SlideShare a Scribd company logo
1 of 30
Recent Developments in Text
Steganography
Chair Professor Chin-Chen Chang
National Tsing Hua University
National Chung Cheng University
Feng Chia University
http://msn.iecs.fcu.edu.tw/~ccc
http://msn.iecs.fcu.edu.tw/
2
Information hiding in general text

Synonym substitution

Syntactic transformation

Translation

Semantic transformation
Information hiding in hypertext
Information hiding in binary text

Inter-word spacing schemes
Information hiding in chat text

Text steganography in chat

Emoticon-based steganography in chat
3
Synonym substitution
Taichung is a
0 wonderful
1 decent
2 fine
3 great
4 nice
little
0 city
1 town
Secret message: (3)5(1)2
Taichung is a great little town
4
Syntactic transformations
Syntactic: the way that words and phrases are put together to form sentences in a language
5
Semantic transformation
• Grafting: adding or repeating information
• Pruning: removing repeated information
• Substitution: replacing information
Semantic :Describe things that deal with the meanings of words and sentences
6
Grafting
He is detained in Japan.
He, an American citizen, is detained in Japan.
7
Pruning
The Pentagon ordered two new spy planes
to the region to start flying over
Afghanistan.
Afghanistan has been under attack since October,
and the Pentagon ordered two new spy planes to
Afghanistan has been under attack since October
8
Substitution
The Pentagon ordered two new spy planes to
the region to start flying over Afghanistan.
Afghanistan Taliban ruled country
The Pentagon ordered two new spy planes to the
region to start flying over the Taliban ruled country.
9
Translation
法文 : C’est la vie
英文 :
That’s life.
That is the life.
It is the life.
It’s life.
Message
Alice Bob
Stego object
Cover object
10
Rule # Rule Code
Prob
.
(1) S -> AB 0 0.5
(2) S -> CB 1 0.5
(3) A -> It is 0 0.5
(4) A -> It’s 1 0.5
(5) C -> That is 0 0.5
(6) C -> That’s 1 0.5
(7) B -> life 0 0.5
(8) B -> the life 10 0.25
(9) B -> a life 11 0.25
Prefix Rule Output
1 (2) CB
0 (5) That is B
10 (8) That is the life
Secret: 1010
Translation
11
Inter-word spacing scheme 1
• This scheme exploits inter-word space of
text to encode data.
Thisisabook.
Secret bits: {0 1 0}
Thisisabook.
12
Inter-word spacing scheme 2
Weemploythecombinationoftherepeatedwords…
cret bits: { 1 0 1 1}
ce change: + -      +
We employthecombinationof therepeated words…
• Keep spaces between groups unchanged.
13
Add-pattern Delete-pattern
Information hiding in binary text
Binary image
14
Information hiding in binary text
• Embedding
Secret bit 0 : A-pattern  D-pattern
D-pattern  D-pattern
Secret bit 1 : D-pattern  A-pattern
A-pattern  A-pattern
• Extracting
D-pattern  Secret bit 0
A-pattern  Secret bit 1
15
Information hiding in hypertext
ExtractionExtractionSecret message
Secret message
EmbeddingEmbedding
Cover hypertext
Stego hypertext
Secret key
16
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=big5">
<title> 多媒體暨網路安全實驗室 </title>
</head>
<body bgcolor="#D27D1O">
<p align="center"><img border="0" src="msn.jpg" width="338" height="345"></p>
<p align="center"><font face=" 標楷體 " color="#f4efe8" size="7">~ 歡迎加入
~</font></p>
</body>
Tags
text file
Secret: 010110…
<META
capital letters
small letters
0
1
:the written states
01
</title>
1
2
3
4
5
6
<HTML>
</HTML>
0110
<body
<p
Information hiding in hypertext
17
Secret: 010110…
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=big5">
<title> 多媒體暨網路安全實驗室 </title>
</head>
<body bgcolor="#D27D1O">
<p align="center"><img border="0" src="msn.jpg" width="338" height="345"></p>
<p align="center"><font face=" 標楷體 " color="#f4efe8" size="7">~ 歡迎加入
~</font></p>
</body>
</html>
text file
<META1
2
3
4
5
6
<HTML>
</HTML>
<body
<p
capital letters
small letters
0
1
:the written states
Information hiding in hypertext
18
Text steganography in chat
Shirali-Shahreza, M.H., Shirali-Shahreza,
M., “Text Steganography in Chat,”
Proceedings of the Third IEEE/IFIP
International Conference in Central Asia
on Internet the Next Generation of
Mobile, Wireless and Optical
Communications Networks, Tashkent,
Uzbekistan, Sep. 2007, pp. 1-5.
19
Text steganography in chat
SMS-Texting
20
Text steganography in chat
Usual abbreviated words
• univ.  university
• PC  Personal Computer
• M.S.  master of science
• UN  United Nations
• Dr  doctor
21
Text steganography in chat
• SMS list + abbreviated words list
 Check list
• 0  full formfull form, 1  abbreviated formabbreviated form
22
Text steganography in chat
Embedding :
“Please call me when you feel upset.”
secret “10”
“Please CM when you feel upset.”
Extracting :
“Please CM when you feel upset.”
secret bits “10”
Check list
23
Emoticon-based steganography in chat
Emoticon-based Text Steganography in Chat
24
Phase1: Classify the emoticons by their meaning
Emoticon-based steganography in chat
25
Example: N = 16
hide log2N = 4 bits per emoticon
sender uses second symbol
receiver can extract 4 bits “0001”
Emoticon-based steganography in chat
26
Phase2: emoticon || sentence : secret = 0
sentence || emoticon : secret = 1
I lost my bag
I lost my bag
secret = 0
secret = 1
Emoticon-based steganography in chat
27
Phase3: emoticon , sentence : secret = 0
emoticon , sentence : secret = 1
,I lost my bag secret = 0
secret = 1I lost my bag
Emoticon-based steganography in chat
28
Zhihui wants to send
secret bits
“11100000111”
to Alan3c.
1110
001||1||1
Phase1Phase2
Alan3c says:
Just a kidding, you are the nicest guy I know in the world.
Zhihui says:
0 0
Phase3
Alan3c says :
You are a bad student!
Zhihui says:
Emoticon-based steganography in chat
29
Future Research Direction
• Chinese text steganography
壞的毛病 壞毛病
山東的蘋果 山東蘋果
我的媽媽 我媽媽
主要的問題 主要問題
另外的一件事 另外一件事
其他的問題 其他問題
北京的大學 北京大學
30

More Related Content

What's hot

Fasttext(Enriching Word Vectors with Subword Information) 논문 리뷰
Fasttext(Enriching Word Vectors with Subword Information) 논문 리뷰Fasttext(Enriching Word Vectors with Subword Information) 논문 리뷰
Fasttext(Enriching Word Vectors with Subword Information) 논문 리뷰ssuserc35c0e
 
Text Mining Using R
Text Mining Using RText Mining Using R
Text Mining Using RKnoldus Inc.
 
Word Embeddings - Introduction
Word Embeddings - IntroductionWord Embeddings - Introduction
Word Embeddings - IntroductionChristian Perone
 
Tricks in natural language processing
Tricks in natural language processingTricks in natural language processing
Tricks in natural language processingBabu Priyavrat
 
Jipdec 20131216-english
Jipdec 20131216-englishJipdec 20131216-english
Jipdec 20131216-englishKazunori Ando
 
A Simple Introduction to Word Embeddings
A Simple Introduction to Word EmbeddingsA Simple Introduction to Word Embeddings
A Simple Introduction to Word EmbeddingsBhaskar Mitra
 
Lda and it's applications
Lda and it's applicationsLda and it's applications
Lda and it's applicationsBabu Priyavrat
 
Dual Embedding Space Model (DESM)
Dual Embedding Space Model (DESM)Dual Embedding Space Model (DESM)
Dual Embedding Space Model (DESM)Bhaskar Mitra
 
Lecture 7- Text Statistics and Document Parsing
Lecture 7- Text Statistics and Document ParsingLecture 7- Text Statistics and Document Parsing
Lecture 7- Text Statistics and Document ParsingSean Golliher
 
K-repeating Substrings: a String-Algorithmic Approach to Privacy-Preserving P...
K-repeating Substrings: a String-Algorithmic Approach to Privacy-Preserving P...K-repeating Substrings: a String-Algorithmic Approach to Privacy-Preserving P...
K-repeating Substrings: a String-Algorithmic Approach to Privacy-Preserving P...Yusuke Matsubara
 

What's hot (13)

Fasttext(Enriching Word Vectors with Subword Information) 논문 리뷰
Fasttext(Enriching Word Vectors with Subword Information) 논문 리뷰Fasttext(Enriching Word Vectors with Subword Information) 논문 리뷰
Fasttext(Enriching Word Vectors with Subword Information) 논문 리뷰
 
Text Mining Using R
Text Mining Using RText Mining Using R
Text Mining Using R
 
Word Embeddings - Introduction
Word Embeddings - IntroductionWord Embeddings - Introduction
Word Embeddings - Introduction
 
Tricks in natural language processing
Tricks in natural language processingTricks in natural language processing
Tricks in natural language processing
 
Jipdec 20131216-english
Jipdec 20131216-englishJipdec 20131216-english
Jipdec 20131216-english
 
Working with text data
Working with text dataWorking with text data
Working with text data
 
Text Mining Analytics 101
Text Mining Analytics 101Text Mining Analytics 101
Text Mining Analytics 101
 
The Duet model
The Duet modelThe Duet model
The Duet model
 
A Simple Introduction to Word Embeddings
A Simple Introduction to Word EmbeddingsA Simple Introduction to Word Embeddings
A Simple Introduction to Word Embeddings
 
Lda and it's applications
Lda and it's applicationsLda and it's applications
Lda and it's applications
 
Dual Embedding Space Model (DESM)
Dual Embedding Space Model (DESM)Dual Embedding Space Model (DESM)
Dual Embedding Space Model (DESM)
 
Lecture 7- Text Statistics and Document Parsing
Lecture 7- Text Statistics and Document ParsingLecture 7- Text Statistics and Document Parsing
Lecture 7- Text Statistics and Document Parsing
 
K-repeating Substrings: a String-Algorithmic Approach to Privacy-Preserving P...
K-repeating Substrings: a String-Algorithmic Approach to Privacy-Preserving P...K-repeating Substrings: a String-Algorithmic Approach to Privacy-Preserving P...
K-repeating Substrings: a String-Algorithmic Approach to Privacy-Preserving P...
 

Viewers also liked

A load balancing model based on cloud partitioning for the public cloud. ppt
A  load balancing model based on cloud partitioning for the public cloud. ppt A  load balancing model based on cloud partitioning for the public cloud. ppt
A load balancing model based on cloud partitioning for the public cloud. ppt Lavanya Vigrahala
 
SOLAR BASED GRASS CUTTER
SOLAR BASED GRASS CUTTERSOLAR BASED GRASS CUTTER
SOLAR BASED GRASS CUTTERsaurav kumar
 
Lawn Mower Minor Project report For MITM Ujjain
Lawn Mower Minor Project report For MITM UjjainLawn Mower Minor Project report For MITM Ujjain
Lawn Mower Minor Project report For MITM UjjainAshwani Dixit
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDNVenkata Naga Ravi
 
K mean-clustering algorithm
K mean-clustering algorithmK mean-clustering algorithm
K mean-clustering algorithmparry prabhu
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
Design and construction of Bevel gear
Design and construction of Bevel gearDesign and construction of Bevel gear
Design and construction of Bevel gearMd Shariful Islam
 

Viewers also liked (16)

PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
A load balancing model based on cloud partitioning for the public cloud. ppt
A  load balancing model based on cloud partitioning for the public cloud. ppt A  load balancing model based on cloud partitioning for the public cloud. ppt
A load balancing model based on cloud partitioning for the public cloud. ppt
 
Steganography
SteganographySteganography
Steganography
 
SOLAR BASED GRASS CUTTER
SOLAR BASED GRASS CUTTERSOLAR BASED GRASS CUTTER
SOLAR BASED GRASS CUTTER
 
Lawn Mower Minor Project report For MITM Ujjain
Lawn Mower Minor Project report For MITM UjjainLawn Mower Minor Project report For MITM Ujjain
Lawn Mower Minor Project report For MITM Ujjain
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
K mean-clustering algorithm
K mean-clustering algorithmK mean-clustering algorithm
K mean-clustering algorithm
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
K means Clustering Algorithm
K means Clustering AlgorithmK means Clustering Algorithm
K means Clustering Algorithm
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Design and construction of Bevel gear
Design and construction of Bevel gearDesign and construction of Bevel gear
Design and construction of Bevel gear
 

Similar to Recent developments in_text_steganography

Anthiil Inside workshop on NLP
Anthiil Inside workshop on NLPAnthiil Inside workshop on NLP
Anthiil Inside workshop on NLPSatyam Saxena
 
Representation Learning of Text for NLP
Representation Learning of Text for NLPRepresentation Learning of Text for NLP
Representation Learning of Text for NLPAnuj Gupta
 
Cupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829aCupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829ajsk1950
 
Natural language processing and transformer models
Natural language processing and transformer modelsNatural language processing and transformer models
Natural language processing and transformer modelsDing Li
 
IE: Named Entity Recognition (NER)
IE: Named Entity Recognition (NER)IE: Named Entity Recognition (NER)
IE: Named Entity Recognition (NER)Marina Santini
 
Neural Text Embeddings for Information Retrieval (WSDM 2017)
Neural Text Embeddings for Information Retrieval (WSDM 2017)Neural Text Embeddings for Information Retrieval (WSDM 2017)
Neural Text Embeddings for Information Retrieval (WSDM 2017)Bhaskar Mitra
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and CryptographyTalha SAVAS
 
From NLP to text mining
From NLP to text mining From NLP to text mining
From NLP to text mining Yi-Shin Chen
 
Explaining Character-Aware Neural Networks for Word-Level Prediction: Do They...
Explaining Character-Aware Neural Networks for Word-Level Prediction: Do They...Explaining Character-Aware Neural Networks for Word-Level Prediction: Do They...
Explaining Character-Aware Neural Networks for Word-Level Prediction: Do They...fgodin
 
Enriching the semantic web tutorial session 1
Enriching the semantic web tutorial session 1Enriching the semantic web tutorial session 1
Enriching the semantic web tutorial session 1Tobias Wunner
 
i safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdf
i safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdfi safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdf
i safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdfarchanaemporium
 
Algorithms 101 for Data Scientists (Part 2)
Algorithms 101 for Data Scientists (Part 2)Algorithms 101 for Data Scientists (Part 2)
Algorithms 101 for Data Scientists (Part 2)Christopher Conlan
 
Talking to your Data: Natural Language Interfaces for a schema-less world (Ke...
Talking to your Data: Natural Language Interfaces for a schema-less world (Ke...Talking to your Data: Natural Language Interfaces for a schema-less world (Ke...
Talking to your Data: Natural Language Interfaces for a schema-less world (Ke...Andre Freitas
 
Deep Learning & NLP: Graphs to the Rescue!
Deep Learning & NLP: Graphs to the Rescue!Deep Learning & NLP: Graphs to the Rescue!
Deep Learning & NLP: Graphs to the Rescue!Roelof Pieters
 
7. Trevor Cohn (usfd) Statistical Machine Translation
7. Trevor Cohn (usfd) Statistical Machine Translation7. Trevor Cohn (usfd) Statistical Machine Translation
7. Trevor Cohn (usfd) Statistical Machine TranslationRIILP
 
50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...
50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...
50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...Data Science Milan
 
SMU BSCIT SUMMER 2014 ASSIGNMENTS
SMU BSCIT SUMMER 2014 ASSIGNMENTSSMU BSCIT SUMMER 2014 ASSIGNMENTS
SMU BSCIT SUMMER 2014 ASSIGNMENTSsolved_assignments
 

Similar to Recent developments in_text_steganography (20)

Anthiil Inside workshop on NLP
Anthiil Inside workshop on NLPAnthiil Inside workshop on NLP
Anthiil Inside workshop on NLP
 
Representation Learning of Text for NLP
Representation Learning of Text for NLPRepresentation Learning of Text for NLP
Representation Learning of Text for NLP
 
Media IT - Entropy
Media IT - EntropyMedia IT - Entropy
Media IT - Entropy
 
Cupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829aCupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829a
 
Natural language processing and transformer models
Natural language processing and transformer modelsNatural language processing and transformer models
Natural language processing and transformer models
 
IE: Named Entity Recognition (NER)
IE: Named Entity Recognition (NER)IE: Named Entity Recognition (NER)
IE: Named Entity Recognition (NER)
 
Neural Text Embeddings for Information Retrieval (WSDM 2017)
Neural Text Embeddings for Information Retrieval (WSDM 2017)Neural Text Embeddings for Information Retrieval (WSDM 2017)
Neural Text Embeddings for Information Retrieval (WSDM 2017)
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 
From NLP to text mining
From NLP to text mining From NLP to text mining
From NLP to text mining
 
Explaining Character-Aware Neural Networks for Word-Level Prediction: Do They...
Explaining Character-Aware Neural Networks for Word-Level Prediction: Do They...Explaining Character-Aware Neural Networks for Word-Level Prediction: Do They...
Explaining Character-Aware Neural Networks for Word-Level Prediction: Do They...
 
Enriching the semantic web tutorial session 1
Enriching the semantic web tutorial session 1Enriching the semantic web tutorial session 1
Enriching the semantic web tutorial session 1
 
i safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdf
i safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdfi safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdf
i safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdf
 
Algorithms 101 for Data Scientists (Part 2)
Algorithms 101 for Data Scientists (Part 2)Algorithms 101 for Data Scientists (Part 2)
Algorithms 101 for Data Scientists (Part 2)
 
Python_intro.ppt
Python_intro.pptPython_intro.ppt
Python_intro.ppt
 
Talking to your Data: Natural Language Interfaces for a schema-less world (Ke...
Talking to your Data: Natural Language Interfaces for a schema-less world (Ke...Talking to your Data: Natural Language Interfaces for a schema-less world (Ke...
Talking to your Data: Natural Language Interfaces for a schema-less world (Ke...
 
Deep Learning & NLP: Graphs to the Rescue!
Deep Learning & NLP: Graphs to the Rescue!Deep Learning & NLP: Graphs to the Rescue!
Deep Learning & NLP: Graphs to the Rescue!
 
7. Trevor Cohn (usfd) Statistical Machine Translation
7. Trevor Cohn (usfd) Statistical Machine Translation7. Trevor Cohn (usfd) Statistical Machine Translation
7. Trevor Cohn (usfd) Statistical Machine Translation
 
50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...
50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...
50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...
 
Lec1
Lec1Lec1
Lec1
 
SMU BSCIT SUMMER 2014 ASSIGNMENTS
SMU BSCIT SUMMER 2014 ASSIGNMENTSSMU BSCIT SUMMER 2014 ASSIGNMENTS
SMU BSCIT SUMMER 2014 ASSIGNMENTS
 

Recently uploaded

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 

Recently uploaded (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 

Recent developments in_text_steganography

  • 1. Recent Developments in Text Steganography Chair Professor Chin-Chen Chang National Tsing Hua University National Chung Cheng University Feng Chia University http://msn.iecs.fcu.edu.tw/~ccc http://msn.iecs.fcu.edu.tw/
  • 2. 2 Information hiding in general text  Synonym substitution  Syntactic transformation  Translation  Semantic transformation Information hiding in hypertext Information hiding in binary text  Inter-word spacing schemes Information hiding in chat text  Text steganography in chat  Emoticon-based steganography in chat
  • 3. 3 Synonym substitution Taichung is a 0 wonderful 1 decent 2 fine 3 great 4 nice little 0 city 1 town Secret message: (3)5(1)2 Taichung is a great little town
  • 4. 4 Syntactic transformations Syntactic: the way that words and phrases are put together to form sentences in a language
  • 5. 5 Semantic transformation • Grafting: adding or repeating information • Pruning: removing repeated information • Substitution: replacing information Semantic :Describe things that deal with the meanings of words and sentences
  • 6. 6 Grafting He is detained in Japan. He, an American citizen, is detained in Japan.
  • 7. 7 Pruning The Pentagon ordered two new spy planes to the region to start flying over Afghanistan. Afghanistan has been under attack since October, and the Pentagon ordered two new spy planes to Afghanistan has been under attack since October
  • 8. 8 Substitution The Pentagon ordered two new spy planes to the region to start flying over Afghanistan. Afghanistan Taliban ruled country The Pentagon ordered two new spy planes to the region to start flying over the Taliban ruled country.
  • 9. 9 Translation 法文 : C’est la vie 英文 : That’s life. That is the life. It is the life. It’s life. Message Alice Bob Stego object Cover object
  • 10. 10 Rule # Rule Code Prob . (1) S -> AB 0 0.5 (2) S -> CB 1 0.5 (3) A -> It is 0 0.5 (4) A -> It’s 1 0.5 (5) C -> That is 0 0.5 (6) C -> That’s 1 0.5 (7) B -> life 0 0.5 (8) B -> the life 10 0.25 (9) B -> a life 11 0.25 Prefix Rule Output 1 (2) CB 0 (5) That is B 10 (8) That is the life Secret: 1010 Translation
  • 11. 11 Inter-word spacing scheme 1 • This scheme exploits inter-word space of text to encode data. Thisisabook. Secret bits: {0 1 0} Thisisabook.
  • 12. 12 Inter-word spacing scheme 2 Weemploythecombinationoftherepeatedwords… cret bits: { 1 0 1 1} ce change: + -      + We employthecombinationof therepeated words… • Keep spaces between groups unchanged.
  • 14. 14 Information hiding in binary text • Embedding Secret bit 0 : A-pattern  D-pattern D-pattern  D-pattern Secret bit 1 : D-pattern  A-pattern A-pattern  A-pattern • Extracting D-pattern  Secret bit 0 A-pattern  Secret bit 1
  • 15. 15 Information hiding in hypertext ExtractionExtractionSecret message Secret message EmbeddingEmbedding Cover hypertext Stego hypertext Secret key
  • 16. 16 <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=big5"> <title> 多媒體暨網路安全實驗室 </title> </head> <body bgcolor="#D27D1O"> <p align="center"><img border="0" src="msn.jpg" width="338" height="345"></p> <p align="center"><font face=" 標楷體 " color="#f4efe8" size="7">~ 歡迎加入 ~</font></p> </body> Tags text file Secret: 010110… <META capital letters small letters 0 1 :the written states 01 </title> 1 2 3 4 5 6 <HTML> </HTML> 0110 <body <p Information hiding in hypertext
  • 17. 17 Secret: 010110… <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=big5"> <title> 多媒體暨網路安全實驗室 </title> </head> <body bgcolor="#D27D1O"> <p align="center"><img border="0" src="msn.jpg" width="338" height="345"></p> <p align="center"><font face=" 標楷體 " color="#f4efe8" size="7">~ 歡迎加入 ~</font></p> </body> </html> text file <META1 2 3 4 5 6 <HTML> </HTML> <body <p capital letters small letters 0 1 :the written states Information hiding in hypertext
  • 18. 18 Text steganography in chat Shirali-Shahreza, M.H., Shirali-Shahreza, M., “Text Steganography in Chat,” Proceedings of the Third IEEE/IFIP International Conference in Central Asia on Internet the Next Generation of Mobile, Wireless and Optical Communications Networks, Tashkent, Uzbekistan, Sep. 2007, pp. 1-5.
  • 19. 19 Text steganography in chat SMS-Texting
  • 20. 20 Text steganography in chat Usual abbreviated words • univ.  university • PC  Personal Computer • M.S.  master of science • UN  United Nations • Dr  doctor
  • 21. 21 Text steganography in chat • SMS list + abbreviated words list  Check list • 0  full formfull form, 1  abbreviated formabbreviated form
  • 22. 22 Text steganography in chat Embedding : “Please call me when you feel upset.” secret “10” “Please CM when you feel upset.” Extracting : “Please CM when you feel upset.” secret bits “10” Check list
  • 23. 23 Emoticon-based steganography in chat Emoticon-based Text Steganography in Chat
  • 24. 24 Phase1: Classify the emoticons by their meaning Emoticon-based steganography in chat
  • 25. 25 Example: N = 16 hide log2N = 4 bits per emoticon sender uses second symbol receiver can extract 4 bits “0001” Emoticon-based steganography in chat
  • 26. 26 Phase2: emoticon || sentence : secret = 0 sentence || emoticon : secret = 1 I lost my bag I lost my bag secret = 0 secret = 1 Emoticon-based steganography in chat
  • 27. 27 Phase3: emoticon , sentence : secret = 0 emoticon , sentence : secret = 1 ,I lost my bag secret = 0 secret = 1I lost my bag Emoticon-based steganography in chat
  • 28. 28 Zhihui wants to send secret bits “11100000111” to Alan3c. 1110 001||1||1 Phase1Phase2 Alan3c says: Just a kidding, you are the nicest guy I know in the world. Zhihui says: 0 0 Phase3 Alan3c says : You are a bad student! Zhihui says: Emoticon-based steganography in chat
  • 29. 29 Future Research Direction • Chinese text steganography 壞的毛病 壞毛病 山東的蘋果 山東蘋果 我的媽媽 我媽媽 主要的問題 主要問題 另外的一件事 另外一件事 其他的問題 其他問題 北京的大學 北京大學
  • 30. 30