In order to sketch, why steganography is such an important topic, and has received far too little attention from the hacker community in the past, let me quickly challenge our view of cryptosystems as commonly built in the context of military or commercial applications: Cryptosystems are designed to protect our sensitive data from evil arbitrators. Wrong. Well, maybe not. But then again, what is evil? Basically one could say, hacker ethics is about protecting a good individual from a bad society and this has some severe consequences in the construction of secure communication systems. In particular, I would like to draw our attention to the evil spy, we are envisioning, when we think about cryptosystems, who intercepts sensitive military communication, and to the criminal who fakes banking transactions. Most often, what we have in mind, when we build cryptosystems is a bad individual in a good society, which is rather some instance of witch hunt ethics. In practice this assumption has the simple incarnation, that cryptograms are vulnerable to detection, since a good society would encourage the use of cryptography as a means to protect everyone’s privacy. But under the assumption of a bad society, would Alice and Bob be allowed to use cryptography? What would witchhunt ethics assert about people who use cryptography? Do they have something to hide? Something evil? The central shift in views that is necessary, is the fact that it is not Alice and Bob who control their communication channel, so they can make sure, that evil Wendy won’t be able to recover their communication, but evil Wendy controls the channel and wants to make sure Alice and Bob can’t exchange unwanted messages. This communication setup has rst been stated by Gustavus J. Simmons, which he popularly introduced via the prisoner’s dilemma. In this scenario we assume Alice and Bob are arrested, and \their only means of communication after they are locked up will be by way of messages conveyed for them by trustees { who are known to be agents of the warden... However since he has every reason to suspect that the prisoners want to coordinate an escape plan, the warden will only permit the exchanges to occur if the information contained in the messages is completely open to him { and presumably innocuous." (Simmons 1984).
[1]
김인택.
[서평]「Information Hiding Techniques for Steganography and Digital Watermarking」
,
2000
.
[2]
Adam Kilgarriff,et al.
The Senseval-3 English lexical sample task
,
2004,
SENSEVAL@ACL.
[3]
Christian Cachin,et al.
An information-theoretic model for steganography
,
1998,
Inf. Comput..
[4]
Stefan Katzenbeisser,et al.
Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security)
,
2004,
ISC.
[5]
David A. Huffman,et al.
A method for the construction of minimum-redundancy codes
,
1952,
Proceedings of the IRE.
[6]
Gustavus J. Simmons,et al.
The Prisoners' Problem and the Subliminal Channel
,
1983,
CRYPTO.
[7]
John Langford,et al.
CAPTCHA: Using Hard AI Problems for Security
,
2003,
EUROCRYPT.
[8]
Peter Wayner,et al.
Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition)
,
2002
.
[9]
Radu Sion,et al.
Natural Language Watermarking and Tamperproofing
,
2002,
Information Hiding.
[10]
Stephan Katzenbeisser,et al.
Information Hiding Techniques for Steganography and Digital Watermaking
,
1999
.
[11]
Peter Wayner,et al.
Mimic Functions
,
1992,
Cryptologia.
[12]
Mark Chapman,et al.
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
,
1997,
ICICS.
[13]
Peter Wayner.
Strong Theoretical Stegnography
,
1995,
Cryptologia.
[14]
George A. Miller,et al.
Introduction to WordNet: An On-line Lexical Database
,
1990
.
[15]
James H. Martin,et al.
Speech and language processing: an introduction to natural language processing, computational linguistics, and speech recognition, 2nd Edition
,
2000,
Prentice Hall series in artificial intelligence.
[16]
Richard Bergmair,et al.
Towards Linguistic Steganography: A Systematic Investigation of Approaches, Systems, and Issues
,
2004
.