Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Natural Language Steganography

URL
http://events.ccc.de/congress/2004/fahrplan/files/237-aicomplete-proc.pdf
File name
237-aicomplete-proc.pdf
File size
145.1 KB
MD5
e58755f4d488ec737c87995d6a369c9d
SHA1
94e86deaf8e80bc31e74494bd43dd06a4239ba97

The lecture gives some insight to the construction of natural language stegosystems. Such systems recode sensitive plaintext to innocuous natural language text, thereby providing security against arbitrators. The problem of central control and monitoring of communication is not new to history. What is new to history, is that we now rely heavily upon electronic means of communication. The fact that these infrastructures do not, by design, rule out the possibility of automated large-scale censorship, is dangerous in itself. However, the fact that we can now watch the necessary legislative and technical infrastructures being deployed should be highly alarming. Clearly the topic of steganography is more important today, than ever before. Steganographic systems provide a secure medium to covertly transmit information in the presence of an arbitrator. In natural language steganography, in particular, machine-readable data is to be encoded to innocuous natural language text, thereby providing security against any arbitrator tolerating natural language as a communication medium. We give detailed insights to the construction of a stegosystem that can embed a secret bitstring into an innocuous piece of natural language text. Furthermore we demonstrate, from a linguistic point of view, some interesting features of natural language, that allow the construction of linguistic stegosystems that are secure under the assumption that the arbitrator is a computer and not a human. From these specific features of natural language, we will turn to the more general notion of the ``AI-complete security primitive, which is a problem we assume to be hard, in a cryptographic context, much like the NP-complete problems used for current numeric cryptography techniques. Finally, it should be noted that the research presented herein is in a very early conceptual stage. However the topics outlined point out an exciting new direction of research in steganography and related fields and might give some inspiration for new creative uses of computer technology.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !