ЛИНГВИСТИЧЕСКАЯ СТЕГАНОГРАФИЯ: СОВРЕМЕННЫЕ ПОДХОДЫ. ЧАСТЬ 2
Аннотация
недостатков формального подхода. В отличие от формальных методов, семантический и трансфор-
мационный подходы имеют целью скрыть факт передачи тайного сообщения не только от автоматических систем, но и сделать передачу надежной при анализе стеготекста человеком. Рассмотрены способы учета семантики лингвистических единиц текста. Отдельно выделен подход, основанный на кодировании информации с использованием систем машинного перевода. Выявлены достоинства и недостатки использования описанных методов.
Ключевые слова
Полный текст:
PDFЛитература
Алиев А.Т. Лингвистическая стеганогра-
фия на основе замены синонимов для текстов на
русском языке. Известия Южного федерального
университета. Технические науки. 2010.
№ 11(112). С. 162–171. [Aliev A.T. (Linguistic Steganography
Based on Synonym Substitution for Texts
in Russian), The Bulletin of the South Federal University,
Technical Sciences, 2010, no. 11(112), pp. 162–
(in Russ.)].
Ефременко Н.В. Лингвистическая стега-
нография. Вестник Московского государственного
лингвистического университета. 2011. № 619.
С. 66–73. [Efremenko N.V. (Linguistic Steganography).
The Bulletin of the Moscow State Linguistic
University, 2011, no. 619, pp. 66–73. (in Russ.)]
Atallah M. J., Raskin V., Crogan M., Hempelmann
C., Kerschbaum F., Mohamed D., and Naik
S. Natural Language Watermarking: Design, Analysis,
and a Proof-of-Concept Implementation,
I.S. Moskowitz (ed.), Information Hiding: Fourth International
Workshop, Lecture Notes in Computer
Science 2137, Springer, April 2001, pp. 185–199.
Atallah M.J., Raskin Viktor, Hempelmann
Christian F., Karahan Mercan, Sion Rodu, Topkara
Umut, Triezenberg Katrina E. Natural Language Watermarking
and Tamperproofing, Information Hiding:
th International Workshop (Noordwijkerhout,
The Netherlands), Springer, October 2002, pp. 196–212.
Bolshakov I.A. A Method of Linguistic Steganography
Based on Collocationally-Verified Synonym,
Information Hiding: 6th International Workshop,
Vol. 3200, Toronto, Canada, 2004, pp. 180–191.
Bolshakov I.A., Gelbukh A. Synonymous Paraphrasing
Using WordNet and Internet, F. Meziane,
E. Metais (eds.), Natural Language Processing and
Information Systems, Lecture Notes in Computer
Science, Vol. 3136, Springer, 2004, pp. 312–323.
Chang Ching-Yun, Clark Stephen. Practical
Linguistic Steganography Using Contextual Synonym
Substitution and Vertex Colour Coding, Proceedings
of the 2010 Conference on Empirical Methods in Natural
Language Processing (EMNLP ’10), Cambridge,
MA, 2010, pp. 1194–1203.
Chang Ching-Yun, Clark Stephen. Practical
Linguistic Steganography using Contextual SynonymSubstitution and Novel Vertex Coding Method, Computational
Linguistics, Vol. 40, No. 2, June 2014,
pp. 403–448.
Chapman Mark, Davida George I., Marc
Rennhard. A Practical and Effective Approach to
Large-Scale Automated Linguistic Steganography,
David G.I., Frankel Y. (eds.), Information Security: 4th
International Conference, ISC 2001, Lecture Notes in
Computer Science, Vol. 2200, Springer-Verlag, Berlin,
Germany, 2001, pp. 156–165.
Grosvald Michael, Orgun C. Orhan. Free
from the Cover Text: A Human-Generated Natural
Language Approach to Text-Based Steganography,
Journal of Information Hiding and Multimedia Signal
Processing, vol. 2, no. 2, April 2011, pp. 133–141.
Grothoff Christian, Grothoff Krista, Alkhutova
Ludmila, Stutsman Ryan, Atallah Mikhail J.
Translation-Based Steganography, Journal of Computer
Security, vol. 17, no. 3, August 2009, pp. 269–
Meral Hasan Mesut, Sankur Bülent, Özsoy
A. Sumru, Güngör Tunga, Sevinç Emre. Natural Language
Watermarking via Morphosyntactic Alterations,
Computer Speech and Language, vol. 23, 2009,
pp. 107–125.
Miller George A., Beckwith Richard, Fellbaum
Christiane, Gross Derek, Miller Katherine, Tengi
Randee. Five Papers on WordNet, Technical Report,
Cognitive Science Laboratory, Princeton University,
Available at: http://wordnetcode.
princeton.edu/ 5papers.pdf (access date: Nov 02,
Morran Michael, Weir George R.S. An Approach
to Textual Steganography, S. Tenreiro de MagalhaesH. Jahankhani, A.G. Hessami (eds.), Global
Security, Safety and Sustainability: Proceedings of
the 6th International Conference, ICGS3 2010,
Communications in Computer and Information
Science, Vol. 92, Braga, Portugal, September 1–3,
, pp. 48–54.
Nanhe Aniket M., Mayuresh P. Kunjir,
Sumedh V. Sakdeo. Improved Synonym Approach
to Linguistic Steganography Design and Proof-of-
Concept Implementation. 2008. Available at:
http://dsl.serc.iisc.ernet.in/~mayuresh/FImprovedSyno
nymAp proachToLinguisticSteganography.pdf
Shirali-Shahreza М. Text Steganography by
Changing Words Spelling, Proceedings of the 10th
International Conference on Advanced Communication
Technology (February 17–20, 2008), Vol. 3,
, pp. 1912–1913.
Topkara Umut, Topkara Mercan, Atallah
Mikhail J. The Hiding Virtues of Ambiguity: Quantifiably
Resilient Watermarking of Natural Language
Text through Synonym Substitutions, Proceedings of
the 8th Workshop on Multimedia and Security
(MM&Sec’06), Geneva, Switzerland, September 26–
, 2006, pp. 164–174.
Winstein Keith. Lexical Steganography
Through Adaptive Modulation of the Word Choice
Hash, 1998. Available at: http://web.mit.edu/
keithw/tlex/ (access date: Nov 02, 2014).
Wysuer Brecht, Wouters Karel, Preneel
Bart. Lexical Natural Language Steganography Systems
with Human Interaction, Proceedings of the 6th
European Conference on Information Warefare and
Security (Shrivenham, UK, July 2-3, 2007), 2007,
pp. 303–312.
Ссылки
- На текущий момент ссылки отсутствуют.