Methods and risks of textual steganography

George Weir, Patrick Neal

Research output: Contribution to conferenceAbstract

Abstract

Steganography describes a variety of techniques in which a ‘secret’ message is hidden ‘within’ some form of carrier. Software to achieve steganographic communication by concealing messages within image, video or audio file formats, is readily available. Numerous studies have addressed methods of steganographic concealment and the associated issue of detecting concealed steganographic data within such carrier formats.

Our paper details the nature of textual steganography, reviews available techniques in relation to English and Arabic usage and considers the potential security threats that technologies in this area may pose. The implications are considered within current intelligence and analytical frameworks used in justice and public safety.

Unlike multimedia steganography that takes advantage of file format characteristics, true textual steganography does not rely upon the manipulation of data format in order to codify a concealed message. Rather, it is a codification that directly maps secret message to carrier message. In successful textual steganography, the resultant carrier is rendered as plain text that is syntactically and semantically coherent, thereby allaying suspicion and effectively hiding the presence of the hidden message.

Grammar, theme and internal coherence are major factors in carrier generation, as are the requirements for unlimited mapping (i.e., no required secret content should be impossible to code), full recovery capability (i.e., the decoding process must succeed for every possible carrier message) and efficient mapping (i.e., the ratio of secret data quantity to carrier data quantity should tend toward parity).

As a mechanism for covert communication, textual steganography raises a number of security concerns beyond other forms of steganography. The plain text medium may be least likely of all formats to attract attention as a prospective carrier. The resultant carrier data can be communicated through any linguistic medium, need not be relayed as a text file over computer-based communication media, but could be read aloud over radio or television. Likewise, the same message could be delivered in print form by newspaper, magazine or leaflet.

Conference

ConferenceInternational Conference on Cybercrime and Computer Forensics 2016
Abbreviated titleICCCF 2016
CountryCanada
CityVancouver
Period12/06/1614/06/16

Fingerprint

Steganography
Communication
Television
Linguistics
Decoding
Recovery

Keywords

  • steganography
  • covert communication
  • intelligence
  • analytical frameworks

Cite this

Weir, G., & Neal, P. (2016). Methods and risks of textual steganography. Abstract from International Conference on Cybercrime and Computer Forensics 2016, Vancouver, Canada.
Weir, George ; Neal, Patrick. / Methods and risks of textual steganography. Abstract from International Conference on Cybercrime and Computer Forensics 2016, Vancouver, Canada.
@conference{46c1d82391e04d0cb573d399e8d229c5,
title = "Methods and risks of textual steganography",
abstract = "Steganography describes a variety of techniques in which a ‘secret’ message is hidden ‘within’ some form of carrier. Software to achieve steganographic communication by concealing messages within image, video or audio file formats, is readily available. Numerous studies have addressed methods of steganographic concealment and the associated issue of detecting concealed steganographic data within such carrier formats. Our paper details the nature of textual steganography, reviews available techniques in relation to English and Arabic usage and considers the potential security threats that technologies in this area may pose. The implications are considered within current intelligence and analytical frameworks used in justice and public safety. Unlike multimedia steganography that takes advantage of file format characteristics, true textual steganography does not rely upon the manipulation of data format in order to codify a concealed message. Rather, it is a codification that directly maps secret message to carrier message. In successful textual steganography, the resultant carrier is rendered as plain text that is syntactically and semantically coherent, thereby allaying suspicion and effectively hiding the presence of the hidden message. Grammar, theme and internal coherence are major factors in carrier generation, as are the requirements for unlimited mapping (i.e., no required secret content should be impossible to code), full recovery capability (i.e., the decoding process must succeed for every possible carrier message) and efficient mapping (i.e., the ratio of secret data quantity to carrier data quantity should tend toward parity). As a mechanism for covert communication, textual steganography raises a number of security concerns beyond other forms of steganography. The plain text medium may be least likely of all formats to attract attention as a prospective carrier. The resultant carrier data can be communicated through any linguistic medium, need not be relayed as a text file over computer-based communication media, but could be read aloud over radio or television. Likewise, the same message could be delivered in print form by newspaper, magazine or leaflet.",
keywords = "steganography, covert communication, intelligence, analytical frameworks",
author = "George Weir and Patrick Neal",
year = "2016",
month = "6",
day = "13",
language = "English",
note = "International Conference on Cybercrime and Computer Forensics 2016, ICCCF 2016 ; Conference date: 12-06-2016 Through 14-06-2016",

}

Weir, G & Neal, P 2016, 'Methods and risks of textual steganography' International Conference on Cybercrime and Computer Forensics 2016, Vancouver, Canada, 12/06/16 - 14/06/16, .

Methods and risks of textual steganography. / Weir, George; Neal, Patrick.

2016. Abstract from International Conference on Cybercrime and Computer Forensics 2016, Vancouver, Canada.

Research output: Contribution to conferenceAbstract

TY - CONF

T1 - Methods and risks of textual steganography

AU - Weir, George

AU - Neal, Patrick

PY - 2016/6/13

Y1 - 2016/6/13

N2 - Steganography describes a variety of techniques in which a ‘secret’ message is hidden ‘within’ some form of carrier. Software to achieve steganographic communication by concealing messages within image, video or audio file formats, is readily available. Numerous studies have addressed methods of steganographic concealment and the associated issue of detecting concealed steganographic data within such carrier formats. Our paper details the nature of textual steganography, reviews available techniques in relation to English and Arabic usage and considers the potential security threats that technologies in this area may pose. The implications are considered within current intelligence and analytical frameworks used in justice and public safety. Unlike multimedia steganography that takes advantage of file format characteristics, true textual steganography does not rely upon the manipulation of data format in order to codify a concealed message. Rather, it is a codification that directly maps secret message to carrier message. In successful textual steganography, the resultant carrier is rendered as plain text that is syntactically and semantically coherent, thereby allaying suspicion and effectively hiding the presence of the hidden message. Grammar, theme and internal coherence are major factors in carrier generation, as are the requirements for unlimited mapping (i.e., no required secret content should be impossible to code), full recovery capability (i.e., the decoding process must succeed for every possible carrier message) and efficient mapping (i.e., the ratio of secret data quantity to carrier data quantity should tend toward parity). As a mechanism for covert communication, textual steganography raises a number of security concerns beyond other forms of steganography. The plain text medium may be least likely of all formats to attract attention as a prospective carrier. The resultant carrier data can be communicated through any linguistic medium, need not be relayed as a text file over computer-based communication media, but could be read aloud over radio or television. Likewise, the same message could be delivered in print form by newspaper, magazine or leaflet.

AB - Steganography describes a variety of techniques in which a ‘secret’ message is hidden ‘within’ some form of carrier. Software to achieve steganographic communication by concealing messages within image, video or audio file formats, is readily available. Numerous studies have addressed methods of steganographic concealment and the associated issue of detecting concealed steganographic data within such carrier formats. Our paper details the nature of textual steganography, reviews available techniques in relation to English and Arabic usage and considers the potential security threats that technologies in this area may pose. The implications are considered within current intelligence and analytical frameworks used in justice and public safety. Unlike multimedia steganography that takes advantage of file format characteristics, true textual steganography does not rely upon the manipulation of data format in order to codify a concealed message. Rather, it is a codification that directly maps secret message to carrier message. In successful textual steganography, the resultant carrier is rendered as plain text that is syntactically and semantically coherent, thereby allaying suspicion and effectively hiding the presence of the hidden message. Grammar, theme and internal coherence are major factors in carrier generation, as are the requirements for unlimited mapping (i.e., no required secret content should be impossible to code), full recovery capability (i.e., the decoding process must succeed for every possible carrier message) and efficient mapping (i.e., the ratio of secret data quantity to carrier data quantity should tend toward parity). As a mechanism for covert communication, textual steganography raises a number of security concerns beyond other forms of steganography. The plain text medium may be least likely of all formats to attract attention as a prospective carrier. The resultant carrier data can be communicated through any linguistic medium, need not be relayed as a text file over computer-based communication media, but could be read aloud over radio or television. Likewise, the same message could be delivered in print form by newspaper, magazine or leaflet.

KW - steganography

KW - covert communication

KW - intelligence

KW - analytical frameworks

UR - http://www.apatas.org/icccf/icccf-2016/

M3 - Abstract

ER -

Weir G, Neal P. Methods and risks of textual steganography. 2016. Abstract from International Conference on Cybercrime and Computer Forensics 2016, Vancouver, Canada.