Preview

The Herald of the Siberian State University of Telecommunications and Information Science

Advanced search

Applying Statistical Methods for Secret Message Detection in Text Data

Abstract

In this paper we propose a method of improving the previous steganalysis. The essence of the original method was that extracted from the text secret message was tested randomness by using a chi-square test. The randomness of the extracted message meant that secret message was embedded. In this paper we propose a modified chi-square test so that the quartile used in the test was chosen empirically. This modification reduces the probability of steganalysis mistakes.

About the Author

I. V. Nechta
СибГУТИ
Russian Federation


References

1. Нечта И. В. Метод стегоанализа текстовых данных, основанный на использовании статистического анализа // Вестник СибГУТИ. 2011. №3. С. 27-34.

2. Winstein K. Tyrannosaurus Lex 1999. // URL: http://alumni.imsa.edu/ ~keithw/tlex/ (дата обращения: 12.12.2009).

3. Taskiran C., Topkara U., Topkara M., Delp E. Attacks on Lexical Natural Language Steganography Systems // Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents VI. San Jose. 2006.

4. Yu Z., Huang L., Chan Z., Li L., Zhao X., Zhu Y. Steganalysis of Synonym-Substitution Based Natural Language Watermarking // International Journal of Multimedia and Ubiquitous Engineering. Vol. 4, No. 2, April, 2009.

5. Chen Z., Huang L., Yang W. Detection of substitution-based linguistic steganography by relative frequency analysis // Digital investigation 2011. Vol. 8(1), Elsevier. pp. 68-77.

6. Chang C., Lin C. Libsvm A library for support vector machines // URL: http://www.csie.ntu.edu.tw/~cjlin/libsvm/ (дата обращения: 12.12.2009).

7. Gutenberg Project // URL: http://www.gutenberg.org/wiki/Main_Page (дата обращения: 13.06.2011).


Review

For citations:


Nechta I.V. Applying Statistical Methods for Secret Message Detection in Text Data. The Herald of the Siberian State University of Telecommunications and Information Science. 2012;(1):23-29. (In Russ.)

Views: 155


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6920 (Print)