2011
DOI: 10.1002/sec.208
|View full text |Cite
|
Sign up to set email alerts
|

Matlist: Mature linguistic steganography methodology

Abstract: The generated text by Natural Language Generation (NLG) and template systems is meaningful and looks legitimate. Therefore, the Mature Linguistic Steganography Methodology (Matlist) employs NLG and template techniques along with Random Series values (RS), e.g. binary, decimal, hexadecimal, octal, alphabetic, alphanumeric, etc., of Domain-Specific Subject (DSS) to generate noiseless text-cover. This type of DSS, e.g. financial, medical, mathematical, scientific, economical, etc., has plenty of room to conceal d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(15 citation statements)
references
References 34 publications
0
15
0
Order By: Relevance
“…This approach need the Dictionary and Corpus of synonyms In 2010, Desoky has presented the working of syntactic method with an example -a common, boring, but responsible taskǁ and -a common, boring but responsible task.ǁ The latter phrase omits one comma and may be considered syntactically wrong by certain editors and linguists. The point is that one bit may be hidden in each of the two types of phrases [7] and [12]. This method also has low embedding capacity.…”
Section: Related Workmentioning
confidence: 98%
“…This approach need the Dictionary and Corpus of synonyms In 2010, Desoky has presented the working of syntactic method with an example -a common, boring, but responsible taskǁ and -a common, boring but responsible task.ǁ The latter phrase omits one comma and may be considered syntactically wrong by certain editors and linguists. The point is that one bit may be hidden in each of the two types of phrases [7] and [12]. This method also has low embedding capacity.…”
Section: Related Workmentioning
confidence: 98%
“…The fifth linguistic steganography methodology, Unlike all other approaches, the Normal Linguistic Steganography Methodology (NORMALS) neither generates noise nor uses noisy text to camouflage data. NORMALS employs Natural Language Generation (NLG) techniques to generate noiseless (flawless) and legitimate text-cover by manipulating the inputs' parameters of NLG system in order to camouflage data in the generated text (Desoky, 2010a(Desoky, , 2012. As a result, NORMALS is capable of fooling both human and machine examinations.…”
Section: Linguistic Steganographymentioning
confidence: 99%
“…Notestega pursues the variations among both human notes and the outputs of automatic notetaking techniques to conceal data. The fourth linguistic steganography methodology, Mature Linguistic Steganography Methodology (Matlist) (Desoky, 2011) employs random series of a domain specific subject along with NLG and template techniques to generate a text-cover that is naturally has a different legitimate meaning for concealing different messages while it remains semantically coherent and rhetorically sound. The fifth linguistic steganography methodology, Unlike all other approaches, the Normal Linguistic Steganography Methodology (NORMALS) neither generates noise nor uses noisy text to camouflage data.…”
Section: Linguistic Steganographymentioning
confidence: 99%
“…They can be used simply to modify media content, but in so doing, they limit the capacity for and security of the hidden secrets. Currently, much content is transmitted through the Internet, and a fraction of it is made by computer animators, and includes text and simulated media [25][26][27][28][29][30][31][32]. Cayre and Macq [28] were the first to propose a data-hiding method that was based on 3D polygons.…”
Section: Introduction and Related Workmentioning
confidence: 99%