Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens

We introduce content-aware steganography as a new paradigm. As opposed to classic steganographic algorithms that only embed information in the syntactic representation of a datagram, content-aware steganography embeds secrets in the semantic interpretation which a human assigns to a datagram. In this paper, we outline two constructions for content-aware stegosystems, which employ, as a new kind of security primitive, problems that are easy for humans to solve, but difficult to automate. Such problems have been successfully used in the past to construct Human Interactive Proofs (HIPs), protocols capable of automatically distinguishing whether a communication partner is a human or a machine.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[3]  H. Cleveland The Knowledge Executive: Leadership in an Information Society , 1985 .

[4]  M. Zeleny Management support systems: Towards integrated knowledge management , 1987 .

[5]  Robert W. Lucky,et al.  Silicon Dreams: Information, Man, and Machine , 1989 .

[6]  Peter Wayner,et al.  Mimic Functions , 1992, Cryptologia.

[7]  Peter Wayner Strong Theoretical Stegnography , 1995, Cryptologia.

[8]  P. Watzlawick,et al.  Menschliche Kommunikation : Formen, Störungen, Parodoxien , 1996 .

[9]  Mark Chapman,et al.  Hiding the Hidden: A software system for concealing ciphertext as innocuous text , 1997, ICICS.

[10]  Scott Craver,et al.  On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.

[11]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[12]  Thomas Mittelholzer,et al.  An Information-Theoretic Approach to Steganography and Watermarking , 1999, Information Hiding.

[13]  Mikhail J. Atallah,et al.  Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation , 2001, Information Hiding.

[14]  Manuel Blum,et al.  Secure Human Identification Protocols , 2001, ASIACRYPT.

[15]  Marc Rennhard,et al.  A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography , 2001, ISC.

[16]  Radu Sion,et al.  Natural Language Watermarking and Tamperproofing , 2002, Information Hiding.

[17]  Mark Chapman,et al.  Plausible Deniability Using Automated Linguistic Stegonagraphy , 2002, InfraSec.

[18]  Michael R. Middleton,et al.  Information as a Resource , 2002 .

[19]  Hideki Noda,et al.  A Framework for a Simple Sentence Paraphrase Using Concept Hieararchy in SD-Form Semantics Model , 2003, EJC.

[20]  Georg Struth,et al.  Relational and Kleene-Algebraic Methods in Computer Science , 2003, Lecture Notes in Computer Science.

[21]  Eli Biham,et al.  Advances in Cryptology — EUROCRYPT 2003 , 2003, Lecture Notes in Computer Science.

[22]  John Langford,et al.  CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.

[23]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[24]  Jessica J. Fridrich,et al.  Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.

[25]  Wen-Tai Hsieh,et al.  Natural Language Watermarking Using Semantic Substitution for Chinese Text , 2003, IWDW.

[26]  Nicholas Hopper,et al.  Public-Key Steganography , 2003, EUROCRYPT.

[27]  Hiram Calvo,et al.  Using Selectional Preferences for Extending a Synonymous Paraphrasing Method in Steganography , 2004 .

[28]  Richard Bergmair,et al.  Towards Linguistic Steganography: A Systematic Investigation of Approaches, Systems, and Issues , 2004 .

[29]  E. J. Koops,et al.  Crypto Law Survey , 2004 .

[30]  Christian Cachin,et al.  An information-theoretic model for steganography , 2004, Inf. Comput..

[31]  Igor A. Bolshakov,et al.  A Method of Linguistic Steganography Based on Collocationally-Verified Synonymy , 2004, Information Hiding.

[32]  J. Doug Tygar,et al.  Image Recognition CAPTCHAs , 2004, ISC.

[33]  Krista Bennett,et al.  LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .

[34]  Stefan Katzenbeisser,et al.  Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security) , 2004, ISC.

[35]  Nasir D. Memon,et al.  Blind source camera identification , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[36]  Edward J. Delp,et al.  Natural language watermarking , 2005, IS&T/SPIE Electronic Imaging.

[37]  Michael Backes,et al.  Public-Key Steganography with Active Attacks , 2005, TCC.

[38]  Mikhail J. Atallah,et al.  Translation-based steganography , 2005, J. Comput. Secur..

[39]  Alexander N. Gorban,et al.  Dimension of Attractors Estimation , 2005 .