Paper
19 February 2014 Linguistic steganography on Twitter: hierarchical language modeling with manual interaction
Alex Wilson, Phil Blunsom, Andrew D. Ker
Author Affiliations +
Proceedings Volume 9028, Media Watermarking, Security, and Forensics 2014; 902803 (2014) https://doi.org/10.1117/12.2039213
Event: IS&T/SPIE Electronic Imaging, 2014, San Francisco, California, United States
Abstract
This work proposes a natural language stegosystem for Twitter, modifying tweets as they are written to hide 4 bits of payload per tweet, which is a greater payload than previous systems have achieved. The system, CoverTweet, includes novel components, as well as some already developed in the literature. We believe that the task of transforming covers during embedding is equivalent to unilingual machine translation (paraphrasing), and we use this equivalence to de ne a distortion measure based on statistical machine translation methods. The system incorporates this measure of distortion to rank possible tweet paraphrases, using a hierarchical language model; we use human interaction as a second distortion measure to pick the best. The hierarchical language model is designed to model the speci c language of the covers, which in this setting is the language of the Twitter user who is embedding. This is a change from previous work, where general-purpose language models have been used. We evaluate our system by testing the output against human judges, and show that humans are unable to distinguish stego tweets from cover tweets any better than random guessing.
© (2014) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Alex Wilson, Phil Blunsom, and Andrew D. Ker "Linguistic steganography on Twitter: hierarchical language modeling with manual interaction", Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014, 902803 (19 February 2014); https://doi.org/10.1117/12.2039213
Lens.org Logo
CITATIONS
Cited by 18 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Steganography

Distortion

Data modeling

Digital watermarking

Modeling

Databases

Steganalysis

RELATED CONTENT

Audio steganography by amplitude or phase modification
Proceedings of SPIE (June 20 2003)
Attacks on lexical natural language steganography systems
Proceedings of SPIE (February 15 2006)
R/D optimal data hiding
Proceedings of SPIE (April 09 1999)

Back to Top