Compilers: principles, techniques, and tools
Compilers: principles, techniques, and tools
Lex & yacc
Cryptologia
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Plausible Deniability Using Automated Linguistic Stegonagraphy
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Proceedings of the 2006 ACM symposium on Applied computing
WhiteSteg: a new scheme in information hiding using text steganography
WSEAS Transactions on Computers
Nostega: A Novel Noiseless Steganography Paradigm
Journal of Digital Forensic Practice
Translation-based steganography
Journal of Computer Security - Best papers of the Sec Track at the 2006 ACM Symposium
Hiding Information by Context-Based Synonym Substitution
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Content-aware steganography: about lazy prisoners and narrow-minded wardens
IH'06 Proceedings of the 8th international conference on Information hiding
Comprehensive linguistic steganography survey
International Journal of Information and Computer Security
Headstega: e-mail-headers-based steganography methodology
International Journal of Electronic Security and Digital Forensics
Sumstega: summarisation-based steganography methodology
International Journal of Information and Computer Security
Edustega: an Education-Centric Steganography methodology
International Journal of Security and Networks
A method of linguistic steganography based on collocationally-verified synonymy
IH'04 Proceedings of the 6th international conference on Information Hiding
EMNLP '11 Proceedings of the Conference on Empirical Methods in Natural Language Processing
Translation-based steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
Detection of substitution-based linguistic steganography by relative frequency analysis
Digital Investigation: The International Journal of Digital Forensics & Incident Response
A compression-based text steganography method
Journal of Systems and Software
Jokestega: automatic joke generation-based steganography methodology
International Journal of Security and Networks
A new data hiding method via revision history records on collaborative writing platforms
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Hi-index | 0.00 |
Several automated techniques exist to transform ciphertext into text that "looks like" natural-language text while retaining the ability to recover the original ciphertext. This transformation changes the ciphertext so that it doesn't attract undue attention from, for example, attackers or agencies or organizations that might want to detect or censor encrypted communication. Although it is relatively easy to generate a small sample of quality text, it is challenging to be able to generate large texts that are "meaningful" to a human reader and which appear innocuous.This paper expands on a previous approach that used sentence models and large dictionaries of words classified by part-of-speech [7]. By using an "extensible contextual template" approach combined with a synonymbased replacement strategy, much more realistic text is generated than was possible with NICETEXT.