Preview

The Herald of the Siberian State University of Telecommunications and Information Science

Advanced search

A method of steganalysis of text data based on statistical analysis

Abstract

This article is about a steganalysis method of text data. It proposes a simple and effective approach to detect the presence of embedded information in text files. A message extracted from the text is checked for randomness by means of chi-square test. The method is based on the fact that message randomness reveals the presence of embedding.

About the Author

И. I. Nechta
СибГУТИ
Russian Federation


References

1. Рябко Б. Я., Фионов А. Н. Криптографические методы защиты информации: учебное пособие для вузов. М.: Горячая линия-Телеком, 2005. 229 с.

2. James C. Steganography Past, Present, Future // URL: http://www.sans.org/ reaing_room/whitepapers/steganography/steganogaphy_past_present_future_552.pdf (дата обращения: 12.12.2009).

3. Nicetext // URL: ftp://ftp.eenet.ee/pub/FreeBSD/distfiles/nicetext-0.9. tar.gz (дата обращения: 12.12.2009).

4. Texto // URL: http://www.nic.funet.fi/pub/crypt/steganography/texto. tar.gz (дата обращения: 12.12.2009).

5. Markov-chain // URL: http://www.eblong.com/zarf/markov/chan.c (дата обращения: 12.12.2009).

6. Winstein K. Tyrannosaurus lex 1999. // URL: http://alumni.imsa.edu/ ~keithw/tlex/ (дата обращения: 12.12.2009).

7. Barzilay R., Lee L. Learning to paraphrase: An Universal approach using multiple-sequence aligment // URL: http://www.aclweb.org/anthology/N/N03/N03-1003.pdf (дата обращения: 12.12.2009).

8. Grothoff C., Grothoff K., Alkhutova L., Stutsman R., Atallah M. Translation-based steganography // In Proceedings of Information Hiding Workshop (IH 2005). Springer-Verlag. 2005. P. 15.

9. Chen Z., Huang L., Yu Z., Zhao X., Zheng X. Effective Linguistic Steganography Detection // IEEE 8th International Conference on Computer and Information Technology Workshops. 2008. P. 224−229.

10. Meng P., Huang L., Chen Z, Yang W., Li D. Linguistic Steganography Detection Based on Perplexity // URL: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?tp=&arnum ber=5089098&isnumber=5089035 (дата обращения: 12.12.2009).

11. Нечта И. В. Эффективный метод стегоанализа, базирующийся на сжатии данных // Вестник СибГУТИ, 2010. № 1. С. 50−55.

12. Ryabko B. Compression-based methods for nonparametric density estimation, on-line prediction, regression and classification for time series // 2008 IEEE Information Theory Workshop. Porto, Portugal. 2008.

13. Taskiran C., Topkara U., Topkara M., Delp E. Attacks on Lexical Natural Language Steganography Systems // Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents VI. San Jose. 2006.

14. Meng P. Analysis and Detection of Translation-Based Steganography // LNCS. Springer-Verlag. V. 6387/2010. P. 208−220.

15. Gutenberg Project // URL: http://www.gutenberg.org/wiki/Main_Page (дата обращения: 13.06.2011).


Review

For citations:


I. Nechta  A method of steganalysis of text data based on statistical analysis. The Herald of the Siberian State University of Telecommunications and Information Science. 2011;(3):27-34. (In Russ.)

Views: 162


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6920 (Print)