1. Recent Developments in Text
Steganography
Chair Professor Chin-Chen Chang
National Tsing Hua University
National Chung Cheng University
Feng Chia University
http://msn.iecs.fcu.edu.tw/~ccc
http://msn.iecs.fcu.edu.tw/
2. 2
Information hiding in general text
Synonym substitution
Syntactic transformation
Translation
Semantic transformation
Information hiding in hypertext
Information hiding in binary text
Inter-word spacing schemes
Information hiding in chat text
Text steganography in chat
Emoticon-based steganography in chat
3. 3
Synonym substitution
Taichung is a
0 wonderful
1 decent
2 fine
3 great
4 nice
little
0 city
1 town
Secret message: (3)5(1)2
Taichung is a great little town
5. 5
Semantic transformation
• Grafting: adding or repeating information
• Pruning: removing repeated information
• Substitution: replacing information
Semantic :Describe things that deal with the meanings of words and sentences
7. 7
Pruning
The Pentagon ordered two new spy planes
to the region to start flying over
Afghanistan.
Afghanistan has been under attack since October,
and the Pentagon ordered two new spy planes to
Afghanistan has been under attack since October
8. 8
Substitution
The Pentagon ordered two new spy planes to
the region to start flying over Afghanistan.
Afghanistan Taliban ruled country
The Pentagon ordered two new spy planes to the
region to start flying over the Taliban ruled country.
9. 9
Translation
法文 : C’est la vie
英文 :
That’s life.
That is the life.
It is the life.
It’s life.
Message
Alice Bob
Stego object
Cover object
10. 10
Rule # Rule Code
Prob
.
(1) S -> AB 0 0.5
(2) S -> CB 1 0.5
(3) A -> It is 0 0.5
(4) A -> It’s 1 0.5
(5) C -> That is 0 0.5
(6) C -> That’s 1 0.5
(7) B -> life 0 0.5
(8) B -> the life 10 0.25
(9) B -> a life 11 0.25
Prefix Rule Output
1 (2) CB
0 (5) That is B
10 (8) That is the life
Secret: 1010
Translation
11. 11
Inter-word spacing scheme 1
• This scheme exploits inter-word space of
text to encode data.
Thisisabook.
Secret bits: {0 1 0}
Thisisabook.
12. 12
Inter-word spacing scheme 2
Weemploythecombinationoftherepeatedwords…
cret bits: { 1 0 1 1}
ce change: + - +
We employthecombinationof therepeated words…
• Keep spaces between groups unchanged.
14. 14
Information hiding in binary text
• Embedding
Secret bit 0 : A-pattern D-pattern
D-pattern D-pattern
Secret bit 1 : D-pattern A-pattern
A-pattern A-pattern
• Extracting
D-pattern Secret bit 0
A-pattern Secret bit 1
15. 15
Information hiding in hypertext
ExtractionExtractionSecret message
Secret message
EmbeddingEmbedding
Cover hypertext
Stego hypertext
Secret key
16. 16
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=big5">
<title> 多媒體暨網路安全實驗室 </title>
</head>
<body bgcolor="#D27D1O">
<p align="center"><img border="0" src="msn.jpg" width="338" height="345"></p>
<p align="center"><font face=" 標楷體 " color="#f4efe8" size="7">~ 歡迎加入
~</font></p>
</body>
Tags
text file
Secret: 010110…
<META
capital letters
small letters
0
1
:the written states
01
</title>
1
2
3
4
5
6
<HTML>
</HTML>
0110
<body
<p
Information hiding in hypertext
17. 17
Secret: 010110…
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=big5">
<title> 多媒體暨網路安全實驗室 </title>
</head>
<body bgcolor="#D27D1O">
<p align="center"><img border="0" src="msn.jpg" width="338" height="345"></p>
<p align="center"><font face=" 標楷體 " color="#f4efe8" size="7">~ 歡迎加入
~</font></p>
</body>
</html>
text file
<META1
2
3
4
5
6
<HTML>
</HTML>
<body
<p
capital letters
small letters
0
1
:the written states
Information hiding in hypertext
18. 18
Text steganography in chat
Shirali-Shahreza, M.H., Shirali-Shahreza,
M., “Text Steganography in Chat,”
Proceedings of the Third IEEE/IFIP
International Conference in Central Asia
on Internet the Next Generation of
Mobile, Wireless and Optical
Communications Networks, Tashkent,
Uzbekistan, Sep. 2007, pp. 1-5.
20. 20
Text steganography in chat
Usual abbreviated words
• univ. university
• PC Personal Computer
• M.S. master of science
• UN United Nations
• Dr doctor
21. 21
Text steganography in chat
• SMS list + abbreviated words list
Check list
• 0 full formfull form, 1 abbreviated formabbreviated form
22. 22
Text steganography in chat
Embedding :
“Please call me when you feel upset.”
secret “10”
“Please CM when you feel upset.”
Extracting :
“Please CM when you feel upset.”
secret bits “10”
Check list
25. 25
Example: N = 16
hide log2N = 4 bits per emoticon
sender uses second symbol
receiver can extract 4 bits “0001”
Emoticon-based steganography in chat
26. 26
Phase2: emoticon || sentence : secret = 0
sentence || emoticon : secret = 1
I lost my bag
I lost my bag
secret = 0
secret = 1
Emoticon-based steganography in chat
27. 27
Phase3: emoticon , sentence : secret = 0
emoticon , sentence : secret = 1
,I lost my bag secret = 0
secret = 1I lost my bag
Emoticon-based steganography in chat
28. 28
Zhihui wants to send
secret bits
“11100000111”
to Alan3c.
1110
001||1||1
Phase1Phase2
Alan3c says:
Just a kidding, you are the nicest guy I know in the world.
Zhihui says:
0 0
Phase3
Alan3c says :
You are a bad student!
Zhihui says:
Emoticon-based steganography in chat
29. 29
Future Research Direction
• Chinese text steganography
壞的毛病 壞毛病
山東的蘋果 山東蘋果
我的媽媽 我媽媽
主要的問題 主要問題
另外的一件事 另外一件事
其他的問題 其他問題
北京的大學 北京大學