Cryptologia
Foundations of statistical natural language processing
Foundations of statistical natural language processing
Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition)
Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition)
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
Natural Language Watermarking and Tamperproofing
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
ISC '01 Proceedings of the 4th International Conference on Information Security
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
The mathematics of statistical machine translation: parameter estimation
Computational Linguistics - Special issue on using large corpora: II
A comparison of alignment models for statistical machine translation
COLING '00 Proceedings of the 18th conference on Computational linguistics - Volume 2
Defending email communication against profiling attacks
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Fast decoding and optimal decoding for machine translation
ACL '01 Proceedings of the 39th Annual Meeting on Association for Computational Linguistics
Improved statistical alignment models
ACL '00 Proceedings of the 38th Annual Meeting on Association for Computational Linguistics
Proceedings of the 2006 ACM symposium on Applied computing
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Natural language watermarking via morphosyntactic alterations
Computer Speech and Language
Graphstega: Graph Steganography Methodology
Journal of Digital Forensic Practice
Nostega: A Novel Noiseless Steganography Paradigm
Journal of Digital Forensic Practice
Translation-based steganography
Journal of Computer Security - Best papers of the Sec Track at the 2006 ACM Symposium
Content-aware steganography: about lazy prisoners and narrow-minded wardens
IH'06 Proceedings of the 8th international conference on Information hiding
Comprehensive linguistic steganography survey
International Journal of Information and Computer Security
STBS: a statistical algorithm for steganalysis of translation-based steganography
IH'10 Proceedings of the 12th international conference on Information hiding
Headstega: e-mail-headers-based steganography methodology
International Journal of Electronic Security and Digital Forensics
Blind linguistic steganalysis against translation based steganography
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Sumstega: summarisation-based steganography methodology
International Journal of Information and Computer Security
IH'11 Proceedings of the 13th international conference on Information hiding
Steganalysis against substitution-based linguistic steganography based on context clusters
Computers and Electrical Engineering
Edustega: an Education-Centric Steganography methodology
International Journal of Security and Networks
Adaptive-capacity and robust natural language watermarking for agglutinative languages
Security and Communication Networks
Jokestega: automatic joke generation-based steganography methodology
International Journal of Security and Networks
Hi-index | 0.00 |
This paper investigates the possibilities of steganographically embedding information in the “noise” created by automatic translation of natural language documents. Because the inherent redundancy of natural language creates plenty of room for variation in translation, machine translation is ideal for steganographic applications. Also, because there are frequent errors in legitimate automatic text translations, additional errors inserted by an information hiding mechanism are plausibly undetectable and would appear to be part of the normal noise associated with translation. Significantly, it should be extremely difficult for an adversary to determine if inaccuracies in the translation are caused by the use of steganography or by deficiencies of the translation software.