<<

Nonlinear Engineering 2015; 4(3): 175–180

Majid Khan, Ali Shahab*, and Zeeshan Asghar Introduction to Linguistic Steganography

DOI 10.1515/nleng-2015-0013 security. The entire world uses organize as a prime well- Received May 10, 2015; revised June 5, 2015; accepted July 18, 2015. spring of correspondence. The utilization of system ex- panded decade after decade. The utilization of system pro- Abstract: The specialty of data covering up has gotten pelled numerous designers to chip away at system and its much consideration in the late years as security of data has building design to make it more security. The intricate sys- turn into a major concern in this web time. As sharing of tem structural engineering got to be inclined to ruptures. delicate data by means of a typical correspondence station Another part of security is in the setting of protected in- has get to be unavoidable, Steganography – the workman- novation. The unlawful utilization of information in elec- ship and art of concealing data has increased much con- tronic document is enormous issue nowadays and subse- sideration. We are likewise encompassed by a universe of quently security means, for example, advanced authenti- mystery correspondence, where individuals of numerous cations, computerized marks and so forth are utilized. The types are transmitting data as guiltless as an encoded Visa association contains history of security in system, number to an online store than and as deceptive as a ter- Steganography. rorist plot to robbers. Steganography is derived from two The PC system security fundamentally contains secu- Greek words, steganos, meaning covered or secret, and rity gave to both the PC and the system in the middle of graphia, meaning writing. In simple terms, steganography PCs. The information ought to be secure while put away is the art and science of hiding information in plain sight. in PCs furthermore while getting transmitted by means of Steganography is an innovation where advanced informa- systems. Dierent routines have been found to give well- tion pressure, data hypothesis, spread range, and cryptog- being to the information. raphy innovations are united to fulll the requirement for The historical backdrop of system security demon- security on the . This paper is an endeavor to ex- strates a critical hole between the innovations connected amine the dierent methods utilized as a part of steganog- with security and system. The announcement can be raphy and to recognize zones in which this method can be demonstrated with the apparent vicinity of International connected, so that humanity can be proted massively. Standardization of Organization’s Open System Intercon- Keywords: Security; Computer network; Steganography; nection model. This model was created with a considered Information Hiding making perfect system model. The model has all around characterized structural planning. It has seven layers with very much characterized capacities. Every layer is free of the other. This in a roundabout way implies that if the use- 1 Introduction fulness of a layer is enhanced or changed by in future then alternate layers won’t be inuenced. It additionally had The risk to security prompted at the early phases of PCs. great and all around created type of conventions needed The PCs were initially associated in around 1969, known for systems administration. Be that as it may, despite the as Arpanet. This Arpanet was framed by the division of De- fact that the model was consummate as far as systems ad- fense, United States. The electronic documents were sent ministration, it didn’t address any issues of security. Be- along this system. The records exchanged were of signif- cause of the above reason the announcement of hole be- icance and consequently required safe exchange. In this tween innovations gets demonstrated. To extension this way, the development of PC system asked for PC system crevice between advancements i.e., to give system security, simply giving security to the PC won’t work. Case in point give us a chance to accept in a system we simply give se- curity to the PCs , the outcome would be the information *Corresponding Author: Ali Shahab: Department of Sciences and would be safe inside of PCs however when the information Humanities, National University of Computer and Emerging Sci- enters the system connect the wellbeing is altered, it is con- ences, Islamabad, Pakistan, E-mail: [email protected] ceivable that the information would be adjusted before it Majid Khan, Zeeshan Asghar: Department of Sciences and Humani- ties, National University of Computer and Emerging Sciences, Islam- abad, Pakistan 176 Ë Majid Khan et al., Introduction to Linguistic Steganography achieves its real destination. The above situation demon- this was steganography in its starting stage [3]. Steganog- strates the need of security on connections too. raphy viably shrouds the message however does not con- ceal the phenomena that two gatherings are imparting. The steganography is a system to conceal the discharge 2 Steganography information or data in ordinary information or data. The typical message used to shroud the discharge information is known as transporter. The mystery message is inserted Since the ascent of the Internet a standout amongst the in the transporter to frame the steganography medium. most critical variables of data innovation and correspon- The Steganographic is utilized to shroud or encode the dence has been the security of data. was message. This key will know just to the sender and bene- made as a strategy for securing the mystery of correspon- ciary. dence and a wide range of systems have been created to At the point when a picture is utilized to conceal an in- encode and unscramble information to keep the message formation then after the mystery information is full in the mystery. Sadly it is at times insucient to keep the sub- picture the subsequent picture is known as stego-picture. stance of a message mystery, it might likewise be impor- Also when an information is covered up in the feature, the tant to keep the presence of the message mystery. The sys- feature containing the concealed information is known as tem used to execute this, is called steganography. stego-feature. The procedure may be abridged as takes af- Steganography is the expertise and learning of ter: shrouded imperceptible correspondence. This is expert through concealing data in other data, therefore conceal- Steganographic medium = hidden information + ing the presence of the imparted data. The word steganog- cover-medium + steganography key. raphy is gotten from the Greek words "stegos" signifying "cover " and "graa" signifying " writing " characterizing In an advanced world, Steganography and Cryptog- it as " covered writing " [1, 7]. The idea and routine of raphy are both longed for shielding data from superu- concealing data has a long history. In the Greek ous gatherings. Both Steganography and Cryptography re- honorable men if needed to correspond with his child in spect ensure information yet neither innovation alone is law some place far they used to shave the head of one of impeccable and both can be conked out. It is thus that their trusted man. Once shaved the message was tattod on most specialists would recommend utilizing both as a part the head’s skin and afterward the delivery person would of order to include more layers of security. Steganographic let his hair become once more. Once the hair developed to advancements are an exceptionally imperative piece of the cover the message totally the emissary would withdraw to plausible Internet security and classied on open frame- the child in law. The child in law would thusly shave the works, for example, the Internet. Steganographic looks head of the errand person again to recover the message into are fundamentally intending to compliment the cryp- once more. tography and extension the ruptures or holes or security gaps in cryptography. The steganography centers to give complete security. The analysts have nished up with their 3 Steganography and its studies that the greater part of the legislatures has put im- pediments on the routines and many-sided quality of the importance . With these impediments the routines grew by the designers are moderately powerless. These powerless Steganography is an investigation of secured composition. rationales frame the security openings which if assaulted In starting days steganography was done on that can uncover the shrouded data eectively. Consequently were utilized to pass on messages from sender to recip- the steganography is an answer for concealment the secu- ient. One such type of steganography was utilization of rity openings and subsequently steganography is always acidic undetectable ink. This ink would be undetectable under advancements with cryptography. on page. The message composed by this ink could just be Steganography is utilized to conceal information in- read if the paper on which it is composed is kept in a spe- side another information. The sender and recipient both cic edge in light. The discharge message was rst com- have the learning that the mystery information is covered posed with the imperceptible ink and after that to make the up in the message. To include dierent layers of security letter additionally persuading some message in the con- and to help sub side the "crypto versus law" issues already guration of basic letter was composed in agreement. So specied, it is a decent answer for utilization steganogra- Majid Khan et al., Introduction to Linguistic Steganography Ë 177

Fig. 1. Classication of information security techniques and its applications.

steganography shrouds the message in the transporter in some nonobvious traditions and is further arranged as semagrams, spread gures and open gures. Theses classications are presented in Figure 3. But here we will focused on linguistic steganography instead of technical steganography.

Fig. 2. Basic working algorithm of steganography. 4.1 Linguistic Steganography

Characteristic dialect construct data concealing innova- phy in compliment with the cryptographic systems. Both tion depends in light of adjusting data in content archives the techniques i.e cryptographic strategies and stegano- by controlling their lexical, syntactic, and semantic prop- graphic routines are having pit-falls yet both when utilized erties while saving the signicance however much as together can discover answers for one another’s lacunas. could be expected. These systems are more robust than Hence in short we may say that it is helpful to utilize a strategies that simply change the presence of content com- blend of the two systems [4]. ponents like text styles, line space, entomb word sepa- ration and so forth in accomplishing writings incognito. There are a few cases of linguistic steganography, which 4 Classication of steganography can be classied as takes after. techniques

4.1.1 Semagrams Steganography is comprehensively classied into two broad categories technical and linguistic. Technical Semagrams are utilized to conceal data through the uti- steganography utilizes investigative procedures to conceal lization of signs and images. A visual semagram could a message, for example, the utilization of undetectable ink identify with an organized that is transmitted by wav- or microdots and other size-decrease systems. Linguistic 178 Ë Majid Khan et al., Introduction to Linguistic Steganography

Fig. 3. Classication of Steganography. ing your hand, setting a thing in a particular area around Content semagrams are typical messages encoded your work area or changing the look of your site. These through the medium of content. Uppercase letters, high- signs are hard to recognize and have the benet of ordinar- light, and curious penmanship, clear spaces in the mid- iness in a regular world. Here and there the viable utiliza- dle of words can all be utilized as signs for a predened tion of visual semagrams may be your just strategy for cor- reason. Subliminal messages likewise fall into this class. respondence with your companions and associates, and it They are now and then helpful when you wish to convey a is essential to set up and prearrange a few messages that little bit of data. Case in point, you could concur with your may be transferred in times of threat. contacts to trade apparently harmless day by day climate Majid Khan et al., Introduction to Linguistic Steganography Ë 179 reports via email. The expression ’the sky is dim’ may serve pears as obvious nonsense, but can be decoded to a mean- as a ready signicance you are in a bad position and they ingful message. This is an ancient form of encrypted com- ought to assemble worldwide help. munication in which a message is surrounded by a large amount of redundant characters (known as null ). This form of communication is, in fact, known to have 4.1.2 Open Codes been used by the German army during WW II. The follow- ing is an example of a null form of steganography: Open code steganography hides the message in a legit- imate piece of text in the ways not immediately obvi- “Morning Ali Jamshed, I Drove Karachi Highway At Noon ous to the observer. Computers and humans have dif- in Speed. Meeting Your Friend Regarding Islamiat Exam ferent abilities when it comes to , or detect- Next Day” ing steganographic messages (see below under ‘Detection’ sub-heading). The following examples may not be appli- “Language of Nurses Did Oend Nursing Ideals So Nurses cable to the carried out by a human stegana- Opt Their Smiling Attitude For Everyone” lyst. They use linguistic variations of the text to fool the Decoding these messages by extracting the rst letter common formulas used by electronic lters and surveil- in each word reveals: lance systems. Please bear in mind that these can only be regarded as hints or suggestions to take advantage of the “Majid Khan is My Friend” non-intelligent nature of computer systems. They should not be used to communicate important information, but “London is Not Safe” only to test the eectiveness of the ltering system. If you know that certain words in your email will result in its fail- The drawback of this form of steganography is that the ure to reach the recipient and this information alone will message sender is forced to make a text cover according to not get you into trouble, you can try out some of the varia- a preset procedure, hence defeats the purpose of steganog- tions below. raphy. Also, applying a ‘brute force’ approach to decoding will reveal the message. There are various types of specialized steganography 4.1.2.1 Jargon like content, picture, sound, feature, convention and so Using jargon in your messages could render its content on. All advanced document organizations can be utilized meaningless to an outside observer. Prearranged mean- for steganography; however designs with high level of rep- ings or underground terminology can hide the real con- etition are suitable. Excess here can be characterized as tents of the message. It is advisable to choose words in the data which is more than once show in the information, such a way that the carrier message remains legible and and the information could have been eortlessly compre- comprehensible, if not true. The possibilities of the use of hended without these rehashed substances. The repetitive jargon are limited only by the stock of the words known to bits are the bits which when changed are not recognized the communicating parties. eortlessly [5]. Picture and sound documents are broadly utilized for steganography yet this doesn’t imply that other document groups can’t be utilized. Generally, conceal- 4.1.3 Covered Ciphers ing information into content was the critical method for steganography i.e. concealing mystery note in every nth Covered ciphers employ a particular method or secret to letter of each expression of an instant message. However, hide text in an open carrier message. Sometimes these in- since the start of the advanced period, Text, Images, Au- clude simple techniques of embedding a message into the dio/feature, Protocol, Internet and all the distinctive com- words of the carrier. Consider the example below, sent by puterized document organizations has reduced its signi- the German Embassy in Washington DC to the headquar- cance. Content steganography utilizing advanced records ters in Berlin during World War One. is not utilized regularly on the grounds that the content does not have much repetitive information. The picture comprises of numerous pixels which are spoken to as bits. 4.1.3.1 Null Ciphers The greater part of these bits is found as needlessly. Also, Null ciphers apply a series of characters and words in- tended to confuse a cryptanalyst. The communicated ap- 180 Ë Majid Khan et al., Introduction to Linguistic Steganography this element makes the pictures an essential conguration References for steganography. Comparative system is utilized to stow away discharge [1] K. Bennett, Linguistic steganography: Survey, analysis, and information in sound records as that of utilized for picture robustness concerns for hiding information in text, Tech. Rep. documents. Concealing is one of the one of a kind sys- TR 2004-13, Purdue CERIAS, May 2004. tem which conceals the information in sound document [2] M. T. Chapman, Hiding the hidden: A software system for con- in such which is imperceptible to human ears. A light ne cealing as innocuous text, Master‘s thesis, Univer- sound gets to be unperceivable before louder sound. This sity of Wisconsin-Milwaukee, May 1997. [3] M. T. Chapman and G. I. Davida, Hiding the hidden: A soft- element makes a space where we can shroud the data. De- ware system for concealing ciphertext as innocuous text, in spite the fact that the aforementioned procedure is on a Information and Communications Security: First International par with picture steganography yet the increment in size of Conference, O. S. . Yongfei Han Tatsuaki, ed., Lecture Notes stego-sound give an insight to gatecrasher about the con- in Computer Science 1334, Springer, August 1997. cealed information [6]. [4] M. T. Chapman, G. I. Davida, and M. Rennhard, A practical and eective approach to large-scale automated linguistic steganography,? in Information Security: Fourth International Conference, G. I. Davida and Y. Frankel, eds., Lecture Notes in 5 Conclusion Computer Science 2200, p. 156, Springer, October 2001. [5] R. Bergmair, Towards linguistic steganography: A systematic investigation of approaches, systems, and issues. nal year The eld of Linguistic Steganography is very interesting as thesis, April 2004. handed in in partial fulllment of the de- it conceals the very existence of secret message from in- gree requirements for the degree B.Sc. (Hons.) in Computer truder, which is not achievable by cryptography. In this Studies to the University of Derby. article, we mainly study some basic schemes of Linguis- [6] I. A. Bolshakov, A method of linguistic steganography based on collocationally veried synonymy., in Information Hiding: tic Steganography and review some standards techniques 6th International Workshop, J. J. Fridrich, ed., Lecture Notes in of Linguistic Steganography. In future, we will denitely Computer Science 3200, pp. 180–191, Springer, May 2004. classify some other techniques of Linguistic Steganogra- [7] K. Winstein, Lexical steganography through adaptive modula- phy. tion of the word choice hash, January 1999. Was disseminated during secondary education at the Illinois Mathematics and Science Academy. The paper won the third prize in the 2000 Intel Science Talent Search.