12 research outputs found

    TRIGGER-CONTAINERS IN LINGUISTIC STEGANOGRAPHY

    Get PDF
    The article deals with the new term “trigger-container” in linguistic steganography. The necessity to introduce this term was brought about by the creation a unique kind of steganographic containers of minimal possible size that would allow for insertion of confidential information into Russian written texts. The introduction of “trigger-containers” is intrinsically interwoven with our ongoing systematic attempt to create a linguistic steganographic term apparatus of describing sense information protection on the basis of linguistic experimentation with a strong scientific foundation. Concurrent use of the proposed steganographic term in praxis in conjunction with the data yielding from linguistic experiments would allow to create a method for concealing sensitive information in Russian written texts that is simultaneously highly secure against automated and expert-driven visual steganalysis as is not dependent on the usage of cryptographic cyphers. The novelty of this research is based on the introduction of the new term “trigger-containers”, which describes a phenomenon that is not touched upon in other research. The goal of the paper is, likewise, the introduction of the term, which allows one to describe the proper theoretical basis of qualitative research in the field of linguistic steganography. We introduce the term “trigger container” which allows to create the basis for our method of conducting perceptive experimental research in the field of linguistic steganography

    Performance Analysis on Text Steganalysis Method Using A Computational Intelligence Approach

    Get PDF
    In this paper, a critical view of the utilization ofcomputational intelligence approach from the text steganalysisperspective is presented. This paper proposes a formalization ofgenetic algorithm method in order to detect hidden message on ananalyzed text. Five metric parameters such as running time, fitnessvalue, average mean probability, variance probability, and standarddeviation probability were used to measure the detection performancebetween statistical methods and genetic algorithm methods.Experiments conducted using both methods showed that geneticalgorithm method performs much better than statistical method,especially in detecting short analyzed texts. Thus, the findings showedthat the genetic algorithm method on analyzed stego text is verypromising. For future work, several significant factors such as datasetenvironment, searching process and types of fitness values throughother intelligent methods of computational intelligence should beinvestigated

    Digital watermarking: a state-of-the-art review

    Get PDF
    Digital watermarking is the art of embedding data, called a watermark, into a multimedia object such that the watermark can be detected or extracted later without impairing the object. Concealment of secret messages inside a natural language, known as steganography, has been in existence as early as the 16th century. However, the increase in electronic/digital information transmission and distribution has resulted in the spread of watermarking from ordinary text to multimedia transmission. In this paper, we review various approaches and methods that have been used to conceal and preserve messages. Examples of real-world applications are also discussed.SANPAD, Telkom, Cisco, Aria Technologies, THRIPDepartment of HE and Training approved lis

    The XBOX 360 and Steganography: How Criminals and Terrorists Could Be Going Dark

    Get PDF
    Video game consoles have evolved from single-player embedded systems with rudimentary processing and graphics capabilities to multipurpose devices that provide users with parallel functionality to contemporary desktop and laptop computers. Besides offering video games with rich graphics and multiuser network play, today\u27s gaming consoles give users the ability to communicate via email, video and text chat; transfer pictures, videos, and file;, and surf the World-Wide-Web. These communication capabilities have, unfortunately, been exploited by people to plan and commit a variety of criminal activities. In an attempt to cover the digital tracks of these unlawful undertakings, anti-forensic techniques, such as steganography, may be utilized to hide or alter evidence. This paper will explore how criminals and terrorists might be using the Xbox 360 to convey messages and files using steganographic techniques. Specific attention will be paid to the going dark problem and the disjoint between forensic capabilities for analyzing traditional computers and forensic capabilities for analyzing video game consoles. Forensic approaches for examining Microsoft\u27s Xbox 360 will be detailed and the resulting evidentiary capabilities will be discussed. Keywords: Digital Forensics, Xbox Gaming Console, Steganography, Terrorism, Cyber Crim

    Matryoshka: Hiding Secret Communication in Plain Sight

    Get PDF
    We want to enable a pair of communicating users to exchange secret messages while hiding the fact that secret communication is taking place. We propose a linguistic steganography approach, where each human message is hidden in another human-like message. A hard open question is how to keep the steganographic message small -- existing related tools tend to blow up its size, thereby revealing the use of steganography. We encrypt by compressing each message, mapping it to a plausible sequence of words (using a language model), and letting the human user edit the outcome to produce a human-like message; we decrypt with a Viterbi-like state decoder. Our approach aims in producing text that a human can edit and fix with minimal effort. As a first step, we build a prototype of our system that helps users encrypt English messages (into English messages), and we report on first experiments on Mechanical Turk
    corecore