A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
Several automated techniques exist to transform ciphertext into text that “looks like” natural-language text while retaining the ability to recover the original ciphertext. This transformation changes the ciphertext so that it doesn’t attract undue attention from, for example, attackers or agencies or organizations that might want to detect or censor encrypted communication. Although it is relatively easy to generate a small sample of quality text, it is challenging to be able to generate large texts that are “meaningful” to a human reader and which appear innocuous.
This paper expands on a previous approach that used sentence models and large dictionaries of words classified by part-of-speech . By using an “extensible contextual template” approach combined with a synonymbased replacement strategy, much more realistic text is generated than was possible with NICETEXT.
KeywordsSecret Message Sentence Structure Human Reader Realistic Text Large Dictionary
Unable to display preview. Download preview PDF.
- 2.http://www.dcs.shef.ac.uk/research/ilash/moby/index.html. World Wide Web URL.
- 3.http://www.webster.com/cgi-bin/dictionary. World Wide Web URL.
- 4.A. V. Aho, R. Sethi, and J. D. Ullman. Compilers Principles, Techniques, and Tools. Addison-Wesley, Reading, Mass., 1986.Google Scholar
- 6.Evan L. Antworth. User’s Guide to PC-KIMMO Version 2. Summer Institute of Linguistics, Inc., 1995. http://www.sil.org/pckimmo/v2/doc/guide.html.
- 7.Mark Chapman and George Davida. Hiding the hidden: A software system for concealing ciphertext as innocuous text. In Sihan Qing Yongfei Han, tatsuaki Okamoto, editor, Information and Communications Security First International Conference, ICICS 97 Proceedings, pages 335–345. Springer-Verlag, 1997.Google Scholar
- 8.D. Kahn. The Codebreakers. MacMillan Publishing Co., New York, 1967.Google Scholar
- 9.J. R. Levine, T. Mason, and D. Brown. Lex & Yacc. O’Reilly & Associates, Inc., Sebastopol, CA, 1992.Google Scholar
- 10.Bruce Schneier. Applied Cryptography Second Edition: protocols, algorithms, and source code in C. John Wiley and Sons, New York., 1996.Google Scholar