Skip to main content

Genre-Based Information Hiding

  • Conference paper
Global Security, Safety and Sustainability & e-Democracy (e-Democracy 2011, ICGS3 2011)

Abstract

While data encryption is an effective means of keeping data private it does not conceal the presence of ‘hidden’ information, rather it serves as an indicator that such data is present. Concealing information and hiding the fact that information is hidden are both desirable traits of a confidential data exchange, especially if that exchange takes place across a public network such as the Internet. In the present paper, we describe an approach to textual steganography in which data is not only hidden, in virtue of its encoding, but the presence of hidden data is also concealed, through use of human-readable carrier texts. Information transmitted in this fashion remains confidential and its confidential nature is also concealed. The approach detailed addresses several shortcomings in previous work in this area. Specifically, we achieve a high rate of accuracy in message decoding and also produce carrier texts which are both coherent and plausible as human-readable plain text messages. These desirable features of textual steganography are accomplished through a system of sentence mapping and a genre-based approach to carrier text selection that produces contextually related content in the carrier messages.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weir, G.R.S., Morran, M.: Hiding the Hidden Message: Approaches to Textual Steganography. International Journal of Electronic Security and Digital Forensics 3(3), 223–233 (2010)

    Article  Google Scholar 

  2. Marwaha, P.: Visual Cryptographic Steganography in Images. In: Proceedings of the 2010 Second International Conference on Computing, Communication and Networking Technologies (ICCCNT 2010), pp. 1–6 (2010)

    Google Scholar 

  3. Delina, B.: Information Hiding: A New Approach in Text Steganography. In: Proceedings of the International Conference on Applied Computer and Applied Computational Science, World Scientific and Engineering Academy and Society (WSEAS 2008), pp. 689–695 (2008)

    Google Scholar 

  4. Kim, Y., Moon, K., Oh, I.: A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics. In: Proceedings of the Seventh International Conference on Document Analysis and Recognition (ICDAR 2003), pp. 775–779 (2003)

    Google Scholar 

  5. Shirali-Shahreza, M.: A New Synonym Text Steganography. In: Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1524–1526 (2008)

    Google Scholar 

  6. Mansor, S., Din, R., Samsudin, A.: Analysis of Natural Language Steganography. International Journal of Computer Science and Security (IJCSS) CSC Journals 3(2), 113–125 (2010)

    Google Scholar 

  7. Alattar, A., Alattar, O.: Watermarking Electronic Text Documents Containing Justified Paragraphs and Irregular Line Spacing. In: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 685–695 (2004)

    Google Scholar 

  8. Whitiak, D.: The Art of Steganography. SANS Institute, as part of GIAC Practical Repository, GSEC Practical (v.1.4b) (2003)

    Google Scholar 

  9. Shirali-Shahreza, M.: Text Steganography in SMS. In: Proceedings of the 2007 International Conference on Convergence Information Technology, November 21-23, pp. 2260–2265 (2008)

    Google Scholar 

  10. Shirali-Shahreza, M.: Text Steganography by Changing Words Spelling. In: 10th International Conference on Advanced Communication Technology (ICACT 2008), pp. 1912–1913 (2008)

    Google Scholar 

  11. Morran, M., Weir, G.: An Approach to Textual Steganography. Global Security, Safety, and Sustainability: Communications in Computer and Information Science 92, 48–54 (2010)

    Article  Google Scholar 

  12. Chapman, M., Davida, G.: Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 333–345. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Ogilvie, R., Weir, G.R.S. (2012). Genre-Based Information Hiding. In: Georgiadis, C.K., Jahankhani, H., Pimenidis, E., Bashroush, R., Al-Nemrat, A. (eds) Global Security, Safety and Sustainability & e-Democracy. e-Democracy ICGS3 2011 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 99. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33448-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33448-1_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33447-4

  • Online ISBN: 978-3-642-33448-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics