Skip to main content
Top

2017 | OriginalPaper | Chapter

Coverless Information Hiding Technology Research Based on News Aggregation

Authors : Conghua Liu, Gang Luo, Zuwei Tian

Published in: Cloud Computing and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper proposes a novel coverless information hiding method based on news aggregation. It converts the secret message M to a large integer N, and hides N in a news web by changing the order of news headlines. Experimental results and analysis show that this method is robust for any current steganalysis algorithm, and effective for stego-message delivery.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Shen, C., Zhang, H., Feng, D.: A survey of information security. Sci. China 37(2), 129–150 (2007) Shen, C., Zhang, H., Feng, D.: A survey of information security. Sci. China 37(2), 129–150 (2007)
2.
go back to reference Zhang, G., Yue, Y., Zhang, C.: Adaptive steganography algorithm of rapid wet paper code based on Hilbert. Comput. Eng. 39(7), 161–164 (2013) Zhang, G., Yue, Y., Zhang, C.: Adaptive steganography algorithm of rapid wet paper code based on Hilbert. Comput. Eng. 39(7), 161–164 (2013)
3.
go back to reference Budhia, U., Kundur, D., Zourntos, T.: Digital video steganalysis exploiting statistical visibilityin the temporal domain. IEEE Trans. Inf. Forensics Secur. 1(4), 502–516 (2006)CrossRef Budhia, U., Kundur, D., Zourntos, T.: Digital video steganalysis exploiting statistical visibilityin the temporal domain. IEEE Trans. Inf. Forensics Secur. 1(4), 502–516 (2006)CrossRef
4.
go back to reference Bai, Y., Bai, S., Liu, C.: Digital audio watermarking algorithm based on wavelet and cepstrum domain. Comput. Appl. Softw. 29(3), 163–167 (2012) Bai, Y., Bai, S., Liu, C.: Digital audio watermarking algorithm based on wavelet and cepstrum domain. Comput. Appl. Softw. 29(3), 163–167 (2012)
5.
go back to reference Fu, D., Chen, G., Yang, Q.: A covert communication method based on XML documents slicing. Comput. Appl. Softw. 28(9), 106–107 (2011) Fu, D., Chen, G., Yang, Q.: A covert communication method based on XML documents slicing. Comput. Appl. Softw. 28(9), 106–107 (2011)
6.
go back to reference Xia, Z., Wang, X., Sun, X., et al.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed. Tools Appl. 75(4), 1947–1962 (2016)CrossRef Xia, Z., Wang, X., Sun, X., et al.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed. Tools Appl. 75(4), 1947–1962 (2016)CrossRef
7.
go back to reference Xia, Z., Wang, X., Sun, X., et al.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014)CrossRef Xia, Z., Wang, X., Sun, X., et al.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014)CrossRef
8.
go back to reference Fu, Z., Ren, K., Shu, J., et al.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)CrossRef Fu, Z., Ren, K., Shu, J., et al.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)CrossRef
9.
go back to reference Fu, Z., Wu, X., Guan, C., et al.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)CrossRef Fu, Z., Wu, X., Guan, C., et al.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)CrossRef
10.
go back to reference Fu, Z., Sun, X., Liu, Q., et al.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98-B(1), 190–200 (2015)CrossRef Fu, Z., Sun, X., Liu, Q., et al.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98-B(1), 190–200 (2015)CrossRef
11.
go back to reference Chen, X., Sun, H., Tobe, Y., Zhou, Z., Sun, X.: Coverless information hiding method based on the chinese mathematical expression. In: Huang, Z., Sun, X., Luo, J., Wang, Jian (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 133–143. Springer, Cham (2015). doi:10.1007/978-3-319-27051-7_12 CrossRef Chen, X., Sun, H., Tobe, Y., Zhou, Z., Sun, X.: Coverless information hiding method based on the chinese mathematical expression. In: Huang, Z., Sun, X., Luo, J., Wang, Jian (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 133–143. Springer, Cham (2015). doi:10.​1007/​978-3-319-27051-7_​12 CrossRef
12.
go back to reference Zhou, Z., Mu, Y., Zhao, N., Wu, Q.M.J., Yang, C.-N.: Coverless information hiding method based on multi-keywords. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10039, pp. 39–47. Springer, Cham (2016). doi:10.1007/978-3-319-48671-0_4 CrossRef Zhou, Z., Mu, Y., Zhao, N., Wu, Q.M.J., Yang, C.-N.: Coverless information hiding method based on multi-keywords. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10039, pp. 39–47. Springer, Cham (2016). doi:10.​1007/​978-3-319-48671-0_​4 CrossRef
13.
go back to reference Zhang, J., Shen, J., Wang, L., Lin, H.: Coverless text information hiding method based on the word rank map. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10039, pp. 145–155. Springer, Cham (2016). doi:10.1007/978-3-319-48671-0_14 CrossRef Zhang, J., Shen, J., Wang, L., Lin, H.: Coverless text information hiding method based on the word rank map. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10039, pp. 145–155. Springer, Cham (2016). doi:10.​1007/​978-3-319-48671-0_​14 CrossRef
14.
go back to reference Chen, X., Chen, S., Wu, Y.: Coverless information hiding method based on the chinese character encoding. J. Internet Technol. 18(2), 91–98 (2017) Chen, X., Chen, S., Wu, Y.: Coverless information hiding method based on the chinese character encoding. J. Internet Technol. 18(2), 91–98 (2017)
15.
go back to reference Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 123–132. Springer, Cham (2015). doi:10.1007/978-3-319-27051-7_11 CrossRef Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 123–132. Springer, Cham (2015). doi:10.​1007/​978-3-319-27051-7_​11 CrossRef
16.
go back to reference Zhou, Z., Cao, Y., Sun, X.: Coverless information hiding based on bag-of-words model of image. Electron. Inf. Eng. 527–536 (2016) Zhou, Z., Cao, Y., Sun, X.: Coverless information hiding based on bag-of-words model of image. Electron. Inf. Eng. 527–536 (2016)
17.
go back to reference Yuan, C., Xia, Z., Sun, X.: Coverless image steganography based on SIFT and BOF. J. Internet Technol. 18(2), 209–216 (2017) Yuan, C., Xia, Z., Sun, X.: Coverless image steganography based on SIFT and BOF. J. Internet Technol. 18(2), 209–216 (2017)
18.
go back to reference Lu, K.C.: Combination Mathematics, 2nd edn, pp. 16–18. Tsinghua University Press, Beijing (1991) Lu, K.C.: Combination Mathematics, 2nd edn, pp. 16–18. Tsinghua University Press, Beijing (1991)
19.
go back to reference Sun, X., Huang, H., Wang, B., et al.: An algorithm of webpage information hiding based on equal tag. J. Comput. Res. Dev. 756–760 (2007) Sun, X., Huang, H., Wang, B., et al.: An algorithm of webpage information hiding based on equal tag. J. Comput. Res. Dev. 756–760 (2007)
20.
go back to reference Zhao, H., Lin, G., Chen, S., et al.: Chinese character coding and redundancy analysis. J. Dongguan Univ. Technol. 39–44 (2012) Zhao, H., Lin, G., Chen, S., et al.: Chinese character coding and redundancy analysis. J. Dongguan Univ. Technol. 39–44 (2012)
Metadata
Title
Coverless Information Hiding Technology Research Based on News Aggregation
Authors
Conghua Liu
Gang Luo
Zuwei Tian
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-68505-2_14

Premium Partner