Abstract
This paper investigates the possibilities of steganographically embedding information in the “noise” created by automatic translation of natural language documents. Because the inherent redundancy of natural language creates plenty of room for variation in translation, machine translation is ideal for steganographic applications. Also, because there are frequent errors in legitimate automatic text translations, additional errors inserted by an information hiding mechanism are plausibly undetectable and would appear to be part of the normal noise associated with translation. Significantly, it should be extremely difficult for an adversary to determine if inaccuracies in the translation are caused by the use of steganography or by deficiencies of the translation software.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Al-Onaizan, Y., Curin, J., Jahr, M., Knight, K., Lafferty, J., Melamed, I.D., Och, F.J., Purdy, D., Smith, N.A., Yarowsky, D.: Statistical machine translation, final report. In: JHU workshop (1999), http://www.clsp.jhu.edu/ws99/projects/mt/final_report/mt-final-report.ps
Atallah, M., Raskin, V., Hempelmann, C., Karahan, M., Sion, R., Triezenberg, K.: Natural language watermarking and tamperproofing. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 196–212. Springer, Heidelberg (2003)
Brown, P.F., Della Pietra, S.A., Della Pietra, V.J., Mercer, R.L.: The mathematics of statistical machine translation: Parameter estimation. Computational Linguistics 19(2), 263–311 (1993)
Chapman, M., Davida, G.: Hiding the hidden: A software system for concealing ciphertext in innocuous text. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 11–14. Springer, Heidelberg (1997)
Chapman, M., Davida, G., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 156–165. Springer, Heidelberg (2001)
Clarkson, P.R., Rosenfeld, R.: Statistical language modeling using the cmu-cambridge toolkit. In: Proceedings of ESCA Eurospeech (1997)
Smart Link Corporation. Promt-online, http://translation2.paralink.com/
Fridrich, J., Goljan, M., Soukal, D.: Higher-Order Statistical Steganalysis of Palette. In: Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents, San Jose, CA, January 21 - 24, vol. 5020, pp. 178–190 (2003)
Germann, U., Jahr, M., Marcu, D., Yamada, K.: Fast decoding and optimal decoding for machine translation. In: Proceedings of the 39th Annual Conference of the Association for Computational Linguistics, ACL 2001 (2001)
Golle, P., Farahat, A.: Defending email communication against profiling attacks. In: Proceedings of the 2004 ACM workshop on Privacy in the electronic society (WPES 2004), pp. 39–40 (2004)
Grothoff, C., Grothoff, K., Alkhutova, L., Stutsman, R., Atallah, M.: Translation-based steganography. Technical Report CSD TR 05-009, Purdue University (2005), http://grothoff.org/christian/lit-tech.ps
Huffman, D.: A method for the construction of minimum redundancy codes. Proceedings of the Institute of Radio Engineers 40, 1098–1101 (1951)
Johnson, N.F., Jajodia, S.: Steganalysis of images created using current steganography software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, p. 273. Springer, Heidelberg (1998)
Lyu, S., Farid, H.: Detecting Hidden Messages using Higher-Order Statistics and Support Vector Machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340–354. Springer, Heidelberg (2003)
Manning, C.D., Schuetze, H.: Review of Foundations of Statistical Natural Language Processing. MIT Press, Cambridge (1999)
Marx, B.: Friedensverhandlungen brauchen ruhe. Deutsche Welle Online (January 2005)
Och, F.J., Ney, H.: A comparison of alignment models for statistical machine translation. In: COLING 2000, Saarbrücken, Germany, August 2000, pp. 1086–1090 (2000)
Och, F.J., Ney, H.: Improved statistical alignment models. In: ACL 2000, Hongkong, China, October 2000, pp. 440–447 (2000)
Pfitzmann, A., Westfeld, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)
Suren, S.: Neue bilder der arabischen jugend. Deutsche Welle Online (March 2005)
Systran Language Translation Technologies. Systran, http://systransoft.com/
Wayner, P.: Mimic functions. Cryptologia XVI(3), 193–214 (1992)
Wayner, P.: Disappearing Cryptography: Information Hiding: Steganography and Watermarking, 2nd edn. Morgan Kaufmann, San Francisco (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Grothoff, C., Grothoff, K., Alkhutova, L., Stutsman, R., Atallah, M. (2005). Translation-Based Steganography. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds) Information Hiding. IH 2005. Lecture Notes in Computer Science, vol 3727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558859_17
Download citation
DOI: https://doi.org/10.1007/11558859_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29039-1
Online ISBN: 978-3-540-31481-3
eBook Packages: Computer ScienceComputer Science (R0)