Effective steganography detection based on data compression
Abstract
References
1. James C. Steganography: Past, Present, Future. 31.10.2003. P. 11 - 14 URL: http://www.sans.org/reading_room/whitepapers/stenganography/ steganography_past_present_future_552 (дата обращения: 12.12.2009).
2. Winstein K. Tyrannosaurus lex. 1999. URL: http://alumni.imsa.edu/~keithw/tlex/ (дата обращения: 12.12.2009).
3. Regina B., Lillian L. Learning to paraphrase: An Universal approach using multiple-sequence aligment. URL: http://www.aclweb.org/ anthology/N/N03/N03-1003.pdf (дата обращения: 12.12.2009).
4. Chapman M., Davida G. Hiding the hidden: A software system for concealing ciphertext in innocuous text // Proceedings of the International Conference on Information and Communica-tions Security, Beijing, China, 1997, vol. LNCS 1334.
5. Nicetext URL: ftp://ftp.eenet.ee/pub/FreeBSD/distfiles/nicetext-0.9.tar.gz (дата обращения: 12.12.2009).
6. Texto URL: http://www.nic.funet.fi/pub/crypt/ steganography/texto.tar.gz (дата обращения: 12.12.2009).
7. Markov-chain-based URL: http://www.eblong.com/zarf/markov/chan.c (дата обращения: 12.12.2009).
8. Taskiran C., Topkara U., Topkara M., Delp E. Attacks on lexical natural language steganogra-phy systems // Security, Steganography, and Watermarking of Multimedia Contents VIII. Pro-ceedings of the SPIE. 2006. V.6072, P. 97 - 105.
9. Chen Z., Huang L., Yu Z., Zhao X., Zheng X. Effective linguistic steganography detection // IEEE 8th International Conference on Computer and Information Technology Workshops, 2008. P. 224 - 229.
10. Chen Z., Huang L., Yu Z., Li L., Yang W. A statistical algorithm for linguistic steganography detec-tion based on distribution of words //Availability, Reliability and Security, 2008. P. 558 - 563.
11. Meng P., Huang L., Chen Z, Yang W., Li D. Linguistic steganography detection based on per-plexity. 2008. [Электронный ресурс] URL: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?tp=&arnumber= 5089098&isnumber=5089035 (дата обращения: 12.12.2009).
12. Ryabko B. Compression-based methods for nonparametric densty estimation, on-line prediction, regression and classification for time series // 2008 IEEE Information Theory Workshop. Porto, Portugal, May 5 - 9, 2008.
Review
For citations:
Nechta I... Effective steganography detection based on data compression. The Herald of the Siberian State University of Telecommunications and Information Science. 2010;(1):50-55. (In Russ.)