tempbib10.bib

@MISC{Winstein1999,
  author = {Keith Winstein},
  title = {Lexical Steganography Through Adaptive Modulation
    of the Word Choice Hash},
  month = {January},
  year = {1999},
  url = {http://alumni.imsa.edu/~keithw/tlex/lsteg.ps},
  note = {Was disseminated during secondary education at the Illinois
    Mathematics and Science Academy. The paper won the third prize in the
    2000 Intel Science Talent Search.},
  abstract = {Steganography provides for the embedding of information in a
    block of host data in conditions where perceptible modification of the
    host data is intolerable. Steganographic techniques are highly dependent
    on the character of the host data; a technique for embedding information
    in images might make subtle changes in hue, while a method for embedding
    information in audio data could exploit the limitations of the human ear
    by encoding the encapsulated information in inaudible frequency ranges.
    Current implementations of textual steganography exploit tolerances in
    typesetting by making minute changes in line placement and kerning in
    order to encapsulate hidden information, making them vulnerable to simple
    retypesetting attacks. This paper defines a framework for lexical
    steganography and discusses the details of an implementation.}
}
@ARTICLE{Nakagawa2001,
  author = {Hiroshi Nakagawa and Kouji Sampei and Tsutomu Matsumoto and Shuji
    Kawaguchi and Kyoto Makino and Ichiro Murase},
  institution = {Information Technology Center, University of Tokyo, Japan},
  title = {Text information hiding with preserved meaning
    -- A case for Japanese documents},
  journal = {IPSJ Transaction},
  volume = {42},
  number = {9},
  pages = {2339 - 2350},
  year = {2001},
  abstract = {Digital fingerprinting is being paid growing attention as a
    technology resolving copyright problems. Previously, researchers have
    only been interested in image based digital fingerprinting where secret
    information is hidden in images, as opposed to our the method we will
    put forward herein, which uses text. It is based on a paraphrasing method
    that is supposed to preserve meaning of the original contents. We
    experimentally evaluated the proposed method with Japanese manuals and
    user agreement forms of software, and found the paraphrased text is
    preserving the meaning of the original contents and closely mimics natural
    language.},
  note = {originally published in Japanese. A similar paper was disseminated
    by the first author in English and is kept available for download from
    http://www.r.dl.itc.u-tokyo.ac.jp/~nakagawa/academic-res/finpri02.pdf}
}
@MISC{Tenenbaum2002,
  author = {Adam J. Tenenbaum},
  title = {Linguistic Steganography:
    Passing Covert Data Using Text-Based Mimicry},
  howpublished = {final year thesis},
  month = {April},
  year = {2002},
  note = {submitted in partial fulfillment of the requirements
    for the degree of {``Bachelor of Applied Science''} to the
    University of Toronto.},
  url = {http://www.comm.utoronto.ca/~adam/downloads/AJTBAScThesis.pdf},
  abstract = {The goal of linguistic steganography systems is to transmit a
    secret message over an open communication channel while concealing the
    presence of the secret message altogether. The secret message is hidden
    by encoding its bits within a ``cover'' message that mimics natural
    language. Existing text mimicry algorithms are flawed in that there
    exists a tradeoff between the quality of the output text and the resources
    required to manually design an appropriate grammar for the content of the
    cover message.

    In Peter Wayner's basic mimicry algorithm, the system learns from
    frequency analysis of a ``training source'' in order to attempt to mimic
    the source. This thesis improves upon Wayner's algorithm by changing the
    ``atom'' in frequency analysis from a single character to a single word.
    The resulting linguistic steganography algorithm generates a cover text
    that more closely resembles the style of the training source but also
    mimics the grammar of the source text in a dynamic, automated fashion.}
}
@ARTICLE{Niimi2003,
  author = {Michiharu Niimi and Sayaka Minewaki and Hideki Noda
    and Eiji Kawaguchi},
  institution = {Kyushu Institute of Technology, Kitakyushu, Japan},
  title = {A Framework of Text-based Steganography
    Using SD-Form Semantics Model},
  journal = {IPSJ Journal},
  volume = {44},
  number = {8},
  month = {August},
  year = {2003},
  url = {http://www.know.comp.kyutech.ac.jp/
    STEG03/STEG03-PAPERS/papers/12-Niimi.pdf},
  abstract = {This paper describes a framework of text-base steganography in
    consideration of the meaning of natural language sentences. To deal with
    the meaning of sentences, this method uses SD-Form Semantics Model that
    has been developed by the authors. In the model, sentences are described
    by the form named SD-Form. An SD-Form is assigned an amount of semantic
    information. The amount of the meaning of sentences is used to carry
    secret information on text data. In embedding secret information,
    sentences are transformed to SD-Forms and then the amount of semantic
    information of SD-Forms is decreased or increased to coincide with the
    value of the secret information. We show methods to decrease or increase
    the amount of the meaning of SD-Forms.}
}
@INPROCEEDINGS{Chiang2003,
  author = {Yuei-Lin Chiang and Lu-Ping Chang and Wen-Tai Hsieh
    and Wen-Chih Chen},
  institution = {Advanced e-Commerce Technology Laboratory,
    Institute for Information Industry, Taipei, Taiwan},
  title = {Natural Language Watermarking Using Semantic Substitution
    for Chinese Text},
  booktitle = {Digital Watermarking:
    Second International Workshop, IWDW 2003},
  editor = {Ton Kalker and Ingemar J. Cox and Yong Man Ro},
  location = {Seoul, Korea},
  month = {October},
  year = {2003},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {2939},
  pages = {129--140},
  isbn = {3-540-21061-X},
  doi = {10.1007/b95658},
  abstract = {Numerous schemes have been designed for watermarking multimedia
    contents. Many of these schemes are vulnerable to watermark erasing
    attacks. Naturally, such methods are ineffective on text unless the text
    is represented as a bitmap image, but in that case, the watermark can be
    erased easily by using Optical Character Recognition (OCR) to change the
    representation of the text from a bitmap to ASCII or EBCDIC. This study
    attempts to develop a method for embedding watermark in the text that is
    as successful as the frequency-domain methods have been for image and
    audio. The novel method embeds the watermark in original text, creating
    ciphertext, which preserves the meaning of the original text via various
    semantic replacements.}
}
@INPROCEEDINGS{Sun2004,
  author = {Xingming Sun and Gang Luo and Huajun Huang},
  title = {Component-based digital watermarking of Chinese texts},
  booktitle = {InfoSecu '04:
    Proceedings of the 3rd international conference on Information security},
  year = {2004},
  isbn = {1-58113-955-1},
  pages = {76--81},
  location = {Shanghai, China},
  doi = {http://doi.acm.org/10.1145/1046290.1046306},
  publisher = {ACM Press},
  abstract = {According to the types of the host media, digital watermarking
    may be classified mainly as image watermarking, video watermarking, audio
    watermarking, and text watermarking. The principle of the three
    watermarking research fields are similar in that they make use of the
    redundant information of their host media and the characteristics of human
    video system or human audio system. Unfortunately, text has no redundant
    information. Text watermarking techniques are totally different from them.
    And text watermarking algorithm is very difficult to satisfy the
    requirements of transparence and robustness. In this paper, a novel text
    watermarking algorithm based on the thought of the mathematical expression
    will be presented. Since watermarking signals are embedded into some
    Chinese characters that can be divided into left and right components,
    this algorithm is totally based on the content. Therefore, it breaks
    through the difficulties of text watermarking. Experiments also show that
    the component-based text watermarking technique is relatively robust and
    transparent. It will play an important role in protecting the security of
    Chinese documents over Internet.}
}
@INPROCEEDINGS{Uzuner2006,
  author = {Ozlem Uzuner},
  title = {Natural language processing with linguistic information for digital
    fingerprinting and watermarking},
  booktitle = {Proceedings of the SPIE International Conference on Security,
    Steganography, and Watermarking of Multimedia Contents},
  year = {2006},
  month = {January},
  location = {San Jose, CA}
}
@INPROCEEDINGS{Chand2006,
  author = {V. Chand and C. O. Orgun},
  title = {Exploiting Linguistic Features in Lexical Steganography:
    Design and Proof-of-Concept Implementation},
  booktitle = {Proceedings of the 39th Annual Hawaii International Conference
    on System Sciences (HICSS '06)},
  year = {2006},
  month = {January},
  isbn = {0-7695-2507-5},
  issn = {1530-1605},
  doi = {10.1109/HICSS.2006.175},
  volume = {6},
  pages = {126b},
  location = {Hawaii},
  publisher = {IEEE},
  abstract = {This paper develops a linguistically robust encryption, LUNABEL,
    which converts a message into semantically innocuous text. Drawing upon
    linguistic criteria, LUNABEL uses word replacement, with substitution
    classes based on traditional word replacement features (syntactic
    categories and sub-categories), as well as features under-exploited in
    earlier works: semantic criteria, graphotactic structure, inflectional
    class and frequency statistics. The original message is further hidden
    through the use of cover texts — within these, LUNABEL retains all function
    words and targets specific classes of content words for replacement,
    creating text which preserves the syntactic structure and semantic context
    of the original cover text. LUNABEL takes advantage of cover text styles
    which are not expected to be necessarily comprehensible to the general
    public, making any semantic anomalies more opaque. This line of work has
    the promise of creating encrypted texts which are less detectable than
    earlier steganographic efforts.}
}
@INPROCEEDINGS{Hassan2006,
  author = {M. Hassan Shirali-Shahreza and Mohammad Shirali-Shahreza},
  title = {A New Approach to Persian/Arabic Text Steganography},
  booktitle = {Proceedings of the 5th IEEE/ACIS International Conference on
    Computer and Information Science},
  year = {2006},
  isbn = {0-7695-2613-6},
  pages = {310--315},
  doi = {http://dx.doi.org/10.1109/ICIS-COMSAR.2006.10},
  publisher = {IEEE Computer Society},
  address = {Washington, DC, USA},
  abstract = {Conveying information secretly and establishing hidden
    relationship has been of interest since long past. Text documents have
    been widely used since very long time ago. Therefore, we have witnessed
    different method of hiding information in texts (text steganography) since
    past to the present. In this paper we introduce a new approach for
    steganography in Persian and Arabic texts. Considering the existence of
    too many points in Persian and Arabic phrases, in this approach, by
    vertical displacement of the points, we hide information in the texts.
    This approach can be categorized under feature coding methods. This method
    can be used for Persian/Arabic Watermarking. Our method has been
    implemented by JAVA programming language.}
}
@INPROCEEDINGS{Macq2007,
  author = {B. Macq and O. Vybornova},
  title = {A method of text watermarking using presuppositions},
  booktitle = {Proceedings of the SPIE International Conference on Security,
    Steganography, and Watermarking of Multimedia Contents},
  year = {2007},
  month = {January},
  location = {San Jose, CA}
}