ЛИНГВИСТИЧЕСКАЯ СТЕГАНОГРАФИЯ:
Аннотация
В статье определено место лингвистической стеганографии в системе методов сокрытия информации как способа внедрения тайного сообщения в текст-контейнер. Понятие собственно лингвистической стеганографии, подразумевающее при формировании стеготекста имитацию свойств текста на естественном языке, противопоставлено понятию текстовой стеганографии, где для кодирования сообщения применяются характеристики формата. Выделены уровни моделирования стеготекста, которые учитываются при порождении текстов с характеристиками, типичными для не- модифицированного текста на естественном языке. Рассмотрены методы внедрения тайного сообщения в стеготекст на основе моделирования статистических и синтаксических характеристик текста. Выявлены достоинства и недостатки использования описанных методов.
Ключевые слова
Полный текст:
PDFЛитература
Литература/References
Блумфильд Л. Язык Изд. 2, стереотип. М.:
Изд-во УРСС, 2002. 608 с. [Bloomfield L. Yazyk
(The Language), 2nd edition, Moscow, Izdatel’stvo
URSS Publ., 2002, 608 p.]
Ляшевская О.Н., Шаров С.А. Частотный
словарь современного русского языка (на материа-
лах Национального корпуса русского языка).
М.: Азбуковник, 2009. 1112 с. [Lyashevskaya O.N.,
Sharoff S.A. Chastotnii slovar sovremennogo russkogo
yazyka (na materialakh Natsionalnogo korpusa
russkogo yazyka) (Frequency List of the Modern Russian
Language (based on the Russian National Corpus),
Moscow, Azbukovnik Publ., 2009, 1112 p.]
Agarwal Monika. Text Steganographic Approaches:
A Comparison, International Journal of
Network Security & Its Applications, Vol. 5, No. 1,
January 2013, pp. 91–106.
Atallah M. J., Raskin V., Crogan M., Hempelmann
C., Kerschbaum F., Mohamed D., and Naik
S. Natural Language Watermarking: Design, Analysis,
and a Proof-of-Concept Implementation,
I.S. Moskowitz (ed.), Information Hiding: Fourth International
Workshop, Lecture Notes in Computer
Science 2137, Springer, April 2001, pp. 185–199.
Bennett Krista. Linguistic Steganography:
Survey, Analysis, and Robustness Concerns for Hiding
Information in Text, CERIAS TR 2004-13, Tech.
Report, Center for Education and Research in Information
Assurance and Security (CERIAS), Purdue
University, May 2004, 30 p.
Chapman M.T., Davida G.I. Hiding the Hidden:
A Software System for Concealing Ciphertext
as Innocuous Text, O. S. Q. Yongfei Han Tatsuaki
(ed.) Information and Communications Security:
First International Conference (Beijing, China, November
–14, 1997), Lecture Notes in Computer
Science 1334, Springer, August 1997.
Chomsky Noam, Miller George A. Finite
State Languages, Information and Control, Vol. 1,
No. 2, May 1958, pp. 91–112.
Greibach Sheila. A New Normal-Form Theorem
for Context-Free Phrase Structure Grammars,
Journal of the ACM, Vol. 12, No. 1, January
, pp. 42–52.
Huffman D.A. Canonical Forms for Information
Lossless Finite-State Logical Machines, IRE
Transactions on Circuit Theory, Special supplement,
Vol. CT-6, May 1959, pp. 41–59.
Kaleem M.K. An Overview of Various
Forms of Linguistic Steganography and Their Applications
in Protecting Data, Journal of Global Research
in Computer Science, Vol. 3, No. 5, May 2012,
pp. 33–38.
Kermanidis Katia Lida. Capacity-Rich
Knowledge-Poor Linguistic Steganography, Journal of
Information Hiding and Multimedia Signal
Processing, Vol. 2, No. 3, July 2011, pp. 247–258.
Kim Mi-Young. Text Watermarking by
Syntactic Analysis, Proceedings of the 12th WSEAS
International Conference on COMPUTERS (Heraklion,
Greece, July 23-25, 2008), 2008, pp. 904–909.
Lubacz Józef, Mazurczyk Wojciech,
Szczypiorski Krzysztof. Principles and Overview of
Network Steganography, IEEE Communications
Magazine, Vol. 52, No. 5, May 2014, pp. 225–229.
Meral H. M., Sevinc E., Unkar E., Sankur
B., Ozsoy A. S., Gungor T. Syntactic Tools for Text
Watermarking, Edward J. Delp, Ping Wah Wong
(eds.), Proceedings of the SPIE Electronic Imaging
Conference: Security, Steganography, and Watermarking
of Multimedia Contents, Vol. 6505, San
Jose, CA, January 2007, pp. 65050X-1-12.
Meral Hasan Mesut, Sankur Bülent, Özsoy
A. Sumru, Güngör Tunga, Sevinç Emre. Natural Language
Watermarking via Morphosyntactic Alterations,
Computer Speech and Language, Vol. 23, 2009,
pp. 107–125.
Murphy B., Vogel C. The Syntax of Concealment:
Reliable Methods for Plain Text Information
Hiding, Proceedings of the SPIE Conference on
Security, Steganography, and Watermarking of Multimedia
Contents, Vol. 6505, San Jose, CA, 2007,
pp. 65050Y-1-12.
Pfitzman B. Information hiding terminology
– results of an informal plenary meeting and additional
proposals, R. J. Anderson (ed.), Proceedings of
Information Hiding: First International Workshop,
Lecture Notes in Computer Science, Vol. 1174, Isaac
Newton Institute, Cambridge, England, May 1996,
Springer-Verlag, Berlin, Germany, ISBN 3-540-
-8, pp. 347–350.
Singh H., Singh P. K., Saroha K. A Survey
on Text Based Steganography, Proceedings of the 3rd
National Conference INDIACom-2009 (New Delhi,
February 26 – 27, 2009), 2009, pp. 3–9.
Topkara M., Topkara U., Atallah M.J.
Words are not Enough: Sentence Level Natural Language
Watermarking, Proceedings of the ACM Workshop
on Content Protection and Security, Santa Barbara,
CA, 2006, pp. 37–46.
Topkara Mercan, Taskiran Cuneyt M., Delp
Edward J. Natural Language Watermarking, Edward J.
Бабина О.И. Лингвистическая стеганография:
современные подходы. Часть 1
В естник ЮУрГУ. Серия «Лингвистика». 33
Т. 12, № 3. С. 27–33
Delp, Ping Wah Wong (eds.), Proceedings of SPIE
and IS&T Electronic Imaging: Security, Steganography,
and Watermarking of Multimedia Contents VII,
Vol. 5681, 2005, pp. 441–452.
Wai Ei Nyein Chan, Khine May Aye.
Modified Linguistic Steganography Approach by
Using Syntax Bank and Digital Signature, International
Journal of Information and Education Technology,
Vol. 1, No. 5, December 2011, pp. 410–415.
Wayner Peter. Disappearing Cryptography:
Information Hiding: Steganography & Watermarking,
Third edition, Burlington, MA, Morgan Kauffman
Publishers, 2009, XV, 439 p. (Series in Software Engineering
and Programming).
Wayner Peter. Mimic Functions, Cryptologia,
Vol. 16, No. 3, July 1992, pp. 192–214.
Ссылки
- На текущий момент ссылки отсутствуют.