ЛИНГВИСТИЧЕСКАЯ СТЕГАНОГРАФИЯ:

Ольга Ивановна Бабина

Аннотация


В статье определено место лингвистической стеганографии в системе методов сокрытия информации как способа внедрения тайного сообщения в текст-контейнер. Понятие собственно лингвистической стеганографии, подразумевающее при формировании стеготекста имитацию свойств текста на естественном языке, противопоставлено понятию текстовой стеганографии, где для кодирования сообщения применяются характеристики формата. Выделены уровни моделирования стеготекста, которые учитываются при порождении текстов с характеристиками, типичными для не- модифицированного текста на естественном языке. Рассмотрены методы внедрения тайного сообщения в стеготекст на основе моделирования статистических и синтаксических характеристик текста. Выявлены достоинства и недостатки использования описанных методов.


Ключевые слова


лингвистическая стеганография; стеготекст; сокрытие информации; защита

Полный текст:

PDF

Литература


Литература/References

Блумфильд Л. Язык Изд. 2, стереотип. М.:

Изд-во УРСС, 2002. 608 с. [Bloomfield L. Yazyk

(The Language), 2nd edition, Moscow, Izdatel’stvo

URSS Publ., 2002, 608 p.]

Ляшевская О.Н., Шаров С.А. Частотный

словарь современного русского языка (на материа-

лах Национального корпуса русского языка).

М.: Азбуковник, 2009. 1112 с. [Lyashevskaya O.N.,

Sharoff S.A. Chastotnii slovar sovremennogo russkogo

yazyka (na materialakh Natsionalnogo korpusa

russkogo yazyka) (Frequency List of the Modern Russian

Language (based on the Russian National Corpus),

Moscow, Azbukovnik Publ., 2009, 1112 p.]

Agarwal Monika. Text Steganographic Approaches:

A Comparison, International Journal of

Network Security & Its Applications, Vol. 5, No. 1,

January 2013, pp. 91–106.

Atallah M. J., Raskin V., Crogan M., Hempelmann

C., Kerschbaum F., Mohamed D., and Naik

S. Natural Language Watermarking: Design, Analysis,

and a Proof-of-Concept Implementation,

I.S. Moskowitz (ed.), Information Hiding: Fourth International

Workshop, Lecture Notes in Computer

Science 2137, Springer, April 2001, pp. 185–199.

Bennett Krista. Linguistic Steganography:

Survey, Analysis, and Robustness Concerns for Hiding

Information in Text, CERIAS TR 2004-13, Tech.

Report, Center for Education and Research in Information

Assurance and Security (CERIAS), Purdue

University, May 2004, 30 p.

Chapman M.T., Davida G.I. Hiding the Hidden:

A Software System for Concealing Ciphertext

as Innocuous Text, O. S. Q. Yongfei Han Tatsuaki

(ed.) Information and Communications Security:

First International Conference (Beijing, China, November

–14, 1997), Lecture Notes in Computer

Science 1334, Springer, August 1997.

Chomsky Noam, Miller George A. Finite

State Languages, Information and Control, Vol. 1,

No. 2, May 1958, pp. 91–112.

Greibach Sheila. A New Normal-Form Theorem

for Context-Free Phrase Structure Grammars,

Journal of the ACM, Vol. 12, No. 1, January

, pp. 42–52.

Huffman D.A. Canonical Forms for Information

Lossless Finite-State Logical Machines, IRE

Transactions on Circuit Theory, Special supplement,

Vol. CT-6, May 1959, pp. 41–59.

Kaleem M.K. An Overview of Various

Forms of Linguistic Steganography and Their Applications

in Protecting Data, Journal of Global Research

in Computer Science, Vol. 3, No. 5, May 2012,

pp. 33–38.

Kermanidis Katia Lida. Capacity-Rich

Knowledge-Poor Linguistic Steganography, Journal of

Information Hiding and Multimedia Signal

Processing, Vol. 2, No. 3, July 2011, pp. 247–258.

Kim Mi-Young. Text Watermarking by

Syntactic Analysis, Proceedings of the 12th WSEAS

International Conference on COMPUTERS (Heraklion,

Greece, July 23-25, 2008), 2008, pp. 904–909.

Lubacz Józef, Mazurczyk Wojciech,

Szczypiorski Krzysztof. Principles and Overview of

Network Steganography, IEEE Communications

Magazine, Vol. 52, No. 5, May 2014, pp. 225–229.

Meral H. M., Sevinc E., Unkar E., Sankur

B., Ozsoy A. S., Gungor T. Syntactic Tools for Text

Watermarking, Edward J. Delp, Ping Wah Wong

(eds.), Proceedings of the SPIE Electronic Imaging

Conference: Security, Steganography, and Watermarking

of Multimedia Contents, Vol. 6505, San

Jose, CA, January 2007, pp. 65050X-1-12.

Meral Hasan Mesut, Sankur Bülent, Özsoy

A. Sumru, Güngör Tunga, Sevinç Emre. Natural Language

Watermarking via Morphosyntactic Alterations,

Computer Speech and Language, Vol. 23, 2009,

pp. 107–125.

Murphy B., Vogel C. The Syntax of Concealment:

Reliable Methods for Plain Text Information

Hiding, Proceedings of the SPIE Conference on

Security, Steganography, and Watermarking of Multimedia

Contents, Vol. 6505, San Jose, CA, 2007,

pp. 65050Y-1-12.

Pfitzman B. Information hiding terminology

– results of an informal plenary meeting and additional

proposals, R. J. Anderson (ed.), Proceedings of

Information Hiding: First International Workshop,

Lecture Notes in Computer Science, Vol. 1174, Isaac

Newton Institute, Cambridge, England, May 1996,

Springer-Verlag, Berlin, Germany, ISBN 3-540-

-8, pp. 347–350.

Singh H., Singh P. K., Saroha K. A Survey

on Text Based Steganography, Proceedings of the 3rd

National Conference INDIACom-2009 (New Delhi,

February 26 – 27, 2009), 2009, pp. 3–9.

Topkara M., Topkara U., Atallah M.J.

Words are not Enough: Sentence Level Natural Language

Watermarking, Proceedings of the ACM Workshop

on Content Protection and Security, Santa Barbara,

CA, 2006, pp. 37–46.

Topkara Mercan, Taskiran Cuneyt M., Delp

Edward J. Natural Language Watermarking, Edward J.

Бабина О.И. Лингвистическая стеганография:

современные подходы. Часть 1

В естник ЮУрГУ. Серия «Лингвистика». 33

Т. 12, № 3. С. 27–33

Delp, Ping Wah Wong (eds.), Proceedings of SPIE

and IS&T Electronic Imaging: Security, Steganography,

and Watermarking of Multimedia Contents VII,

Vol. 5681, 2005, pp. 441–452.

Wai Ei Nyein Chan, Khine May Aye.

Modified Linguistic Steganography Approach by

Using Syntax Bank and Digital Signature, International

Journal of Information and Education Technology,

Vol. 1, No. 5, December 2011, pp. 410–415.

Wayner Peter. Disappearing Cryptography:

Information Hiding: Steganography & Watermarking,

Third edition, Burlington, MA, Morgan Kauffman

Publishers, 2009, XV, 439 p. (Series in Software Engineering

and Programming).

Wayner Peter. Mimic Functions, Cryptologia,

Vol. 16, No. 3, July 1992, pp. 192–214.


Ссылки

  • На текущий момент ссылки отсутствуют.