Skip to main content
Top

2018 | OriginalPaper | Chapter

RITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue Model

Authors : Zhongliang Yang, Pengyu Zhang, Minyu Jiang, Yongfeng Huang, Yu-Jin Zhang

Published in: Cloud Computing and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Steganography based on texts has always been a hot but extremely hard research topic. Due to the high coding characteristics of the text compared to other information carriers, the redundancy of information is very low, which makes it really difficult to hide information inside. In this paper, combined with the recurrent neural network (RNN) and reinforcement learning (RL), we designed and implemented a real-time interactive text steganography model (RITS). The proposed model can automatically generate semantically coherent and syntactically correct dialogues based on the input sentence, through the reasonable encoding of the text in the dialog generation process to realize secret information hiding and transmission. We trained our model using publicly collected datasets which contains 5808 dialogues and evaluated the proposed model from several perspectives. Experimental results show that the proposed model can be very efficient to implement the embedding and extraction of information. The generated dialogue texts are of high quality which shows high concealment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kipper, G.: Investigator’s Guide to Steganography. CRC Press, Inc., Boca Raton (2003)CrossRef Kipper, G.: Investigator’s Guide to Steganography. CRC Press, Inc., Boca Raton (2003)CrossRef
3.
go back to reference Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Sig. Process. 66, 385–403 (1998)CrossRef Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Sig. Process. 66, 385–403 (1998)CrossRef
4.
go back to reference Peng, X., Huang, Y., Li, F.: A steganography scheme in a low-bit rate speech codec based on 3D-sudoku matrix. In: IEEE International Conference on Communication Software and Networks, pp. 13–18 (2016) Peng, X., Huang, Y., Li, F.: A steganography scheme in a low-bit rate speech codec based on 3D-sudoku matrix. In: IEEE International Conference on Communication Software and Networks, pp. 13–18 (2016)
5.
go back to reference Avcibas, I.: Audio steganalysis with content-independent distortion measures. IEEE Sig. Process. Lett. 13(2), 92–95 (2006)CrossRef Avcibas, I.: Audio steganalysis with content-independent distortion measures. IEEE Sig. Process. Lett. 13(2), 92–95 (2006)CrossRef
6.
go back to reference Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A new approach to Persian/Arabic text steganography. In: IEEE/ACIS International Conference on Computer and Information Science and IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse, pp. 310–315 (2006) Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A new approach to Persian/Arabic text steganography. In: IEEE/ACIS International Conference on Computer and Information Science and IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse, pp. 310–315 (2006)
7.
go back to reference Majumder, A., Changder, S.: A novel approach for text steganography: generating text summary using reflection symmetry. Procedia Technol. 10(10), 112–120 (2013)CrossRef Majumder, A., Changder, S.: A novel approach for text steganography: generating text summary using reflection symmetry. Procedia Technol. 10(10), 112–120 (2013)CrossRef
8.
go back to reference Cox, I.J., Miller, M.L.: The first 50 years of electronic watermarking. Eurasip J. Adv. Signal Process. 2002(2), 1–7 (2001)MATH Cox, I.J., Miller, M.L.: The first 50 years of electronic watermarking. Eurasip J. Adv. Signal Process. 2002(2), 1–7 (2001)MATH
9.
go back to reference Zou, D., Shi, Y.Q.: Formatted text document data hiding robust to printing, copying and scanning. In: IEEE International Symposium on Circuits and Systems, vol. 5, pp. 4971–4974 (2005) Zou, D., Shi, Y.Q.: Formatted text document data hiding robust to printing, copying and scanning. In: IEEE International Symposium on Circuits and Systems, vol. 5, pp. 4971–4974 (2005)
10.
go back to reference Bennett, K.: Linguistic steganography: survey, analysis, and robustness concerns for hiding information in text (2004) Bennett, K.: Linguistic steganography: survey, analysis, and robustness concerns for hiding information in text (2004)
11.
go back to reference Chotikakamthorn, N.: Electronic document data hiding technique using inter-character space. In: The 1998 IEEE Asia-Pacific Conference on Circuits and Systems, IEEE APCCAS 1998, pp. 419–422 (1998) Chotikakamthorn, N.: Electronic document data hiding technique using inter-character space. In: The 1998 IEEE Asia-Pacific Conference on Circuits and Systems, IEEE APCCAS 1998, pp. 419–422 (1998)
12.
go back to reference Low, S.H., Maxemchuk, N.F., Lapone, A.M.: Document identification for copyright protection using centroid detection. IEEE Trans. Commun. 46(3), 372–383 (1998)CrossRef Low, S.H., Maxemchuk, N.F., Lapone, A.M.: Document identification for copyright protection using centroid detection. IEEE Trans. Commun. 46(3), 372–383 (1998)CrossRef
13.
go back to reference Desoky, A.: Comprehensive linguistic steganography survey. Int. J. Inf. Comput. Secur. 4(2), 164–197 (2010) Desoky, A.: Comprehensive linguistic steganography survey. Int. J. Inf. Comput. Secur. 4(2), 164–197 (2010)
17.
go back to reference Ge, X., Jiao, R., Tian, H., Wang, J.: Research on information hiding. US-China Educ. Rev. 3(5), 77–81 (2006) Ge, X., Jiao, R., Tian, H., Wang, J.: Research on information hiding. US-China Educ. Rev. 3(5), 77–81 (2006)
18.
go back to reference Luo, Y., Huang, Y., Li, F., Chang, C.: Text steganography based on CI-poetry generation using Markov Chain model. KSII Trans. Internet Inf. Syst. 10, 4568–4584 (2016) Luo, Y., Huang, Y., Li, F., Chang, C.: Text steganography based on CI-poetry generation using Markov Chain model. KSII Trans. Internet Inf. Syst. 10, 4568–4584 (2016)
19.
go back to reference Shang, L., Lu, Z., Li, H.: Neural responding machine for short-text conversation, pp. 52–58 (2015) Shang, L., Lu, Z., Li, H.: Neural responding machine for short-text conversation, pp. 52–58 (2015)
20.
go back to reference Pascual, B., Gurruchaga, M., Ginebra, M.P., Gil, F.J., Planell, J.A., Goñ, I.: A neural network approach to context-sensitive generation of conversational responses. Trans. R. Soc. Trop. Med. Hyg. 51(6), 502–504 (2015) Pascual, B., Gurruchaga, M., Ginebra, M.P., Gil, F.J., Planell, J.A., Goñ, I.: A neural network approach to context-sensitive generation of conversational responses. Trans. R. Soc. Trop. Med. Hyg. 51(6), 502–504 (2015)
21.
go back to reference Lewis, M., Yarats, D., Dauphin, Y.N., Parikh, D., Batra, D.: Deal or no deal? End-to-end learning for negotiation dialogues (2017) Lewis, M., Yarats, D., Dauphin, Y.N., Parikh, D., Batra, D.: Deal or no deal? End-to-end learning for negotiation dialogues (2017)
22.
go back to reference Hochreiter, S.: The vanishing gradient problem during learning recurrent neural nets and problem solutions. Int. J. Uncertain., Fuzziness Knowl.-Based Syst. 06(02), 107–116 (1998)CrossRef Hochreiter, S.: The vanishing gradient problem during learning recurrent neural nets and problem solutions. Int. J. Uncertain., Fuzziness Knowl.-Based Syst. 06(02), 107–116 (1998)CrossRef
23.
go back to reference Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)CrossRef Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)CrossRef
24.
go back to reference Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate. Comput. Sci. (2014) Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate. Comput. Sci. (2014)
25.
go back to reference Williams, R.J.: Simple statistical gradient-following algorithms for connectionist reinforcement learning. Mach. Learn. 8(3–4), 229–256 (1992)MATH Williams, R.J.: Simple statistical gradient-following algorithms for connectionist reinforcement learning. Mach. Learn. 8(3–4), 229–256 (1992)MATH
Metadata
Title
RITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue Model
Authors
Zhongliang Yang
Pengyu Zhang
Minyu Jiang
Yongfeng Huang
Yu-Jin Zhang
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00012-7_24

Premium Partner