “Normal Linguistic Steganography Methodology”, Journal of Informa- tion Hiding and Multimedia Signal Processing, Vol.1, No.3, pp.145-171, 2010.

C. Grothoff, et al. 2005. Translation-based steganography, Technical Report CSD, TR no. 05-009, Purdue University. (CERIAS Tech Report 2005-39)

C. O. Orgun, and V. Chand. The Human Attack in Linguistic Steganography. M. Gupta and R. Sharman (Eds.), Handbook of Research on Social and Organizational Liabilities in Information Security, New York: IGI Global. doi: 10.4018/978-1-60566-132-2, pp. 380-397, 2009.

Shirali-Shahreza, M. et al., Text steganography in SMS. International conference on conver- gence information technology. Volume 21.23, pp. 2260-2265, 2007.

C. M. Taskiran, U. Topkara, M. Topkara, and E. Delp. Attacks on lexical natural language steganography systems. Proceedings of the SPIE International Conference on Security, Steganogra- phy, and Watermarking of Multimedia Contents, 2006.

Topkara, Mercan, Umut Topkara and Mikhail J. Atallah. “Information hiding through errors: A confusing approach, Proceedings of the SPIE International Conference on Security”, Steganogra- phy, and Watermarking of Multimedia Contents, January 2007.

Winstein, Keith. No date. The tyrannosaurus Lex system, available at: http://alumni.imsa.edu/ kei- thw/tlex/

Downloads

Published

05-05-2013

How to Cite

Thamaraiselvan, R., & Saradha, A. (2013). Text-based Steganography Using Cover Text Free Human-Generated Natural Language (HGNL) Approach. Asian Journal of Computer Science and Technology, 2(1), 32–38. https://doi.org/10.51983/ajcst-2013.2.1.1710