GENERALIZED APPROACHES TO LINGUISTIC TEXT STEGANOGRAPHY THROUGH INDIAN LANGUAGES

Suvamoy Changder, Narayan C. Debnath, and Debidas Ghosh

References

  1. [1] C. Cachin, An information-theoretic model for steganography,Proc. 2nd Information Hiding Workshop, Portland, USA, 1998,306–318.
  2. [2] R. Chandramouli, M. Kharrazi, and N. Memon, Imagesteganography and steganalysis: Concepts and practice, Proc.IWDW and LNCS, Seoul, Korea, 2004, 35–49.
  3. [3] N.F. Johnson and S. Jajodia, Staganalysis: The investigation ofhiding information, Proc. Information Technology Conference,IEEE, Syracuse, NY, USA, 1998, 113–116.
  4. [4] D. Artz, Digital steganography: Hiding data within data,IEEE Internet Computing, 5(3), 2001, 75–80.
  5. [5] Herodotus, The Histories (London: Penguin Books, 1996).Translated by Aubrey de S´elincourt.
  6. [6] G. Simmons, The prisoners problem and the subliminal channel,Proc. CRYPTO’83, Santa Barbara, CA, 1983, 51–67.
  7. [7] J. Chen, T.S. Chen, and M.W. Cheng, A new data hidingscheme in binary image, Proc. Fifth International Symposiumon Multimedia Software Engineering, Taichung, Taiwan, 2003,88–93.
  8. [8] G. Do¨err and J.L. Dugelay, A guide tour of video watermarking,Signal Processing: Image Communication, 18(4), 2003, 263–282.
  9. [9] G. Do¨err and J.L. Dugelay, Security pitfalls of frame by-frameapproaches to video watermarking, IEEE Transactions onSignal Processing, Supplement on Secure Media, 52(10), 2004,2955–2964.
  10. [10] K. Gopalan, Audio steganography using bit modification, Proc.IEEE International Conf. on Acoustics, Speech, and SignalProcessing, ICASSP ’03, Hong Kong, China, 2003, 421–424.
  11. [11] J.T. Brassil, S. Low, N.F. Maxemchuk, and L. O’Gorman,Electronic marking and identification techniques todiscourage document copying, IEEE Journal on Selected Areasin Communications, 13(8), 1995, 1495–1504.
  12. [12] P. Wayner, Mimic functions, International Journal of Cryp-tologia, 16(3), 1992, 193–214.
  13. [13] M.T. Chapman, Hiding the hidden: A software system forconcealing ciphertext as innocuous text, Master’s Thesis, Uni-versity of Wisconsin-Milwaukee, 1997.
  14. [14] P. Meng, L. Huang, Z. Chen, W. Yang, and D. Li, Linguisticsteganography detection based on perplexity, Proc. Interna-tional Conf. on MultiMedia and Information Technology, ThreeGorges, China, 2008, 217–220.
  15. [15] K. Winstein, Lexical steganography through adaptive modula-tion of the word choice hash, http://alumni.imsa.edu/∼keithw/tlex/lsteg.pdf, last visited May 2010.
  16. [16] W. Shu-feng and Huang Liu-sheng, Research on informationhiding, Degree of Master, University of Science and Technologyof China, 2003.8
  17. [17] T. Moerland, Steganography and steganalysis, www.liacs.nl/home/tmoerlan/privtech.pdf, 2003, last visited December,2007.
  18. [18] S.H. Low, N.F. Maxemchuk, J.T. Brassil, and L. O’Gorman,Document marking and identification using both line and wordshifting, Proc. of the Fourteenth Annual Joint Conf. of the IEEEComputer and Communications Societies (INFOCOM ’95),Boston, MA, 1995, 2, 853–860.
  19. [19] A.M. Alattar and O.M. Alattar, Watermarking electronic textdocuments containing justified paragraphs and irregular linespacing, Proc. SPIE – Volume 5306, Security, Steganography,and Watermarking of Multimedia Contents VI, San Jose, CA,2004, 685–695.
  20. [20] K. Bennett, Linguistic steganography: Survey, analysis, androbustness concerns for hiding information in text, PurdueUniversity, CERIAS Tech. Report 2004-13, 2004.
  21. [21] Y. Kim, K. Moon, and I. Oh, A text watermarking algorithmbased on word classification and inter-word space statistics,Proc. Seventh International Conf. on Document Analysis andRecognition (ICDAR’03), Edinburgh, Scotland, 2003, 775–779.
  22. [22] K. Rabah, Steganography – the art of hiding data, InternationalJournal of Information Technology, 3(3), 2004, 245–269.
  23. [23] M.H. Shirali-Shahreza and M. Shirali-Shahreza, A new ap-proach to Persian/Arabic text steganography, Proc. 5thIEEE/ACIS International Conf. on Computer and InformationScience, Honolulu, HI, 2006, 310–315.
  24. [24] D. Huang and H. Yan, Interword distance changes representedby sine waves for watermarking text images, IEEE Transactionson Circuits and Systems for Video Technology, 11(12), 2001,1237–1245.
  25. [25] S. Changder and N.C. Debnath, A new approach for steganog-raphy in Bengali text, International Journal of ComputationalMethods in Science and Engineering (JCMSE), 9(1,2 S1),2009, 111–122.
  26. [26] S. Changder, N.C. Debnath, and D. Ghosh, Hindi textsteganography – An approach to information hiding, Inter-national Journal of Computational Methods in Science andEngineering (JCMSE), 10(1,2 S1), 2010, 85–96.
  27. [27] S. Changder, N.C. Debnath, and D.Ghosh, Linguistic approachfor text steganography through Indian text, Proc. of IEEEInt. Conf. on Computer Technology and Development (ICCTD2010), Cairo, Egypt, 2010, 318–322.
  28. [28] S. Changder, N.C. Debnath, and D. Ghosh, LCS based textsteganography through Indian languages, Proc. 3rd IEEEInt. Conf. on Computer Science and Information Technology(ICCSIT 2010), Chengdu, China, 8, 2010, 53–58.
  29. [29] C. Zhi-li, H. Liu-sheng, Y. Zhen-shan, Z. Xin-xin, and Z. Xue-ling, Effective linguistic steganography detection, Proc. 2008IEEE 8th Int. Conf. on Computer and Information TechnologyWorkshops, Sydney, QLD, 2008, 224–229.
  30. [30] www.languageinindia.com/feb2006/bengaliinterrogative1.html,last visited Feb’10.

Important Links:

Go Back