This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology
On Source Code Transformations for Steganographic Applications
Lyon, France
August 22-August 27
ISBN: 978-0-7695-4513-4
The amount of publicly available source code on the Internet makes it attractive as a potential message carrier for steganographic applications. Unfortunately, it is often overlooked since embedding information in an undetectable way is challenging. We investigate term rewriting as a method for embedding messages into programs via transformations on source code. We elaborate on several possible transformation strategies and discuss how they might be applied in a steganographic setting. We continue with a discussion on (a) the implications and trade-offs of preserving semantic properties, (b) the relationship between messages and transformations, and (c) how to incorporate existing natural language processing techniques. The goal of this work is to elicit constructive feedback and present ideas that stimulate future work.
Index Terms:
steganography, source code transformations, term rewriting
Citation:
Geoffrey C. Hulette, John Solis, "On Source Code Transformations for Steganographic Applications," wi-iat, vol. 3, pp.261-264, 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 2011
Usage of this product signifies your acceptance of the Terms of Use.