Strengthening INORMALS Using Context-based Natural Language Generation

被引:0
作者
Yora, Soni [1 ]
Barmawi, Ari Moesriami [1 ]
机构
[1] Telkom Univ, Grad Sch Informat, Sch Comp, Kawasan Pendidikan Telkom, Bandung 40257, Indonesia
关键词
Baudot-Murray code; INORMALS; linguistic-based steganography; natural language generation; sentence paraphrasing;
D O I
10.5614/itbj.ict.res.appl.2022.16.2.1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The noiseless steganography method that has been proposed by Wibowo can embed up to six characters in the provided cover text, but more than 59% of Indonesian words have a length of more than six characters, so there is room to improve Wibowo's method. This paper proposes an improvement of Wibowo's method by modifying the shifting codes and using context-based language generation. Based on 300 test messages, 99% of messages with more than six characters could be embedded by the proposed method, while using Wibowo's method this was only 34%. Wibowo's method can embed more than six characters only if the number of shifting codes is less than three, while the proposed method can embed more than six characters even if there are more than three shifting codes. Furthermore, the security for representing the number of code digits is increased by introducing a private key with the probability of guessing less than 1, while in Wibowo's method this is 1. The naturalness of the cover sentences generated by the proposed method was maintained, which was about 99% when using the proposed method, while it was 98.61% when using Wibowo's method.
引用
收藏
页码:101 / 122
页数:22
相关论文
共 14 条
[1]  
Alwi H., 2012, INDONESIAN DICT
[2]   Paraphrasing Method Based on Contextual Synonym Substitution [J].
Barmawi, Ari Moesriami ;
Muhammad, Ali .
JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2019, 13 (03) :257-282
[3]  
Chang Ching-Yun, 2013, J COMPUTATIONAL LIKN, V40, P403
[4]  
DESOKY A, 2010, J INFORM HIDING MULT, V1, P145
[5]  
Desoky A., 2010, J SECURITY COMMUNICA, V4, P697
[6]  
Hammarstrom Harald., 2010, Rethinking Universals: How Rarities Affect Linguistic Theory, P11
[7]   RANDOM NUMBER GENERATORS [J].
HULL, TE ;
DOBELL, AR .
SIAM REVIEW, 1962, 4 (03) :230-+
[8]  
Hunt C., 2002, TCP/IP Network Administration, V3rd
[9]  
Jurafsky D., 2008, Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition, V2, DOI DOI 10.5555/555733
[10]  
Mozilla Documentation, 2021, HTTP RESPONSE STATUS