Abstract
We introduce content-aware steganography as a new paradigm. As opposed to classic steganographic algorithms that only embed information in the syntactic representation of a datagram, content-aware steganography embeds secrets in the semantic interpretation which a human assigns to a datagram. In this paper, we outline two constructions for content-aware stegosystems, which employ, as a new kind of security primitive, problems that are easy for humans to solve, but difficult to automate. Such problems have been successfully used in the past to construct Human Interactive Proofs (HIPs), protocols capable of automatically distinguishing whether a communication partner is a human or a machine.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ackoff, R.L.: From data to wisdom. Journal of Applied Systems Analysis 16, 3–9 (1989)
Atallah, M.J., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., Naik, S.: Natural language watermarking: Design, analysis, and a proof-of-concept implementation. In: Moskowitz, I.S. (ed.) Information Hiding: Fourth International Workshop. LNCS, vol. 2137, pp. 185–199. Springer, Heidelberg (2001)
Atallah, M.J., Raskin, V., Hempelmann, C.F., Topkara, M., Sion, R., Topkara, U., Triezenberg, K.E.: Natural language watermarking and tamperproofing. In: Fabien, A.P.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 196–212. Springer, Heidelberg (2002)
Bennett, K.: Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text (May 2004)
Bergmair, R.: Towards linguistic steganography: A systematic investigation of approaches, systems, and issues. final year project, April 2004 submitted in partial fulfillment of the degree requirements for B.Sc (Hons.) to the University of Derby (2004)
Bergmair, R., Katzenbeisser, S.: Towards human interactive proofs in the text-domain. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, Springer, Heidelberg (2004)
Bolshakov, I.A.: A method of linguistic steganography based on collocationally-verified synonymy. In: Fridrich, J.J. (ed.) IH 2004. LNCS, vol. 3200, pp. 180–191. Springer, Heidelberg (2004)
Calvo, H., Bolshakov, I.A.: Using selectional preferences for extending a synonymous paraphrasing method in steganography. In: Sossa Azuela, J.H. (ed.) Avances en Ciencias de la Computacion e Ingenieria de Computo - CIC 2004: XIII Congreso Internacional de Computacion, pp. 231–242 (October 2004)
Chapman, M.: Hiding the hidden: A software system for concealing ciphertext as innocuous text. Master’s thesis, University of Wisconsin-Milwaukee (1997)
Chapman, M., Davida, G.I.: Nicetext system official home page, http://www.nicetext.com
Chapman, M., Davida, G.I.: Hiding the hidden: A software system for concealing ciphertext in innocuous text. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 11–14. Springer, Heidelberg (1997)
Chapman, M., Davida, G.I.: Plausible deniability using automated linguistic steganography. In: Davida, G., Frankel, Y. (eds.) InfraSec 2002. LNCS, vol. 2437, Springer, Heidelberg (2002)
Chapman, M., Davida, G.I., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, Springer, Heidelberg (2001)
Chew, M., Tygar, J.D.: Image recognition CAPTCHAs. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, Springer, Heidelberg (2004)
Chiang, Y.-L., Chang, L.-P., Hsieh, W.-T., Chen, W.-C.: Natural language watermarking using semantic substitution for chinese text. In: Kalker, T., Cox, I.J., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 129–140. Springer, Heidelberg (2004)
Craver, S.: On public-key steganography in the presence of an active warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 355–368. Springer, Heidelberg (1998)
Fridrich, J., Goljan, M., Hogea, D., Soukal, D.: Quantitative steganalysis of digital images: estimating the secret message length. Multimedia Systems 9, 298–302 (2003)
Grothoff, C., Grothoff, K., Alkhutova, L., Stutsman, R., Atallah, M.: Translation-based steganography. In: Barni, M., Herrera-Joancomarti, J., Katzenbeisser, S., Pérez-González, F. (eds.) Information Hiding, 7th International Workshop (IH 2005), Barcelona, Spain. LNCS, vol. 3727, pp. 219–233. Springer, Heidelberg (2005)
Hopper, N.J., Blum, M.: Secure human identification protocols. In: Advances in Crypotology. In: Proceedings of Asiacrypt 2001 (2001)
Nasir Memon Mehdi Kharrazi, H.T.S.: Blind source camera identification. In: Proceedings of the National Conference on Image Processing (ICIP 2004) (2004)
Nakagawa, H., Sampei, K., Matsumoto, T., Kawaguchi, S., Makino, K., Murase, I.: Text information hiding with preserved meaning – a case for japanese documents. IPSJ Transaction 42(9), 2339–2350 (2001)
Niimi, M., Minewaki, S., Noda, H., Kawaguchi, E.: A framework of text-based steganography using sd-form semantics model. IPSJ Journal, 44(8) (August 2003)
Simmons, G.J.: The prisoners problem and the subliminal channel. In: Advances in Cryptology. In: Proceedings of CRYPTO 1983, pp. 51–67 (1984)
Topkara, M., Taskiran, C.M., Delp, E.J.: Natural language watermarking. In: Delp, E.J., Wong, P.W.(eds) Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681 (January 2005)
von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: HIPs, http://www.aladdin.cs.cmu.edu/hips/
von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: using hard ai problems for security. In: Advances in Cryptology, Eurocrypt 2003. LNCS, vol. 2656, pp. 294–311. Springer, Heidelberg (2003)
Wayner, P.: Mimic functions. Cryptologia XVI/3, 193–214 (1992)
Wayner, P.: Strong theoretical steganography. Cryptologia XIX/3, 285–299 (1995)
Winstein, K.: Lexical steganography, http://alumni.imsa.edu/~keithw/tlex
Winstein, K.: Lexical steganography through adaptive modulation of the word choice hash, http://alumni.imsa.edu/~keithw/tlex/lsteg.ps
Xerox PARC. In: First Workshop on Human Interactive Proofs (January 2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bergmair, R., Katzenbeisser, S. (2007). Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds) Information Hiding. IH 2006. Lecture Notes in Computer Science, vol 4437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74124-4_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-74124-4_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74123-7
Online ISBN: 978-3-540-74124-4
eBook Packages: Computer ScienceComputer Science (R0)