A Very Large Database of Collocations and Semantic Links
NLDB '00 Proceedings of the 5th International Conference on Applications of Natural Language to Information Systems-Revised Papers
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Heuristics-Based Replenishment of Collocation Databases
PorTAL '02 Proceedings of the Third International Conference on Advances in Natural Language Processing
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Natural Language Watermarking and Tamperproofing
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
ISC '01 Proceedings of the 4th International Conference on Information Security
Natural language watermarking via morphosyntactic alterations
Computer Speech and Language
Hiding Information by Context-Based Synonym Substitution
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Content-aware steganography: about lazy prisoners and narrow-minded wardens
IH'06 Proceedings of the 8th international conference on Information hiding
Comprehensive linguistic steganography survey
International Journal of Information and Computer Security
Linguistic steganography using automatically generated paraphrases
HLT '10 Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics
Practical linguistic steganography using contextual synonym substitution and vertex colour coding
EMNLP '10 Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing
Headstega: e-mail-headers-based steganography methodology
International Journal of Electronic Security and Digital Forensics
Steganalysis against substitution-based linguistic steganography based on context clusters
Computers and Electrical Engineering
Edustega: an Education-Centric Steganography methodology
International Journal of Security and Networks
Stable coordinate pairs in spanish: statistical and structural description
CIARP'05 Proceedings of the 10th Iberoamerican Congress conference on Progress in Pattern Recognition, Image Analysis and Applications
On the existence of perfect stegosystems
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
NLDB'06 Proceedings of the 11th international conference on Applications of Natural Language to Information Systems
Detection of substitution-based linguistic steganography by relative frequency analysis
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Text split-based steganography in OOXML format documents for covert communication
Security and Communication Networks
A new data hiding method via revision history records on collaborative writing platforms
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Hi-index | 0.00 |
A method is proposed of the automatic concealment of digital information in rather long orthographically and semantically correct texts. The method does not change the meaning of the source text; it only replaces some words by their synonyms. Groups of absolute synonyms are used in a context independent manner, while the groups of relative synonyms are previously tested for semantic compatibility with the collocations containing the word to be replaced. A specific replacement is determined by the hidden information. The collocations are syntactically connected and semantically compatible pairs of content words; they are massively gathered beforehand, with a wide diversity in their stability and idiomacity. Thus the necessary linguistic resources are a specific synonymy dictionary and a very large database of collocations. The steganographic algorithm is informally outlined. An example of hiding binary information in a Russian text fragment is manually traced, with a rough evaluation of the steganographic bandwidth.