Skip to main content

2017 | OriginalPaper | Buchkapitel

Coverless Information Hiding Technology Research Based on News Aggregation

verfasst von : Conghua Liu, Gang Luo, Zuwei Tian

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper proposes a novel coverless information hiding method based on news aggregation. It converts the secret message M to a large integer N, and hides N in a news web by changing the order of news headlines. Experimental results and analysis show that this method is robust for any current steganalysis algorithm, and effective for stego-message delivery.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shen, C., Zhang, H., Feng, D.: A survey of information security. Sci. China 37(2), 129–150 (2007) Shen, C., Zhang, H., Feng, D.: A survey of information security. Sci. China 37(2), 129–150 (2007)
2.
Zurück zum Zitat Zhang, G., Yue, Y., Zhang, C.: Adaptive steganography algorithm of rapid wet paper code based on Hilbert. Comput. Eng. 39(7), 161–164 (2013) Zhang, G., Yue, Y., Zhang, C.: Adaptive steganography algorithm of rapid wet paper code based on Hilbert. Comput. Eng. 39(7), 161–164 (2013)
3.
Zurück zum Zitat Budhia, U., Kundur, D., Zourntos, T.: Digital video steganalysis exploiting statistical visibilityin the temporal domain. IEEE Trans. Inf. Forensics Secur. 1(4), 502–516 (2006)CrossRef Budhia, U., Kundur, D., Zourntos, T.: Digital video steganalysis exploiting statistical visibilityin the temporal domain. IEEE Trans. Inf. Forensics Secur. 1(4), 502–516 (2006)CrossRef
4.
Zurück zum Zitat Bai, Y., Bai, S., Liu, C.: Digital audio watermarking algorithm based on wavelet and cepstrum domain. Comput. Appl. Softw. 29(3), 163–167 (2012) Bai, Y., Bai, S., Liu, C.: Digital audio watermarking algorithm based on wavelet and cepstrum domain. Comput. Appl. Softw. 29(3), 163–167 (2012)
5.
Zurück zum Zitat Fu, D., Chen, G., Yang, Q.: A covert communication method based on XML documents slicing. Comput. Appl. Softw. 28(9), 106–107 (2011) Fu, D., Chen, G., Yang, Q.: A covert communication method based on XML documents slicing. Comput. Appl. Softw. 28(9), 106–107 (2011)
6.
Zurück zum Zitat Xia, Z., Wang, X., Sun, X., et al.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed. Tools Appl. 75(4), 1947–1962 (2016)CrossRef Xia, Z., Wang, X., Sun, X., et al.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed. Tools Appl. 75(4), 1947–1962 (2016)CrossRef
7.
Zurück zum Zitat Xia, Z., Wang, X., Sun, X., et al.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014)CrossRef Xia, Z., Wang, X., Sun, X., et al.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014)CrossRef
8.
Zurück zum Zitat Fu, Z., Ren, K., Shu, J., et al.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)CrossRef Fu, Z., Ren, K., Shu, J., et al.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)CrossRef
9.
Zurück zum Zitat Fu, Z., Wu, X., Guan, C., et al.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)CrossRef Fu, Z., Wu, X., Guan, C., et al.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)CrossRef
10.
Zurück zum Zitat Fu, Z., Sun, X., Liu, Q., et al.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98-B(1), 190–200 (2015)CrossRef Fu, Z., Sun, X., Liu, Q., et al.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98-B(1), 190–200 (2015)CrossRef
11.
Zurück zum Zitat Chen, X., Sun, H., Tobe, Y., Zhou, Z., Sun, X.: Coverless information hiding method based on the chinese mathematical expression. In: Huang, Z., Sun, X., Luo, J., Wang, Jian (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 133–143. Springer, Cham (2015). doi:10.1007/978-3-319-27051-7_12 CrossRef Chen, X., Sun, H., Tobe, Y., Zhou, Z., Sun, X.: Coverless information hiding method based on the chinese mathematical expression. In: Huang, Z., Sun, X., Luo, J., Wang, Jian (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 133–143. Springer, Cham (2015). doi:10.​1007/​978-3-319-27051-7_​12 CrossRef
12.
Zurück zum Zitat Zhou, Z., Mu, Y., Zhao, N., Wu, Q.M.J., Yang, C.-N.: Coverless information hiding method based on multi-keywords. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10039, pp. 39–47. Springer, Cham (2016). doi:10.1007/978-3-319-48671-0_4 CrossRef Zhou, Z., Mu, Y., Zhao, N., Wu, Q.M.J., Yang, C.-N.: Coverless information hiding method based on multi-keywords. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10039, pp. 39–47. Springer, Cham (2016). doi:10.​1007/​978-3-319-48671-0_​4 CrossRef
13.
Zurück zum Zitat Zhang, J., Shen, J., Wang, L., Lin, H.: Coverless text information hiding method based on the word rank map. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10039, pp. 145–155. Springer, Cham (2016). doi:10.1007/978-3-319-48671-0_14 CrossRef Zhang, J., Shen, J., Wang, L., Lin, H.: Coverless text information hiding method based on the word rank map. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10039, pp. 145–155. Springer, Cham (2016). doi:10.​1007/​978-3-319-48671-0_​14 CrossRef
14.
Zurück zum Zitat Chen, X., Chen, S., Wu, Y.: Coverless information hiding method based on the chinese character encoding. J. Internet Technol. 18(2), 91–98 (2017) Chen, X., Chen, S., Wu, Y.: Coverless information hiding method based on the chinese character encoding. J. Internet Technol. 18(2), 91–98 (2017)
15.
Zurück zum Zitat Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 123–132. Springer, Cham (2015). doi:10.1007/978-3-319-27051-7_11 CrossRef Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 123–132. Springer, Cham (2015). doi:10.​1007/​978-3-319-27051-7_​11 CrossRef
16.
Zurück zum Zitat Zhou, Z., Cao, Y., Sun, X.: Coverless information hiding based on bag-of-words model of image. Electron. Inf. Eng. 527–536 (2016) Zhou, Z., Cao, Y., Sun, X.: Coverless information hiding based on bag-of-words model of image. Electron. Inf. Eng. 527–536 (2016)
17.
Zurück zum Zitat Yuan, C., Xia, Z., Sun, X.: Coverless image steganography based on SIFT and BOF. J. Internet Technol. 18(2), 209–216 (2017) Yuan, C., Xia, Z., Sun, X.: Coverless image steganography based on SIFT and BOF. J. Internet Technol. 18(2), 209–216 (2017)
18.
Zurück zum Zitat Lu, K.C.: Combination Mathematics, 2nd edn, pp. 16–18. Tsinghua University Press, Beijing (1991) Lu, K.C.: Combination Mathematics, 2nd edn, pp. 16–18. Tsinghua University Press, Beijing (1991)
19.
Zurück zum Zitat Sun, X., Huang, H., Wang, B., et al.: An algorithm of webpage information hiding based on equal tag. J. Comput. Res. Dev. 756–760 (2007) Sun, X., Huang, H., Wang, B., et al.: An algorithm of webpage information hiding based on equal tag. J. Comput. Res. Dev. 756–760 (2007)
20.
Zurück zum Zitat Zhao, H., Lin, G., Chen, S., et al.: Chinese character coding and redundancy analysis. J. Dongguan Univ. Technol. 39–44 (2012) Zhao, H., Lin, G., Chen, S., et al.: Chinese character coding and redundancy analysis. J. Dongguan Univ. Technol. 39–44 (2012)
Metadaten
Titel
Coverless Information Hiding Technology Research Based on News Aggregation
verfasst von
Conghua Liu
Gang Luo
Zuwei Tian
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-68505-2_14