Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Best papers of the Security Track at the 2006 ACM Symposium on Applied Computing
Guest editors: Giampaolo BellaGuest Editor and Peter Y.A. RyanGuest Editor
Article type: Research Article
Authors: Grothoff, Christiana | Grothoff, Kristab | Stutsman, Ryanc | Alkhutova, Ludmilac | Atallah, Mikhaild
Affiliations: [a] Department of Computer Science, University of Denver, Denver, CO 80208, USA. E-mail: christian@grothoff.org | [b] CERIAS, Purdue University, West Lafayette, IN 47907, USA. E-mail: krista@grothoff.org | [c] Department of Computer Science, Purdue University, West Lafayette, IN 47907, USA. E-mail: rstutsma@purdue.edu, lalkhuto@purdue.edu | [d] Department of Computer Science, Purdue University, West Lafayette, IN 47907, USA. E-mail: mja@cs.purdue.edu
Abstract: This paper investigates systems that steganographically embed information in the “noise” created by automatic translation of natural language documents. The main thrust of the work focuses on two problems – generation of plausible steganographic texts and avoiding transmission of the original source for stego objects. Because the inherent redundancy of natural language creates plenty of room for variation in translation, machine translation is ideal for steganographic applications. We describe the design and implementation of a scheme for hiding information in translated natural language text and present experimental results using the implemented system. While the initial work in this vein required the presence of both the source and the translation, the system detailed in this paper requires only the translated text for recovering the hidden message, increasing security and improving resource usage. These improvements occur not only because the source text is no longer available to the adversary, but also because a broader repertoire of defenses (such as mixing human and machine translation) can now be used.
DOI: 10.3233/JCS-2009-0320
Journal: Journal of Computer Security, vol. 17, no. 3, pp. 269-303, 2009
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl