Cryptologia
An algorithm for pronominal anaphora resolution
Computational Linguistics
Software watermarking: models and dynamic embeddings
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Foundations of statistical natural language processing
Foundations of statistical natural language processing
Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition)
Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition)
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Natural Language Watermarking and Tamperproofing
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
ISC '01 Proceedings of the 4th International Conference on Information Security
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Watermarking relational data: framework, algorithms and analysis
The VLDB Journal — The International Journal on Very Large Data Bases
The mathematics of statistical machine translation: parameter estimation
Computational Linguistics - Special issue on using large corpora: II
Evaluating automated and manual acquisition of anaphora resolution strategies
ACL '95 Proceedings of the 33rd annual meeting on Association for Computational Linguistics
A comparison of alignment models for statistical machine translation
COLING '00 Proceedings of the 18th conference on Computational linguistics - Volume 2
Defending email communication against profiling attacks
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Rights Protection for Relational Data
IEEE Transactions on Knowledge and Data Engineering
Fast decoding and optimal decoding for machine translation
ACL '01 Proceedings of the 39th Annual Meeting on Association for Computational Linguistics
Improved statistical alignment models
ACL '00 Proceedings of the 38th Annual Meeting on Association for Computational Linguistics
Proceedings of the 2006 ACM symposium on Applied computing
ANARESOLUTION '97 Proceedings of a Workshop on Operational Factors in Practical, Robust Anaphora Resolution for Unrestricted Texts
Translation-based steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
STBS: a statistical algorithm for steganalysis of translation-based steganography
IH'10 Proceedings of the 12th international conference on Information hiding
Blind linguistic steganalysis against translation based steganography
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
IH'11 Proceedings of the 13th international conference on Information hiding
Hi-index | 0.00 |
This paper investigates systems that steganographically embed information in the “noise” created by automatic translation of natural language documents. The main thrust of the work focuses on two problems - generation of plausible steganographic texts and avoiding transmission of the original source for stego objects. Because the inherent redundancy of natural language creates plenty of room for variation in translation, machine translation is ideal for steganographic applications. We describe the design and implementation of a scheme for hiding information in translated natural language text and present experimental results using the implemented system. While the initial work in this vein required the presence of both the source and the translation, the system detailed in this paper requires only the translated text for recovering the hidden message, increasing security and improving resource usage. These improvements occur not only because the source text is no longer available to the adversary, but also because a broader repertoire of defenses (such as mixing human and machine translation) can now be used.