Auto-summarization-based steganography

Abdelrahman Desoky, Mohamed Younis, Hesham El-Sayed

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)

    Abstract

    Steganography is the science and art of avoiding the arousal of suspicion in covert communications. This paper presents a novel steganography methodology that pursues text summarization in order to hide messages. The proposed Summarization-Based Steganography (Sumstega) methodology takes advantage of recent advances in automatic summarization techniques to generate a text-cover. Sumstega does not exploit noise (errors) to embed a message nor produce a detectable noise. Instead, it pursues the variations among the outputs of autosummarization techniques to conceal data. Basically, Sumstega manipulates the parameters of automatic summarization tools, e.g. how the word frequency weights in the sentence selection, and employs other contemporary techniques such as paraphrasing, reordering, etc., to generate summary-cover that looks legitimate. The popular use of text summaries in business, science, education, news, etc., renders summary an attractive steganographic carrier and averts an adversary's suspicion. The validation results demonstrate the effectiveness of Sumstega.

    Original languageEnglish
    Title of host publication2008 International Conference on Innovations in Information Technology, IIT 2008
    Pages608-612
    Number of pages5
    DOIs
    Publication statusPublished - 2008
    Event2008 International Conference on Innovations in Information Technology, IIT 2008 - Al Ain, United Arab Emirates
    Duration: Dec 16 2008Dec 18 2008

    Publication series

    Name2008 International Conference on Innovations in Information Technology, IIT 2008

    Other

    Other2008 International Conference on Innovations in Information Technology, IIT 2008
    Country/TerritoryUnited Arab Emirates
    CityAl Ain
    Period12/16/0812/18/08

    ASJC Scopus subject areas

    • Computer Science Applications
    • Information Systems
    • Software

    Fingerprint

    Dive into the research topics of 'Auto-summarization-based steganography'. Together they form a unique fingerprint.

    Cite this