SlideShare a Scribd company logo
1 of 30
Recent Developments in Text
Steganography
Chair Professor Chin-Chen Chang
National Tsing Hua University
National Chung Cheng University
Feng Chia University
http://msn.iecs.fcu.edu.tw/~ccc
http://msn.iecs.fcu.edu.tw/
2
Information hiding in general text

Synonym substitution

Syntactic transformation

Translation

Semantic transformation
Information hiding in hypertext
Information hiding in binary text

Inter-word spacing schemes
Information hiding in chat text

Text steganography in chat

Emoticon-based steganography in chat
3
Synonym substitution
Taichung is a
0 wonderful
1 decent
2 fine
3 great
4 nice
little
0 city
1 town
Secret message: (3)5(1)2
Taichung is a great little town
4
Syntactic transformations
Syntactic: the way that words and phrases are put together to form sentences in a language
5
Semantic transformation
• Grafting: adding or repeating information
• Pruning: removing repeated information
• Substitution: replacing information
Semantic :Describe things that deal with the meanings of words and sentences
6
Grafting
He is detained in Japan.
He, an American citizen, is detained in Japan.
7
Pruning
The Pentagon ordered two new spy planes
to the region to start flying over
Afghanistan.
Afghanistan has been under attack since October,
and the Pentagon ordered two new spy planes to
Afghanistan has been under attack since October
8
Substitution
The Pentagon ordered two new spy planes to
the region to start flying over Afghanistan.
Afghanistan Taliban ruled country
The Pentagon ordered two new spy planes to the
region to start flying over the Taliban ruled country.
9
Translation
法文 : C’est la vie
英文 :
That’s life.
That is the life.
It is the life.
It’s life.
Message
Alice Bob
Stego object
Cover object
10
Rule # Rule Code
Prob
.
(1) S -> AB 0 0.5
(2) S -> CB 1 0.5
(3) A -> It is 0 0.5
(4) A -> It’s 1 0.5
(5) C -> That is 0 0.5
(6) C -> That’s 1 0.5
(7) B -> life 0 0.5
(8) B -> the life 10 0.25
(9) B -> a life 11 0.25
Prefix Rule Output
1 (2) CB
0 (5) That is B
10 (8) That is the life
Secret: 1010
Translation
11
Inter-word spacing scheme 1
• This scheme exploits inter-word space of
text to encode data.
Thisisabook.
Secret bits: {0 1 0}
Thisisabook.
12
Inter-word spacing scheme 2
Weemploythecombinationoftherepeatedwords…
cret bits: { 1 0 1 1}
ce change: + -      +
We employthecombinationof therepeated words…
• Keep spaces between groups unchanged.
13
Add-pattern Delete-pattern
Information hiding in binary text
Binary image
14
Information hiding in binary text
• Embedding
Secret bit 0 : A-pattern  D-pattern
D-pattern  D-pattern
Secret bit 1 : D-pattern  A-pattern
A-pattern  A-pattern
• Extracting
D-pattern  Secret bit 0
A-pattern  Secret bit 1
15
Information hiding in hypertext
ExtractionExtractionSecret message
Secret message
EmbeddingEmbedding
Cover hypertext
Stego hypertext
Secret key
16
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=big5">
<title> 多媒體暨網路安全實驗室 </title>
</head>
<body bgcolor="#D27D1O">
<p align="center"><img border="0" src="msn.jpg" width="338" height="345"></p>
<p align="center"><font face=" 標楷體 " color="#f4efe8" size="7">~ 歡迎加入
~</font></p>
</body>
Tags
text file
Secret: 010110…
<META
capital letters
small letters
0
1
:the written states
01
</title>
1
2
3
4
5
6
<HTML>
</HTML>
0110
<body
<p
Information hiding in hypertext
17
Secret: 010110…
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=big5">
<title> 多媒體暨網路安全實驗室 </title>
</head>
<body bgcolor="#D27D1O">
<p align="center"><img border="0" src="msn.jpg" width="338" height="345"></p>
<p align="center"><font face=" 標楷體 " color="#f4efe8" size="7">~ 歡迎加入
~</font></p>
</body>
</html>
text file
<META1
2
3
4
5
6
<HTML>
</HTML>
<body
<p
capital letters
small letters
0
1
:the written states
Information hiding in hypertext
18
Text steganography in chat
Shirali-Shahreza, M.H., Shirali-Shahreza,
M., “Text Steganography in Chat,”
Proceedings of the Third IEEE/IFIP
International Conference in Central Asia
on Internet the Next Generation of
Mobile, Wireless and Optical
Communications Networks, Tashkent,
Uzbekistan, Sep. 2007, pp. 1-5.
19
Text steganography in chat
SMS-Texting
20
Text steganography in chat
Usual abbreviated words
• univ.  university
• PC  Personal Computer
• M.S.  master of science
• UN  United Nations
• Dr  doctor
21
Text steganography in chat
• SMS list + abbreviated words list
 Check list
• 0  full formfull form, 1  abbreviated formabbreviated form
22
Text steganography in chat
Embedding :
“Please call me when you feel upset.”
secret “10”
“Please CM when you feel upset.”
Extracting :
“Please CM when you feel upset.”
secret bits “10”
Check list
23
Emoticon-based steganography in chat
Emoticon-based Text Steganography in Chat
24
Phase1: Classify the emoticons by their meaning
Emoticon-based steganography in chat
25
Example: N = 16
hide log2N = 4 bits per emoticon
sender uses second symbol
receiver can extract 4 bits “0001”
Emoticon-based steganography in chat
26
Phase2: emoticon || sentence : secret = 0
sentence || emoticon : secret = 1
I lost my bag
I lost my bag
secret = 0
secret = 1
Emoticon-based steganography in chat
27
Phase3: emoticon , sentence : secret = 0
emoticon , sentence : secret = 1
,I lost my bag secret = 0
secret = 1I lost my bag
Emoticon-based steganography in chat
28
Zhihui wants to send
secret bits
“11100000111”
to Alan3c.
1110
001||1||1
Phase1Phase2
Alan3c says:
Just a kidding, you are the nicest guy I know in the world.
Zhihui says:
0 0
Phase3
Alan3c says :
You are a bad student!
Zhihui says:
Emoticon-based steganography in chat
29
Future Research Direction
• Chinese text steganography
壞的毛病 壞毛病
山東的蘋果 山東蘋果
我的媽媽 我媽媽
主要的問題 主要問題
另外的一件事 另外一件事
其他的問題 其他問題
北京的大學 北京大學
30

More Related Content

What's hot

Fasttext(Enriching Word Vectors with Subword Information) 논문 리뷰
Fasttext(Enriching Word Vectors with Subword Information) 논문 리뷰Fasttext(Enriching Word Vectors with Subword Information) 논문 리뷰
Fasttext(Enriching Word Vectors with Subword Information) 논문 리뷰ssuserc35c0e
 
Text Mining Using R
Text Mining Using RText Mining Using R
Text Mining Using RKnoldus Inc.
 
Word Embeddings - Introduction
Word Embeddings - IntroductionWord Embeddings - Introduction
Word Embeddings - IntroductionChristian Perone
 
Tricks in natural language processing
Tricks in natural language processingTricks in natural language processing
Tricks in natural language processingBabu Priyavrat
 
Jipdec 20131216-english
Jipdec 20131216-englishJipdec 20131216-english
Jipdec 20131216-englishKazunori Ando
 
A Simple Introduction to Word Embeddings
A Simple Introduction to Word EmbeddingsA Simple Introduction to Word Embeddings
A Simple Introduction to Word EmbeddingsBhaskar Mitra
 
Lda and it's applications
Lda and it's applicationsLda and it's applications
Lda and it's applicationsBabu Priyavrat
 
Dual Embedding Space Model (DESM)
Dual Embedding Space Model (DESM)Dual Embedding Space Model (DESM)
Dual Embedding Space Model (DESM)Bhaskar Mitra
 
Lecture 7- Text Statistics and Document Parsing
Lecture 7- Text Statistics and Document ParsingLecture 7- Text Statistics and Document Parsing
Lecture 7- Text Statistics and Document ParsingSean Golliher
 
K-repeating Substrings: a String-Algorithmic Approach to Privacy-Preserving P...
K-repeating Substrings: a String-Algorithmic Approach to Privacy-Preserving P...K-repeating Substrings: a String-Algorithmic Approach to Privacy-Preserving P...
K-repeating Substrings: a String-Algorithmic Approach to Privacy-Preserving P...Yusuke Matsubara
 

What's hot (13)

Fasttext(Enriching Word Vectors with Subword Information) 논문 리뷰
Fasttext(Enriching Word Vectors with Subword Information) 논문 리뷰Fasttext(Enriching Word Vectors with Subword Information) 논문 리뷰
Fasttext(Enriching Word Vectors with Subword Information) 논문 리뷰
 
Text Mining Using R
Text Mining Using RText Mining Using R
Text Mining Using R
 
Word Embeddings - Introduction
Word Embeddings - IntroductionWord Embeddings - Introduction
Word Embeddings - Introduction
 
Tricks in natural language processing
Tricks in natural language processingTricks in natural language processing
Tricks in natural language processing
 
Jipdec 20131216-english
Jipdec 20131216-englishJipdec 20131216-english
Jipdec 20131216-english
 
Working with text data
Working with text dataWorking with text data
Working with text data
 
Text Mining Analytics 101
Text Mining Analytics 101Text Mining Analytics 101
Text Mining Analytics 101
 
The Duet model
The Duet modelThe Duet model
The Duet model
 
A Simple Introduction to Word Embeddings
A Simple Introduction to Word EmbeddingsA Simple Introduction to Word Embeddings
A Simple Introduction to Word Embeddings
 
Lda and it's applications
Lda and it's applicationsLda and it's applications
Lda and it's applications
 
Dual Embedding Space Model (DESM)
Dual Embedding Space Model (DESM)Dual Embedding Space Model (DESM)
Dual Embedding Space Model (DESM)
 
Lecture 7- Text Statistics and Document Parsing
Lecture 7- Text Statistics and Document ParsingLecture 7- Text Statistics and Document Parsing
Lecture 7- Text Statistics and Document Parsing
 
K-repeating Substrings: a String-Algorithmic Approach to Privacy-Preserving P...
K-repeating Substrings: a String-Algorithmic Approach to Privacy-Preserving P...K-repeating Substrings: a String-Algorithmic Approach to Privacy-Preserving P...
K-repeating Substrings: a String-Algorithmic Approach to Privacy-Preserving P...
 

Viewers also liked

A load balancing model based on cloud partitioning for the public cloud. ppt
A  load balancing model based on cloud partitioning for the public cloud. ppt A  load balancing model based on cloud partitioning for the public cloud. ppt
A load balancing model based on cloud partitioning for the public cloud. ppt Lavanya Vigrahala
 
SOLAR BASED GRASS CUTTER
SOLAR BASED GRASS CUTTERSOLAR BASED GRASS CUTTER
SOLAR BASED GRASS CUTTERsaurav kumar
 
Lawn Mower Minor Project report For MITM Ujjain
Lawn Mower Minor Project report For MITM UjjainLawn Mower Minor Project report For MITM Ujjain
Lawn Mower Minor Project report For MITM UjjainAshwani Dixit
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDNVenkata Naga Ravi
 
K mean-clustering algorithm
K mean-clustering algorithmK mean-clustering algorithm
K mean-clustering algorithmparry prabhu
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
Design and construction of Bevel gear
Design and construction of Bevel gearDesign and construction of Bevel gear
Design and construction of Bevel gearMd Shariful Islam
 

Viewers also liked (16)

PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
A load balancing model based on cloud partitioning for the public cloud. ppt
A  load balancing model based on cloud partitioning for the public cloud. ppt A  load balancing model based on cloud partitioning for the public cloud. ppt
A load balancing model based on cloud partitioning for the public cloud. ppt
 
Steganography
SteganographySteganography
Steganography
 
SOLAR BASED GRASS CUTTER
SOLAR BASED GRASS CUTTERSOLAR BASED GRASS CUTTER
SOLAR BASED GRASS CUTTER
 
Lawn Mower Minor Project report For MITM Ujjain
Lawn Mower Minor Project report For MITM UjjainLawn Mower Minor Project report For MITM Ujjain
Lawn Mower Minor Project report For MITM Ujjain
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
K mean-clustering algorithm
K mean-clustering algorithmK mean-clustering algorithm
K mean-clustering algorithm
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
K means Clustering Algorithm
K means Clustering AlgorithmK means Clustering Algorithm
K means Clustering Algorithm
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Design and construction of Bevel gear
Design and construction of Bevel gearDesign and construction of Bevel gear
Design and construction of Bevel gear
 

Similar to Recent developments in_text_steganography

Anthiil Inside workshop on NLP
Anthiil Inside workshop on NLPAnthiil Inside workshop on NLP
Anthiil Inside workshop on NLPSatyam Saxena
 
Representation Learning of Text for NLP
Representation Learning of Text for NLPRepresentation Learning of Text for NLP
Representation Learning of Text for NLPAnuj Gupta
 
Cupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829aCupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829ajsk1950
 
Natural language processing and transformer models
Natural language processing and transformer modelsNatural language processing and transformer models
Natural language processing and transformer modelsDing Li
 
IE: Named Entity Recognition (NER)
IE: Named Entity Recognition (NER)IE: Named Entity Recognition (NER)
IE: Named Entity Recognition (NER)Marina Santini
 
Neural Text Embeddings for Information Retrieval (WSDM 2017)
Neural Text Embeddings for Information Retrieval (WSDM 2017)Neural Text Embeddings for Information Retrieval (WSDM 2017)
Neural Text Embeddings for Information Retrieval (WSDM 2017)Bhaskar Mitra
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and CryptographyTalha SAVAS
 
From NLP to text mining
From NLP to text mining From NLP to text mining
From NLP to text mining Yi-Shin Chen
 
Explaining Character-Aware Neural Networks for Word-Level Prediction: Do They...
Explaining Character-Aware Neural Networks for Word-Level Prediction: Do They...Explaining Character-Aware Neural Networks for Word-Level Prediction: Do They...
Explaining Character-Aware Neural Networks for Word-Level Prediction: Do They...fgodin
 
Enriching the semantic web tutorial session 1
Enriching the semantic web tutorial session 1Enriching the semantic web tutorial session 1
Enriching the semantic web tutorial session 1Tobias Wunner
 
i safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdf
i safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdfi safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdf
i safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdfarchanaemporium
 
Algorithms 101 for Data Scientists (Part 2)
Algorithms 101 for Data Scientists (Part 2)Algorithms 101 for Data Scientists (Part 2)
Algorithms 101 for Data Scientists (Part 2)Christopher Conlan
 
Talking to your Data: Natural Language Interfaces for a schema-less world (Ke...
Talking to your Data: Natural Language Interfaces for a schema-less world (Ke...Talking to your Data: Natural Language Interfaces for a schema-less world (Ke...
Talking to your Data: Natural Language Interfaces for a schema-less world (Ke...Andre Freitas
 
Deep Learning & NLP: Graphs to the Rescue!
Deep Learning & NLP: Graphs to the Rescue!Deep Learning & NLP: Graphs to the Rescue!
Deep Learning & NLP: Graphs to the Rescue!Roelof Pieters
 
7. Trevor Cohn (usfd) Statistical Machine Translation
7. Trevor Cohn (usfd) Statistical Machine Translation7. Trevor Cohn (usfd) Statistical Machine Translation
7. Trevor Cohn (usfd) Statistical Machine TranslationRIILP
 
50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...
50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...
50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...Data Science Milan
 
SMU BSCIT SUMMER 2014 ASSIGNMENTS
SMU BSCIT SUMMER 2014 ASSIGNMENTSSMU BSCIT SUMMER 2014 ASSIGNMENTS
SMU BSCIT SUMMER 2014 ASSIGNMENTSsolved_assignments
 

Similar to Recent developments in_text_steganography (20)

Anthiil Inside workshop on NLP
Anthiil Inside workshop on NLPAnthiil Inside workshop on NLP
Anthiil Inside workshop on NLP
 
Representation Learning of Text for NLP
Representation Learning of Text for NLPRepresentation Learning of Text for NLP
Representation Learning of Text for NLP
 
Media IT - Entropy
Media IT - EntropyMedia IT - Entropy
Media IT - Entropy
 
Cupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829aCupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829a
 
Natural language processing and transformer models
Natural language processing and transformer modelsNatural language processing and transformer models
Natural language processing and transformer models
 
IE: Named Entity Recognition (NER)
IE: Named Entity Recognition (NER)IE: Named Entity Recognition (NER)
IE: Named Entity Recognition (NER)
 
Neural Text Embeddings for Information Retrieval (WSDM 2017)
Neural Text Embeddings for Information Retrieval (WSDM 2017)Neural Text Embeddings for Information Retrieval (WSDM 2017)
Neural Text Embeddings for Information Retrieval (WSDM 2017)
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 
From NLP to text mining
From NLP to text mining From NLP to text mining
From NLP to text mining
 
Explaining Character-Aware Neural Networks for Word-Level Prediction: Do They...
Explaining Character-Aware Neural Networks for Word-Level Prediction: Do They...Explaining Character-Aware Neural Networks for Word-Level Prediction: Do They...
Explaining Character-Aware Neural Networks for Word-Level Prediction: Do They...
 
Enriching the semantic web tutorial session 1
Enriching the semantic web tutorial session 1Enriching the semantic web tutorial session 1
Enriching the semantic web tutorial session 1
 
i safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdf
i safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdfi safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdf
i safari File Edit View History Bookmarks Window Help 67 D. Thu 101.pdf
 
Algorithms 101 for Data Scientists (Part 2)
Algorithms 101 for Data Scientists (Part 2)Algorithms 101 for Data Scientists (Part 2)
Algorithms 101 for Data Scientists (Part 2)
 
Python_intro.ppt
Python_intro.pptPython_intro.ppt
Python_intro.ppt
 
Talking to your Data: Natural Language Interfaces for a schema-less world (Ke...
Talking to your Data: Natural Language Interfaces for a schema-less world (Ke...Talking to your Data: Natural Language Interfaces for a schema-less world (Ke...
Talking to your Data: Natural Language Interfaces for a schema-less world (Ke...
 
Deep Learning & NLP: Graphs to the Rescue!
Deep Learning & NLP: Graphs to the Rescue!Deep Learning & NLP: Graphs to the Rescue!
Deep Learning & NLP: Graphs to the Rescue!
 
7. Trevor Cohn (usfd) Statistical Machine Translation
7. Trevor Cohn (usfd) Statistical Machine Translation7. Trevor Cohn (usfd) Statistical Machine Translation
7. Trevor Cohn (usfd) Statistical Machine Translation
 
50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...
50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...
50 Shades of Text - Leveraging Natural Language Processing (NLP), Alessandro ...
 
Lec1
Lec1Lec1
Lec1
 
SMU BSCIT SUMMER 2014 ASSIGNMENTS
SMU BSCIT SUMMER 2014 ASSIGNMENTSSMU BSCIT SUMMER 2014 ASSIGNMENTS
SMU BSCIT SUMMER 2014 ASSIGNMENTS
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 

Recently uploaded (20)

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Recent developments in_text_steganography

  • 1. Recent Developments in Text Steganography Chair Professor Chin-Chen Chang National Tsing Hua University National Chung Cheng University Feng Chia University http://msn.iecs.fcu.edu.tw/~ccc http://msn.iecs.fcu.edu.tw/
  • 2. 2 Information hiding in general text  Synonym substitution  Syntactic transformation  Translation  Semantic transformation Information hiding in hypertext Information hiding in binary text  Inter-word spacing schemes Information hiding in chat text  Text steganography in chat  Emoticon-based steganography in chat
  • 3. 3 Synonym substitution Taichung is a 0 wonderful 1 decent 2 fine 3 great 4 nice little 0 city 1 town Secret message: (3)5(1)2 Taichung is a great little town
  • 4. 4 Syntactic transformations Syntactic: the way that words and phrases are put together to form sentences in a language
  • 5. 5 Semantic transformation • Grafting: adding or repeating information • Pruning: removing repeated information • Substitution: replacing information Semantic :Describe things that deal with the meanings of words and sentences
  • 6. 6 Grafting He is detained in Japan. He, an American citizen, is detained in Japan.
  • 7. 7 Pruning The Pentagon ordered two new spy planes to the region to start flying over Afghanistan. Afghanistan has been under attack since October, and the Pentagon ordered two new spy planes to Afghanistan has been under attack since October
  • 8. 8 Substitution The Pentagon ordered two new spy planes to the region to start flying over Afghanistan. Afghanistan Taliban ruled country The Pentagon ordered two new spy planes to the region to start flying over the Taliban ruled country.
  • 9. 9 Translation 法文 : C’est la vie 英文 : That’s life. That is the life. It is the life. It’s life. Message Alice Bob Stego object Cover object
  • 10. 10 Rule # Rule Code Prob . (1) S -> AB 0 0.5 (2) S -> CB 1 0.5 (3) A -> It is 0 0.5 (4) A -> It’s 1 0.5 (5) C -> That is 0 0.5 (6) C -> That’s 1 0.5 (7) B -> life 0 0.5 (8) B -> the life 10 0.25 (9) B -> a life 11 0.25 Prefix Rule Output 1 (2) CB 0 (5) That is B 10 (8) That is the life Secret: 1010 Translation
  • 11. 11 Inter-word spacing scheme 1 • This scheme exploits inter-word space of text to encode data. Thisisabook. Secret bits: {0 1 0} Thisisabook.
  • 12. 12 Inter-word spacing scheme 2 Weemploythecombinationoftherepeatedwords… cret bits: { 1 0 1 1} ce change: + -      + We employthecombinationof therepeated words… • Keep spaces between groups unchanged.
  • 14. 14 Information hiding in binary text • Embedding Secret bit 0 : A-pattern  D-pattern D-pattern  D-pattern Secret bit 1 : D-pattern  A-pattern A-pattern  A-pattern • Extracting D-pattern  Secret bit 0 A-pattern  Secret bit 1
  • 15. 15 Information hiding in hypertext ExtractionExtractionSecret message Secret message EmbeddingEmbedding Cover hypertext Stego hypertext Secret key
  • 16. 16 <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=big5"> <title> 多媒體暨網路安全實驗室 </title> </head> <body bgcolor="#D27D1O"> <p align="center"><img border="0" src="msn.jpg" width="338" height="345"></p> <p align="center"><font face=" 標楷體 " color="#f4efe8" size="7">~ 歡迎加入 ~</font></p> </body> Tags text file Secret: 010110… <META capital letters small letters 0 1 :the written states 01 </title> 1 2 3 4 5 6 <HTML> </HTML> 0110 <body <p Information hiding in hypertext
  • 17. 17 Secret: 010110… <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=big5"> <title> 多媒體暨網路安全實驗室 </title> </head> <body bgcolor="#D27D1O"> <p align="center"><img border="0" src="msn.jpg" width="338" height="345"></p> <p align="center"><font face=" 標楷體 " color="#f4efe8" size="7">~ 歡迎加入 ~</font></p> </body> </html> text file <META1 2 3 4 5 6 <HTML> </HTML> <body <p capital letters small letters 0 1 :the written states Information hiding in hypertext
  • 18. 18 Text steganography in chat Shirali-Shahreza, M.H., Shirali-Shahreza, M., “Text Steganography in Chat,” Proceedings of the Third IEEE/IFIP International Conference in Central Asia on Internet the Next Generation of Mobile, Wireless and Optical Communications Networks, Tashkent, Uzbekistan, Sep. 2007, pp. 1-5.
  • 19. 19 Text steganography in chat SMS-Texting
  • 20. 20 Text steganography in chat Usual abbreviated words • univ.  university • PC  Personal Computer • M.S.  master of science • UN  United Nations • Dr  doctor
  • 21. 21 Text steganography in chat • SMS list + abbreviated words list  Check list • 0  full formfull form, 1  abbreviated formabbreviated form
  • 22. 22 Text steganography in chat Embedding : “Please call me when you feel upset.” secret “10” “Please CM when you feel upset.” Extracting : “Please CM when you feel upset.” secret bits “10” Check list
  • 23. 23 Emoticon-based steganography in chat Emoticon-based Text Steganography in Chat
  • 24. 24 Phase1: Classify the emoticons by their meaning Emoticon-based steganography in chat
  • 25. 25 Example: N = 16 hide log2N = 4 bits per emoticon sender uses second symbol receiver can extract 4 bits “0001” Emoticon-based steganography in chat
  • 26. 26 Phase2: emoticon || sentence : secret = 0 sentence || emoticon : secret = 1 I lost my bag I lost my bag secret = 0 secret = 1 Emoticon-based steganography in chat
  • 27. 27 Phase3: emoticon , sentence : secret = 0 emoticon , sentence : secret = 1 ,I lost my bag secret = 0 secret = 1I lost my bag Emoticon-based steganography in chat
  • 28. 28 Zhihui wants to send secret bits “11100000111” to Alan3c. 1110 001||1||1 Phase1Phase2 Alan3c says: Just a kidding, you are the nicest guy I know in the world. Zhihui says: 0 0 Phase3 Alan3c says : You are a bad student! Zhihui says: Emoticon-based steganography in chat
  • 29. 29 Future Research Direction • Chinese text steganography 壞的毛病 壞毛病 山東的蘋果 山東蘋果 我的媽媽 我媽媽 主要的問題 主要問題 另外的一件事 另外一件事 其他的問題 其他問題 北京的大學 北京大學
  • 30. 30