DocumentCode
1662896
Title
On Source Code Transformations for Steganographic Applications
Author
Hulette, Geoffrey C. ; Solis, John
Author_Institution
Comput. & Inf. Sci. Dept., Univ. of Oregon, Eugene, OR, USA
Volume
3
fYear
2011
Firstpage
261
Lastpage
264
Abstract
The amount of publicly available source code on the Internet makes it attractive as a potential message carrier for steganographic applications. Unfortunately, it is often overlooked since embedding information in an undetectable way is challenging. We investigate term rewriting as a method for embedding messages into programs via transformations on source code. We elaborate on several possible transformation strategies and discuss how they might be applied in a steganographic setting. We continue with a discussion on (a) the implications and trade-offs of preserving semantic properties, (b) the relationship between messages and transformations, and (c) how to incorporate existing natural language processing techniques. The goal of this work is to elicit constructive feedback and present ideas that stimulate future work.
Keywords
Internet; document handling; natural language processing; rewriting systems; source coding; steganography; Internet; natural language processing techniques; semantic property preservation; source code documents; source code transformations; steganographic setting; term rewriting; Cryptography; Natural language processing; Robustness; Semantics; Software; Transforms; Watermarking; source code transformations; steganography; term rewriting;
fLanguage
English
Publisher
ieee
Conference_Titel
Web Intelligence and Intelligent Agent Technology (WI-IAT), 2011 IEEE/WIC/ACM International Conference on
Conference_Location
Lyon
Print_ISBN
978-1-4577-1373-6
Electronic_ISBN
978-0-7695-4513-4
Type
conf
DOI
10.1109/WI-IAT.2011.89
Filename
6040855
Link To Document