Лингвистическая стеганография: современные подходы. Часть 2

Бесплатный доступ

Рассмотрены подходы к лингвистической стеганографии, которые направлены на преодоление недостатков формального подхода. В отличие от формальных методов, семантический и трансформационный подходы имеют целью скрыть факт передачи тайного сообщения не только от автоматических систем, но и сделать передачу надежной при анализе стеготекста человеком. Рассмотрены способы учета семантики лингвистических единиц текста. Отдельно выделен подход, основанный на кодировании информации с использованием систем машинного перевода. Выявлены достоинства и недостатки использования описанных методов.

Лингвистическая стеганография, стеготекст, сокрытие информации, защита информации, автоматическая обработка текстов

Короткий адрес: https://sciup.org/147153981

IDR: 147153981   |   DOI: 10.14529/ling150410

Список литературы Лингвистическая стеганография: современные подходы. Часть 2

  • Алиев А.Т. Лингвистическая стеганография на основе замены синонимов для текстов на русском языке. Известия Южного федерального университета. Технические науки. 2010. № 11(112). С. 162-171.
  • Ефременко Н.В. Лингвистическая стеганография. Вестник Московского государственного лингвистического университета. 2011. № 619. С. 66-73.
  • Atallah M. J., Raskin V., Crogan M., Hempelmann C., Kerschbaum F., Mohamed D., and Naik S. Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation, I.S. Moskowitz (ed.), Information Hiding: Fourth International Workshop, Lecture Notes in Computer Science 2137, Springer, April 2001, pp. 185-199.
  • Atallah M.J., Raskin Viktor, Hempelmann Christian F., Karahan Mercan, Sion Rodu, Topkara Umut, Triezenberg Katrina E. Natural Language Watermarking and Tamperproofing, Information Hiding: 5th International Workshop (Noordwijkerhout, The Netherlands), Springer, October 2002, pp. 196-212.
  • Bolshakov I.A. A Method of Linguistic Steganography Based on Collocationally-Verified Synonym, Information Hiding: 6th International Workshop, Vol. 3200, Toronto, Canada, 2004, pp. 180-191.
  • Bolshakov I.A., Gelbukh A. Synonymous Paraphrasing Using WordNet and Internet, F. Meziane, E. Metais (eds.), Natural Language Processing and Information Systems, Lecture Notes in Computer Science, Vol. 3136, Springer, 2004, pp. 312-323.
  • Chang Ching-Yun, Clark Stephen. Practical Linguistic Steganography Using Contextual Synonym Substitution and Vertex Colour Coding, Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing (EMNLP ’10), Cambridge, MA, 2010, pp. 1194-1203.
  • Chang Ching-Yun, Clark Stephen. Practical Linguistic Steganography using Contextual Synonym Substitution and Novel Vertex Coding Method, Computational Linguistics, Vol. 40, No. 2, June 2014, pp. 403-448.
  • Chapman Mark, Davida George I., Marc Rennhard. A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography, David G.I., Frankel Y. (eds.), Information Security: 4th International Conference, ISC 2001, Lecture Notes in Computer Science, Vol. 2200, Springer-Verlag, Berlin, Germany, 2001, pp. 156-165.
  • Grosvald Michael, Orgun C. Orhan. Free from the Cover Text: A Human-Generated Natural Language Approach to Text-Based Steganography, Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 2, April 2011, pp. 133-141.
  • Grothoff Christian, Grothoff Krista, Alkhutova Ludmila, Stutsman Ryan, Atallah Mikhail J. Translation-Based Steganography, Journal of Computer Security, vol. 17, no. 3, August 2009, pp. 269-303.
  • Meral Hasan Mesut, Sankur Bülent, Özsoy A. Sumru, Güngör Tunga, Sevinç Emre. Natural Language Watermarking via Morphosyntactic Alterations, Computer Speech and Language, vol. 23, 2009, pp. 107-125.
  • Miller George A., Beckwith Richard, Fellbaum Christiane, Gross Derek, Miller Katherine, Tengi Randee. Five Papers on WordNet, Technical Report, Cognitive Science Laboratory, Princeton University, 1993. Available at: http://wordnetcode. princeton.edu/5papers.pdf (access date: Nov 02, 2014)
  • Morran Michael, Weir George R.S. An Approach to Textual Steganography, S. Tenreiro de Magalhaes, H. Jahankhani, A.G. Hessami (eds.), Global Security, Safety and Sustainability: Proceedings of the 6th International Conference, ICGS3 2010, Communications in Computer and Information Science, Vol. 92, Braga, Portugal, September 1-3, 2010, pp. 48-54.
  • Nanhe Aniket M., Mayuresh P. Kunjir, Sumedh V. Sakdeo. Improved Synonym Approach to Linguistic Steganography Design and Proof-of-Concept Implementation. 2008. Available at: http://dsl.serc.iisc.ernet.in/~mayuresh/FImprovedSynonymAp proachToLinguisticSteganography.pdf
  • Shirali-Shahreza М. Text Steganography by Changing Words Spelling, Proceedings of the 10th International Conference on Advanced Communication Technology (February 17-20, 2008), Vol. 3, 2008, pp. 1912-1913.
  • Topkara Umut, Topkara Mercan, Atallah Mikhail J. The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions, Proceedings of the 8th Workshop on Multimedia and Security (MM&Sec’06), Geneva, Switzerland, September 26-27, 2006, pp. 164-174.
  • Winstein Keith. Lexical Steganography Through Adaptive Modulation of the Word Choice Hash, 1998. Available at: http://web.mit.edu/keithw/tlex/(access date: Nov 02, 2014).
  • Wysuer Brecht, Wouters Karel, Preneel Bart. Lexical Natural Language Steganography Systems with Human Interaction, Proceedings of the 6th European Conference on Information Warefare and Security (Shrivenham, UK, July 2-3, 2007), 2007, pp. 303-312.
Еще
Статья научная