Skip to main content

Translation-Based Steganography

  • Conference paper
Information Hiding (IH 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3727))

Included in the following conference series:

Abstract

This paper investigates the possibilities of steganographically embedding information in the “noise” created by automatic translation of natural language documents. Because the inherent redundancy of natural language creates plenty of room for variation in translation, machine translation is ideal for steganographic applications. Also, because there are frequent errors in legitimate automatic text translations, additional errors inserted by an information hiding mechanism are plausibly undetectable and would appear to be part of the normal noise associated with translation. Significantly, it should be extremely difficult for an adversary to determine if inaccuracies in the translation are caused by the use of steganography or by deficiencies of the translation software.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Al-Onaizan, Y., Curin, J., Jahr, M., Knight, K., Lafferty, J., Melamed, I.D., Och, F.J., Purdy, D., Smith, N.A., Yarowsky, D.: Statistical machine translation, final report. In: JHU workshop (1999), http://www.clsp.jhu.edu/ws99/projects/mt/final_report/mt-final-report.ps

  2. Atallah, M., Raskin, V., Hempelmann, C., Karahan, M., Sion, R., Triezenberg, K.: Natural language watermarking and tamperproofing. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 196–212. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Brown, P.F., Della Pietra, S.A., Della Pietra, V.J., Mercer, R.L.: The mathematics of statistical machine translation: Parameter estimation. Computational Linguistics 19(2), 263–311 (1993)

    Google Scholar 

  4. Chapman, M., Davida, G.: Hiding the hidden: A software system for concealing ciphertext in innocuous text. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 11–14. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  5. Chapman, M., Davida, G., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 156–165. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Clarkson, P.R., Rosenfeld, R.: Statistical language modeling using the cmu-cambridge toolkit. In: Proceedings of ESCA Eurospeech (1997)

    Google Scholar 

  7. Smart Link Corporation. Promt-online, http://translation2.paralink.com/

  8. Fridrich, J., Goljan, M., Soukal, D.: Higher-Order Statistical Steganalysis of Palette. In: Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents, San Jose, CA, January 21 - 24, vol. 5020, pp. 178–190 (2003)

    Google Scholar 

  9. Germann, U., Jahr, M., Marcu, D., Yamada, K.: Fast decoding and optimal decoding for machine translation. In: Proceedings of the 39th Annual Conference of the Association for Computational Linguistics, ACL 2001 (2001)

    Google Scholar 

  10. Golle, P., Farahat, A.: Defending email communication against profiling attacks. In: Proceedings of the 2004 ACM workshop on Privacy in the electronic society (WPES 2004), pp. 39–40 (2004)

    Google Scholar 

  11. Grothoff, C., Grothoff, K., Alkhutova, L., Stutsman, R., Atallah, M.: Translation-based steganography. Technical Report CSD TR 05-009, Purdue University (2005), http://grothoff.org/christian/lit-tech.ps

  12. Huffman, D.: A method for the construction of minimum redundancy codes. Proceedings of the Institute of Radio Engineers 40, 1098–1101 (1951)

    Google Scholar 

  13. Johnson, N.F., Jajodia, S.: Steganalysis of images created using current steganography software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, p. 273. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  14. Lyu, S., Farid, H.: Detecting Hidden Messages using Higher-Order Statistics and Support Vector Machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340–354. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  15. Manning, C.D., Schuetze, H.: Review of Foundations of Statistical Natural Language Processing. MIT Press, Cambridge (1999)

    Google Scholar 

  16. Marx, B.: Friedensverhandlungen brauchen ruhe. Deutsche Welle Online (January 2005)

    Google Scholar 

  17. Och, F.J., Ney, H.: A comparison of alignment models for statistical machine translation. In: COLING 2000, Saarbrücken, Germany, August 2000, pp. 1086–1090 (2000)

    Google Scholar 

  18. Och, F.J., Ney, H.: Improved statistical alignment models. In: ACL 2000, Hongkong, China, October 2000, pp. 440–447 (2000)

    Google Scholar 

  19. Pfitzmann, A., Westfeld, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  20. Suren, S.: Neue bilder der arabischen jugend. Deutsche Welle Online (March 2005)

    Google Scholar 

  21. Systran Language Translation Technologies. Systran, http://systransoft.com/

  22. Wayner, P.: Mimic functions. Cryptologia XVI(3), 193–214 (1992)

    Article  MathSciNet  Google Scholar 

  23. Wayner, P.: Disappearing Cryptography: Information Hiding: Steganography and Watermarking, 2nd edn. Morgan Kaufmann, San Francisco (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Grothoff, C., Grothoff, K., Alkhutova, L., Stutsman, R., Atallah, M. (2005). Translation-Based Steganography. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds) Information Hiding. IH 2005. Lecture Notes in Computer Science, vol 3727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558859_17

Download citation

  • DOI: https://doi.org/10.1007/11558859_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29039-1

  • Online ISBN: 978-3-540-31481-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics