Natural Language Steganography and an “AI-complete” Security Primitive
نویسنده
چکیده
In order to sketch, why steganography is such an important topic, and has received far too little attention from the hacker community in the past, let me quickly challenge our view of cryptosystems as commonly built in the context of military or commercial applications: Cryptosystems are designed to protect our sensitive data from evil arbitrators. Wrong. Well, maybe not. But then again, what is evil? Basically one could say, hacker ethics is about protecting a good individual from a bad society and this has some severe consequences in the construction of secure communication systems. In particular, I would like to draw our attention to the evil spy, we are envisioning, when we think about cryptosystems, who intercepts sensitive military communication, and to the criminal who fakes banking transactions. Most often, what we have in mind, when we build cryptosystems is a bad individual in a good society, which is rather some instance of witch hunt ethics. In practice this assumption has the simple incarnation, that cryptograms are vulnerable to detection, since a good society would encourage the use of cryptography as a means to protect everyone’s privacy. But under the assumption of a bad society, would Alice and Bob be allowed to use cryptography? What would witchhunt ethics assert about people who use cryptography? Do they have something to hide? Something evil? The central shift in views that is necessary, is the fact that it is not Alice and Bob who control their communication channel, so they can make sure, that evil Wendy won’t be able to recover their communication, but evil Wendy controls the channel and wants to make sure Alice and Bob can’t exchange unwanted messages. This communication setup has first been stated by Gustavus J. Simmons, which he popularly introduced via the prisoner’s dilemma. In this scenario we assume Alice and Bob are arrested, and “their only means of communication after they are locked up will be by way of messages conveyed for them by trustees – who are known to be agents of the warden... However since he has every reason to suspect that the prisoners want to coordinate an escape plan, the warden will only permit the exchanges to occur if the information contained in the messages is completely open to him – and presumably innocuous.” (Simmons 1984).
منابع مشابه
Detection of substitution-based linguistic steganography by relative frequency analysis
Linguistic steganography hides information in natural language texts. Because of the increasing in importance and quantity of natural language texts, linguistic steganography plays a more and more important role in Information Security (IS) area today. Substitutionbased linguistic steganography is one of the most commonly used linguistic steganography methods, which is of considerable security ...
متن کاملA New Hybrid Method for Colored Image Steganography Based On DWT
Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...
متن کاملTowards Linguistic Steganography: A Systematic Investigation of Approaches, Systems, and Issues
Steganographic systems provide a secure medium to covertly transmit information in the presence of an arbitrator. In linguistic steganography, in particular, machine-readable data is to be encoded to innocuous natural language text, thereby providing security against any arbitrator tolerating natural language as a communication medium. So far, there has been no systematic literature available o...
متن کاملA New Hybrid Method for Colored Image Steganography Based On DWT
Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...
متن کاملTranslation-Based Steganography
This paper investigates the possibilities of steganographically embedding information in the "noise" created by automatic translation of natural language documents. Because the inherent redundancy of natural language creates plenty of room for variation in translation, machine translation is ideal for steganographic applications. Also, because there are frequent errors in legitimate automatic t...
متن کامل