Preview

The Herald of the Siberian State University of Telecommunications and Information Science

Advanced search

Effective steganography detection based on data compression

Abstract

Detection methods of data hiding in text files are considered.

About the Author

I. .. Nechta

Russian Federation


References

1. James C. Steganography: Past, Present, Future. 31.10.2003. P. 11 - 14 URL: http://www.sans.org/reading_room/whitepapers/stenganography/ steganography_past_present_future_552 (дата обращения: 12.12.2009).

2. Winstein K. Tyrannosaurus lex. 1999. URL: http://alumni.imsa.edu/~keithw/tlex/ (дата обращения: 12.12.2009).

3. Regina B., Lillian L. Learning to paraphrase: An Universal approach using multiple-sequence aligment. URL: http://www.aclweb.org/ anthology/N/N03/N03-1003.pdf (дата обращения: 12.12.2009).

4. Chapman M., Davida G. Hiding the hidden: A software system for concealing ciphertext in innocuous text // Proceedings of the International Conference on Information and Communica-tions Security, Beijing, China, 1997, vol. LNCS 1334.

5. Nicetext URL: ftp://ftp.eenet.ee/pub/FreeBSD/distfiles/nicetext-0.9.tar.gz (дата обращения: 12.12.2009).

6. Texto URL: http://www.nic.funet.fi/pub/crypt/ steganography/texto.tar.gz (дата обращения: 12.12.2009).

7. Markov-chain-based URL: http://www.eblong.com/zarf/markov/chan.c (дата обращения: 12.12.2009).

8. Taskiran C., Topkara U., Topkara M., Delp E. Attacks on lexical natural language steganogra-phy systems // Security, Steganography, and Watermarking of Multimedia Contents VIII. Pro-ceedings of the SPIE. 2006. V.6072, P. 97 - 105.

9. Chen Z., Huang L., Yu Z., Zhao X., Zheng X. Effective linguistic steganography detection // IEEE 8th International Conference on Computer and Information Technology Workshops, 2008. P. 224 - 229.

10. Chen Z., Huang L., Yu Z., Li L., Yang W. A statistical algorithm for linguistic steganography detec-tion based on distribution of words //Availability, Reliability and Security, 2008. P. 558 - 563.

11. Meng P., Huang L., Chen Z, Yang W., Li D. Linguistic steganography detection based on per-plexity. 2008. [Электронный ресурс] URL: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?tp=&arnumber= 5089098&isnumber=5089035 (дата обращения: 12.12.2009).

12. Ryabko B. Compression-based methods for nonparametric densty estimation, on-line prediction, regression and classification for time series // 2008 IEEE Information Theory Workshop. Porto, Portugal, May 5 - 9, 2008.


Review

For citations:


Nechta I... Effective steganography detection based on data compression. The Herald of the Siberian State University of Telecommunications and Information Science. 2010;(1):50-55. (In Russ.)

Views: 227


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6920 (Print)