Show simple item record

dc.contributor.authorVOGEL, CARLen
dc.contributor.editorEdward J. Delp III, Ping Wah Wongen
dc.date.accessioned2009-09-08T11:17:30Z
dc.date.available2009-09-08T11:17:30Z
dc.date.createdFebruary 2007en
dc.date.issued2007en
dc.date.submitted2007en
dc.identifier.citationBrian Murphy and Carl Vogel, The syntax of concealment: reliable methods for plain text information hiding, Proceedings of SPIE - The International Society for Optical Engineering, Security, Steganography, and Watermarking of Multimedia Contents IX;, San Jose, California, February 2007, Edward J. Delp III, Ping Wah Wong, 6505, 2007, 65050Yen
dc.identifier.otherYen
dc.descriptionPUBLISHEDen
dc.descriptionSan Jose, Californiaen
dc.description.abstractMany plain text information hiding techniques demand deep semantic processing, and so suffer in reliability. In contrast, syntactic processing is a more mature and reliable technology. Assuming a perfect parser, this paper evaluates a set of automated and reversible syntactic transforms that can hide information in plain text without changing the meaning or style of a document. A large representative collection of newspaper text is fed through a prototype system. In contrast to previous work, the output is subjected to human testing to verify that the text has not been significantly compromised by the information hiding procedure, yielding a success rate of 96% and bandwidth of 0.3 bits per sentence.en
dc.description.sponsorshipWe gratefully acknowledge the support of Science Foundation Ireland funding in the Research Frontiers Programme project 05/RF/CMS002.en
dc.format.extent65050Yen
dc.format.mimetypeapplication/pdf
dc.language.isoenen
dc.relation.ispartofseries6505en
dc.rightsYen
dc.subjectplain text, information hiding, steganography, syntactic transform, human judgementen
dc.titleThe syntax of concealment: reliable methods for plain text information hidingen
dc.title.alternativeProceedings of SPIE - The International Society for Optical Engineeringen
dc.title.alternativeSecurity, Steganography, and Watermarking of Multimedia Contents IX;en
dc.typeConference Paperen
dc.type.supercollectionscholarly_publicationsen
dc.type.supercollectionrefereed_publicationsen
dc.identifier.peoplefinderurlhttp://people.tcd.ie/vogelen
dc.identifier.rssinternalid43996en
dc.identifier.doihttp://dx.doi.org/10.1117/12.713357en
dc.subject.TCDThemeAgeingen
dc.subject.TCDThemeCanceren
dc.subject.TCDThemeCreative Arts Practiceen
dc.subject.TCDThemeCreative Technologiesen
dc.subject.TCDThemeDigital Humanitiesen
dc.subject.TCDThemeInclusive Societyen
dc.subject.TCDThemeIntelligent Content & Communicationsen
dc.subject.TCDThemeInternational Integrationen
dc.subject.TCDThemeNext Generation Medical Devicesen
dc.subject.TCDThemeSmart & Sustainable Planeten
dc.subject.TCDThemeTelecommunicationsen
dc.subject.TCDTagComputational linguisticsen
dc.identifier.rssurihttp://dx.doi.org/10.1117/12.713357
dc.identifier.orcid_id0000--000-8928-8546en
dc.identifier.urihttp://hdl.handle.net/2262/32208


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record