Skip to main content

Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens

  • Conference paper
Information Hiding (IH 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4437))

Included in the following conference series:

Abstract

We introduce content-aware steganography as a new paradigm. As opposed to classic steganographic algorithms that only embed information in the syntactic representation of a datagram, content-aware steganography embeds secrets in the semantic interpretation which a human assigns to a datagram. In this paper, we outline two constructions for content-aware stegosystems, which employ, as a new kind of security primitive, problems that are easy for humans to solve, but difficult to automate. Such problems have been successfully used in the past to construct Human Interactive Proofs (HIPs), protocols capable of automatically distinguishing whether a communication partner is a human or a machine.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ackoff, R.L.: From data to wisdom. Journal of Applied Systems Analysis 16, 3–9 (1989)

    Google Scholar 

  2. Atallah, M.J., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., Naik, S.: Natural language watermarking: Design, analysis, and a proof-of-concept implementation. In: Moskowitz, I.S. (ed.) Information Hiding: Fourth International Workshop. LNCS, vol. 2137, pp. 185–199. Springer, Heidelberg (2001)

    Google Scholar 

  3. Atallah, M.J., Raskin, V., Hempelmann, C.F., Topkara, M., Sion, R., Topkara, U., Triezenberg, K.E.: Natural language watermarking and tamperproofing. In: Fabien, A.P.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 196–212. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Bennett, K.: Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text (May 2004)

    Google Scholar 

  5. Bergmair, R.: Towards linguistic steganography: A systematic investigation of approaches, systems, and issues. final year project, April 2004 submitted in partial fulfillment of the degree requirements for B.Sc (Hons.) to the University of Derby (2004)

    Google Scholar 

  6. Bergmair, R., Katzenbeisser, S.: Towards human interactive proofs in the text-domain. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, Springer, Heidelberg (2004)

    Google Scholar 

  7. Bolshakov, I.A.: A method of linguistic steganography based on collocationally-verified synonymy. In: Fridrich, J.J. (ed.) IH 2004. LNCS, vol. 3200, pp. 180–191. Springer, Heidelberg (2004)

    Google Scholar 

  8. Calvo, H., Bolshakov, I.A.: Using selectional preferences for extending a synonymous paraphrasing method in steganography. In: Sossa Azuela, J.H. (ed.) Avances en Ciencias de la Computacion e Ingenieria de Computo - CIC 2004: XIII Congreso Internacional de Computacion, pp. 231–242 (October 2004)

    Google Scholar 

  9. Chapman, M.: Hiding the hidden: A software system for concealing ciphertext as innocuous text. Master’s thesis, University of Wisconsin-Milwaukee (1997)

    Google Scholar 

  10. Chapman, M., Davida, G.I.: Nicetext system official home page, http://www.nicetext.com

  11. Chapman, M., Davida, G.I.: Hiding the hidden: A software system for concealing ciphertext in innocuous text. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 11–14. Springer, Heidelberg (1997)

    Google Scholar 

  12. Chapman, M., Davida, G.I.: Plausible deniability using automated linguistic steganography. In: Davida, G., Frankel, Y. (eds.) InfraSec 2002. LNCS, vol. 2437, Springer, Heidelberg (2002)

    Google Scholar 

  13. Chapman, M., Davida, G.I., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, Springer, Heidelberg (2001)

    Google Scholar 

  14. Chew, M., Tygar, J.D.: Image recognition CAPTCHAs. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, Springer, Heidelberg (2004)

    Google Scholar 

  15. Chiang, Y.-L., Chang, L.-P., Hsieh, W.-T., Chen, W.-C.: Natural language watermarking using semantic substitution for chinese text. In: Kalker, T., Cox, I.J., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 129–140. Springer, Heidelberg (2004)

    Google Scholar 

  16. Craver, S.: On public-key steganography in the presence of an active warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 355–368. Springer, Heidelberg (1998)

    Google Scholar 

  17. Fridrich, J., Goljan, M., Hogea, D., Soukal, D.: Quantitative steganalysis of digital images: estimating the secret message length. Multimedia Systems 9, 298–302 (2003)

    Article  Google Scholar 

  18. Grothoff, C., Grothoff, K., Alkhutova, L., Stutsman, R., Atallah, M.: Translation-based steganography. In: Barni, M., Herrera-Joancomarti, J., Katzenbeisser, S., Pérez-González, F. (eds.) Information Hiding, 7th International Workshop (IH 2005), Barcelona, Spain. LNCS, vol. 3727, pp. 219–233. Springer, Heidelberg (2005)

    Google Scholar 

  19. Hopper, N.J., Blum, M.: Secure human identification protocols. In: Advances in Crypotology. In: Proceedings of Asiacrypt 2001 (2001)

    Google Scholar 

  20. Nasir Memon Mehdi Kharrazi, H.T.S.: Blind source camera identification. In: Proceedings of the National Conference on Image Processing (ICIP 2004) (2004)

    Google Scholar 

  21. Nakagawa, H., Sampei, K., Matsumoto, T., Kawaguchi, S., Makino, K., Murase, I.: Text information hiding with preserved meaning – a case for japanese documents. IPSJ Transaction 42(9), 2339–2350 (2001)

    Google Scholar 

  22. Niimi, M., Minewaki, S., Noda, H., Kawaguchi, E.: A framework of text-based steganography using sd-form semantics model. IPSJ Journal, 44(8) (August 2003)

    Google Scholar 

  23. Simmons, G.J.: The prisoners problem and the subliminal channel. In: Advances in Cryptology. In: Proceedings of CRYPTO 1983, pp. 51–67 (1984)

    Google Scholar 

  24. Topkara, M., Taskiran, C.M., Delp, E.J.: Natural language watermarking. In: Delp, E.J., Wong, P.W.(eds) Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681 (January 2005)

    Google Scholar 

  25. von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: HIPs, http://www.aladdin.cs.cmu.edu/hips/

  26. von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: using hard ai problems for security. In: Advances in Cryptology, Eurocrypt 2003. LNCS, vol. 2656, pp. 294–311. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  27. Wayner, P.: Mimic functions. Cryptologia XVI/3, 193–214 (1992)

    Article  MathSciNet  Google Scholar 

  28. Wayner, P.: Strong theoretical steganography. Cryptologia XIX/3, 285–299 (1995)

    Article  Google Scholar 

  29. Winstein, K.: Lexical steganography, http://alumni.imsa.edu/~keithw/tlex

  30. Winstein, K.: Lexical steganography through adaptive modulation of the word choice hash, http://alumni.imsa.edu/~keithw/tlex/lsteg.ps

  31. Xerox PARC. In: First Workshop on Human Interactive Proofs (January 2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jan L. Camenisch Christian S. Collberg Neil F. Johnson Phil Sallee

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bergmair, R., Katzenbeisser, S. (2007). Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds) Information Hiding. IH 2006. Lecture Notes in Computer Science, vol 4437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74124-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74124-4_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74123-7

  • Online ISBN: 978-3-540-74124-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics