tempbib6.bib

@MISC{Bergmair2004,
  author = {Richard Bergmair},
  title = {Towards Linguistic Steganography:
    A Systematic Investigation of Approaches, Systems, and Issues},
  howpublished = {final year thesis},
  month = {April},
  year = {2004},
  note = {handed in in partial fulfillment of the degree requirements
    for the degree {``B.Sc. (Hons.) in Computer Studies''} to the
    University of Derby.},
  url = {http://bergmair.cjb.net/pub/towlingsteg-rep-inoff-a4.ps.gz},
  abstract = {Steganographic systems provide a secure medium to covertly
    transmit information in the presence of an arbitrator. In linguistic
    steganography, in particular, machine-readable data is to be encoded to
    innocuous natural language text, thereby providing security against any
    arbitrator tolerating natural language as a communication medium.

    So far, there has been no systematic literature available on this topic,
    a gap the present report attempts to fill. This report presents necessary
    background information from steganography and from natural language
    processing. A detailed description is given of the systems built so far.
    The ideas and approaches they are based on are systematically presented.
    Objectives for the functionality of natural language stegosystems are
    proposed and design considerations for their construction and evaluation
    are given. Based on these principles current systems are compared and
    evaluated.

    A coding scheme that provides for some degree of security and robustness
    is described and approaches towards generating steganograms that are more
    adequate, from a linguistic point of view, than any of the systems built
    so far, are outlined.}
}
@MISC{Bergmair2004a,
  author = {Richard Bergmair},
  title = {Natural Language Steganography
    and an ``AI-complete'' Security Primitive},
  howpublished = {talk},
  month = {December},
  year = {2004},
  location = {Berlin},
  note = {talk held at the 21st Chaos Communication Congress},
  abstract = { It is out of question, that we will have a long way to go,
    until we can encode our favourite MP3-files to t-shirt slogans, and
    distribute them by wearing them on the streets with the music industry
    unable to prove that something like an information exchange is taking
    place, but hopefully this article shows why research in natural language
    steganography is worth the effort. Some major ideas from steganography
    and computational linguistics are introduced and it is shown how they
    can be drawn together for security purposes. We present our technique
    of content-aware linguistic steganography, which is based on the general
    idea of using ``AI-complete'' problems as security primitives, and
    hope to inspire the hacker-community to come up with new creative
    security technologies.}
}