DonNTU Masters portal
Магитср ДоНТУ Сипаков Дмитрий Сергеевич

Sipakov Dmitry

Faculty of Computer Science and Technology

Department of Computer Systems Monitoring

Speciality: “Computer ecological and economic monitoring”

Research and development of methods of linguistic steganography for exchange text information in socio-technical systems.

Supervisor: Ph. D., N. Gubenko

Summary Abstract

Abstract

Contents

  1. Introduction
  2. 1 The goals and objectives of the study, expected results
  3. 2 Review of methods of linguistic steganography
    1. 2.1 Semagrams
    2. 2.2 Phonetics
    3. 2.3 Jargon
    4. 2.3 Covert coding
  4. Findings
  5. List of sources

Introduction

The development of information technology and IT industry as a whole led to the emergence of a number of issues related to the provision and processing of information. One of the most important in the today is the problem of information security. Computers are used in banking systems at airports, medicine, research, media, so that information affects almost all areas of activity of any company, from its credibility and depend on the veracity of the work, production safety, and even the safety of people. Within every organization information that treated its employees can not go beyond. Moreover, any information that has been received and processed by members of the company, it is its property and can not be used or modified by other third parties. To protect information during transmission between employees or departments used steganography algorithms. Steganography – the science of secure communication information by the secrecy of the fact of the transfer [2]. Who is gaining popularity the linguistic steganography – hiding a message, changing the parameters of the elements which consists of a carrier or by creating a new medium so that it contains transmitted message. In other words, the aim of linguistic steganography is to hide of the transfer of the information and its encryption [1]. In DonNTU hidden information using linguistic resources engaged K. Larionova, the theme of her master work: “Methods of encoding arbitrary information in computer texts based on linguistic resources” [7]. As this issue was engaged I. Sokolenko, the theme master work: “The system of hiding information based on linguistic resources” [8].

1 The goals and objectives of the study, expected results

To implement the master's work had the following goals and objectives:

Thus, as a result of the work planned to get his own method and linguistic steganography software that will implement it.

2 Review of methods of linguistic steganography

2.1 Semagrams

Semagrams – concealment of information by means of signs or symbols. For example, hand sign, head, a certain sequence of numbers or words, all Semagrams. Such signs are not evident, and are not visible to the casual person. Sometimes the use of visual semagrams – the only way to communicate with friends and colleagues. However, it is necessary to determine in advance the necessary signs for use in communication.

Figure 2.1 – Scheme Semagrams


Text Semagrams – this is a message hidden inside the text. Capital letters, underscores, especially handwriting spaces between letters and words – all of them can be used for transmission any message. Association can also be used for this purpose, If you need to pass a very small amount of information. Say you had agreed with her friends that will share on email seemingly harmless weather forecasts [3].

The only drawback is easy to implement, because of which can be obtained quite easily hidden information.

2.2 Phonetics

This method can be used, if you know exactly what language is programmed filter that “catches” the words in the language which is predominantly used inhabitants of the country. Sometimes (in addition) and in the language that is rampant or used on websites (english, french). Of course, it is not safe say how exactly programmed filter. But in order to come closer to understanding, it can be used phonetically similar words. This method is most suitable if you are using an alphabet other than in your own language (eg, russian, instead of english) [3]. Example: country коунтри.

The only advantage of this method – ease of implementation.

2.3 Jargon

In any language, there is a concept jargon. Jargon – sociolect; it is different from the language of general specific vocabulary and phraseology, expressive turns and the use of special means of word – formation, but has its own phonetic and grammatical system. Slang words or phrases called “jargon” [4]. Using jargon in the text can puzzle an outsider reader. Moreover slang words can be invented members of correspondence. For the implementation of this method creates a database words and relevant jargon, with hidden words are replaced. The recipient must you need to know the jargon used that to understand the message. Better choose words that will keep text – “carrier” in a clear, readable form, even if you perceive slang “as is” [3].

Figure 2.2 – Scheme of the method jargon

2.4 Covert coding

A special case of linguistic steganography, most difficult to implementation, but provides high data secrecy. The method uses a special feature that encrypts and decrypts the message for transmission [6]. The simplest way is “the first letter”. The idea is that each letter hides the message it is the first letter of the word a new message – encryption, which is transmitted to the recipient. An example of this method is the link [3].

Another type of hidden code is to use a special the formula for the allocation of the hidden message of “message – container” [3].

Figure 2.3 – Post – code

If you enter this message on the site, on which you can click on the link [5], we get a very interesting result.

Figure 2.4 – Initial Post

Figure 2.5 – The hidden message

The general scheme of the hidden coding method is shown in figure 2.6.

Figure 2.6 – The general scheme of information hiding (Gif animation file was created in the program Easy GIF Animator. Animation contains 7 frames, switching interval between the two 1s, 7 cycles of repetition, the size of 85.4 KB.)

Table 1 – Comparison table of methods of steganography

Have advantages / disadvantages Semagrams Phonetics Jargon Covert coding
The complexity of the implementation of +
Easy to detect the presence of an encrypted message +
Easy to decrypt the message + + +
Artificial restrictions (for example: the vocabulary from the sender and recipient, or other conventions between them) + + +

Analyzing table 1, we can conclude that the most qualitative method steganography is a hidden encoding. This method ensures complete hide the fact of the message, which is not limited, however, it is is the most difficult to implement.

Findings

It was considered the main methods of linguistic steganography, which are used to hide information in transit. Established the advantages and disadvantages of each method. Thus, in preliminary studies, it was found that the most persistent linguistic steganography method is hidden encoding. This method has a complex implementation, which is associated with the generation of a word using a particular function, but this method is the fact of transmission masks the hidden message and receive the message without a specific key (function) is virtually impossible. Therefore, a proprietary method that will be developed during the execution of the master's work will be based on the method of coding hidden. At the time of writing this essay master's work is not yet complete, but thanks to the research area chosen for further study and research goal, namely the development of their own linguistic steganography algorithm.

List of sources

  1. Life–Prog [electronic resource].  –  Access: http://www.life–prog.ru/1_6417_aktualnost–problemi–zashchiti–informatsii.html
  2. Wikipedia [electronic resource].  –   Access: https://ru.wikipedia.org/wiki/Стеганография
  3. Digital Security [electronic resource].  –   Access: https://equalit.ie/esecman/russian/chapter2_8.html
  4. Wikipedia [electronic resource].  –   Access: https://ru.wikipedia.org/wiki/Жаргон
  5. Spammic [electronic resource].  –   Access: http://www.spammimic.com/decode.cgi
  6. Panov A. Reversing and protection against hacking software – PG: BHV–Petersburg, 2006, 245str
  7. Larionova K. Methods of encoding arbitrary information in computer texts based on linguistic resources [electronic resource].   –   Access: http://masters.donntu.ru/2009/fvti/...
  8. Sokolenko I. The system of hiding information based on linguistic resources [electronic resource].   –   Access: http://masters.donntu.ru/2014/fknt/...
Summary Abstract