{"title":"隐形密文","authors":"M. Simova, M. Stamp, C. Pollett","doi":"10.31979/etd.bmj6-cqmb","DOIUrl":null,"url":null,"abstract":"To insure the confidentiality of data, it can be encrypted before it is transmitted. However, most data today is unencrypted. As a result, encrypted data might attract unwanted attention, simply due to the fact that it is encrypted. To avoid such attention, we propose a method of converting ciphertext into data that can pass certain automated tests for English text. Our goal is to foil automated detection methods, and we want to expand the encrypted data as little as possible in the process. Our technique can be considered as a form of steganography.","PeriodicalId":126578,"journal":{"name":"International Conference on Internet Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Stealthy Ciphertext\",\"authors\":\"M. Simova, M. Stamp, C. Pollett\",\"doi\":\"10.31979/etd.bmj6-cqmb\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To insure the confidentiality of data, it can be encrypted before it is transmitted. However, most data today is unencrypted. As a result, encrypted data might attract unwanted attention, simply due to the fact that it is encrypted. To avoid such attention, we propose a method of converting ciphertext into data that can pass certain automated tests for English text. Our goal is to foil automated detection methods, and we want to expand the encrypted data as little as possible in the process. Our technique can be considered as a form of steganography.\",\"PeriodicalId\":126578,\"journal\":{\"name\":\"International Conference on Internet Computing\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Internet Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31979/etd.bmj6-cqmb\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Internet Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31979/etd.bmj6-cqmb","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
To insure the confidentiality of data, it can be encrypted before it is transmitted. However, most data today is unencrypted. As a result, encrypted data might attract unwanted attention, simply due to the fact that it is encrypted. To avoid such attention, we propose a method of converting ciphertext into data that can pass certain automated tests for English text. Our goal is to foil automated detection methods, and we want to expand the encrypted data as little as possible in the process. Our technique can be considered as a form of steganography.