• DocumentCode
    1662896
  • Title

    On Source Code Transformations for Steganographic Applications

  • Author

    Hulette, Geoffrey C. ; Solis, John

  • Author_Institution
    Comput. & Inf. Sci. Dept., Univ. of Oregon, Eugene, OR, USA
  • Volume
    3
  • fYear
    2011
  • Firstpage
    261
  • Lastpage
    264
  • Abstract
    The amount of publicly available source code on the Internet makes it attractive as a potential message carrier for steganographic applications. Unfortunately, it is often overlooked since embedding information in an undetectable way is challenging. We investigate term rewriting as a method for embedding messages into programs via transformations on source code. We elaborate on several possible transformation strategies and discuss how they might be applied in a steganographic setting. We continue with a discussion on (a) the implications and trade-offs of preserving semantic properties, (b) the relationship between messages and transformations, and (c) how to incorporate existing natural language processing techniques. The goal of this work is to elicit constructive feedback and present ideas that stimulate future work.
  • Keywords
    Internet; document handling; natural language processing; rewriting systems; source coding; steganography; Internet; natural language processing techniques; semantic property preservation; source code documents; source code transformations; steganographic setting; term rewriting; Cryptography; Natural language processing; Robustness; Semantics; Software; Transforms; Watermarking; source code transformations; steganography; term rewriting;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Web Intelligence and Intelligent Agent Technology (WI-IAT), 2011 IEEE/WIC/ACM International Conference on
  • Conference_Location
    Lyon
  • Print_ISBN
    978-1-4577-1373-6
  • Electronic_ISBN
    978-0-7695-4513-4
  • Type

    conf

  • DOI
    10.1109/WI-IAT.2011.89
  • Filename
    6040855