ЛИНГВИСТИЧЕСКАЯ СТЕГАНОГРАФИЯ: СОВРЕМЕННЫЕ ПОДХОДЫ. ЧАСТЬ 2

Ольга Ивановна Бабина

Аннотация


Рассмотрены подходы к лингвистической стеганографии, которые направлены на преодоление
недостатков формального подхода. В отличие от формальных методов, семантический и трансфор-
мационный подходы имеют целью скрыть факт передачи тайного сообщения не только от автоматических систем, но и сделать передачу надежной при анализе стеготекста человеком. Рассмотрены способы учета семантики лингвистических единиц текста. Отдельно выделен подход, основанный на кодировании информации с использованием систем машинного перевода. Выявлены достоинства и недостатки использования описанных методов.

Ключевые слова


лингвистическая стеганография, стеготекст, сокрытие информации, защита информации, автоматическая обработка текстов

Полный текст:

PDF

Литература


Алиев А.Т. Лингвистическая стеганогра-

фия на основе замены синонимов для текстов на

русском языке. Известия Южного федерального

университета. Технические науки. 2010.

№ 11(112). С. 162–171. [Aliev A.T. (Linguistic Steganography

Based on Synonym Substitution for Texts

in Russian), The Bulletin of the South Federal University,

Technical Sciences, 2010, no. 11(112), pp. 162–

(in Russ.)].

Ефременко Н.В. Лингвистическая стега-

нография. Вестник Московского государственного

лингвистического университета. 2011. № 619.

С. 66–73. [Efremenko N.V. (Linguistic Steganography).

The Bulletin of the Moscow State Linguistic

University, 2011, no. 619, pp. 66–73. (in Russ.)]

Atallah M. J., Raskin V., Crogan M., Hempelmann

C., Kerschbaum F., Mohamed D., and Naik

S. Natural Language Watermarking: Design, Analysis,

and a Proof-of-Concept Implementation,

I.S. Moskowitz (ed.), Information Hiding: Fourth International

Workshop, Lecture Notes in Computer

Science 2137, Springer, April 2001, pp. 185–199.

Atallah M.J., Raskin Viktor, Hempelmann

Christian F., Karahan Mercan, Sion Rodu, Topkara

Umut, Triezenberg Katrina E. Natural Language Watermarking

and Tamperproofing, Information Hiding:

th International Workshop (Noordwijkerhout,

The Netherlands), Springer, October 2002, pp. 196–212.

Bolshakov I.A. A Method of Linguistic Steganography

Based on Collocationally-Verified Synonym,

Information Hiding: 6th International Workshop,

Vol. 3200, Toronto, Canada, 2004, pp. 180–191.

Bolshakov I.A., Gelbukh A. Synonymous Paraphrasing

Using WordNet and Internet, F. Meziane,

E. Metais (eds.), Natural Language Processing and

Information Systems, Lecture Notes in Computer

Science, Vol. 3136, Springer, 2004, pp. 312–323.

Chang Ching-Yun, Clark Stephen. Practical

Linguistic Steganography Using Contextual Synonym

Substitution and Vertex Colour Coding, Proceedings

of the 2010 Conference on Empirical Methods in Natural

Language Processing (EMNLP ’10), Cambridge,

MA, 2010, pp. 1194–1203.

Chang Ching-Yun, Clark Stephen. Practical

Linguistic Steganography using Contextual SynonymSubstitution and Novel Vertex Coding Method, Computational

Linguistics, Vol. 40, No. 2, June 2014,

pp. 403–448.

Chapman Mark, Davida George I., Marc

Rennhard. A Practical and Effective Approach to

Large-Scale Automated Linguistic Steganography,

David G.I., Frankel Y. (eds.), Information Security: 4th

International Conference, ISC 2001, Lecture Notes in

Computer Science, Vol. 2200, Springer-Verlag, Berlin,

Germany, 2001, pp. 156–165.

Grosvald Michael, Orgun C. Orhan. Free

from the Cover Text: A Human-Generated Natural

Language Approach to Text-Based Steganography,

Journal of Information Hiding and Multimedia Signal

Processing, vol. 2, no. 2, April 2011, pp. 133–141.

Grothoff Christian, Grothoff Krista, Alkhutova

Ludmila, Stutsman Ryan, Atallah Mikhail J.

Translation-Based Steganography, Journal of Computer

Security, vol. 17, no. 3, August 2009, pp. 269–

Meral Hasan Mesut, Sankur Bülent, Özsoy

A. Sumru, Güngör Tunga, Sevinç Emre. Natural Language

Watermarking via Morphosyntactic Alterations,

Computer Speech and Language, vol. 23, 2009,

pp. 107–125.

Miller George A., Beckwith Richard, Fellbaum

Christiane, Gross Derek, Miller Katherine, Tengi

Randee. Five Papers on WordNet, Technical Report,

Cognitive Science Laboratory, Princeton University,

Available at: http://wordnetcode.

princeton.edu/ 5papers.pdf (access date: Nov 02,

Morran Michael, Weir George R.S. An Approach

to Textual Steganography, S. Tenreiro de MagalhaesH. Jahankhani, A.G. Hessami (eds.), Global

Security, Safety and Sustainability: Proceedings of

the 6th International Conference, ICGS3 2010,

Communications in Computer and Information

Science, Vol. 92, Braga, Portugal, September 1–3,

, pp. 48–54.

Nanhe Aniket M., Mayuresh P. Kunjir,

Sumedh V. Sakdeo. Improved Synonym Approach

to Linguistic Steganography Design and Proof-of-

Concept Implementation. 2008. Available at:

http://dsl.serc.iisc.ernet.in/~mayuresh/FImprovedSyno

nymAp proachToLinguisticSteganography.pdf

Shirali-Shahreza М. Text Steganography by

Changing Words Spelling, Proceedings of the 10th

International Conference on Advanced Communication

Technology (February 17–20, 2008), Vol. 3,

, pp. 1912–1913.

Topkara Umut, Topkara Mercan, Atallah

Mikhail J. The Hiding Virtues of Ambiguity: Quantifiably

Resilient Watermarking of Natural Language

Text through Synonym Substitutions, Proceedings of

the 8th Workshop on Multimedia and Security

(MM&Sec’06), Geneva, Switzerland, September 26–

, 2006, pp. 164–174.

Winstein Keith. Lexical Steganography

Through Adaptive Modulation of the Word Choice

Hash, 1998. Available at: http://web.mit.edu/

keithw/tlex/ (access date: Nov 02, 2014).

Wysuer Brecht, Wouters Karel, Preneel

Bart. Lexical Natural Language Steganography Systems

with Human Interaction, Proceedings of the 6th

European Conference on Information Warefare and

Security (Shrivenham, UK, July 2-3, 2007), 2007,

pp. 303–312.


Ссылки

  • На текущий момент ссылки отсутствуют.