Skip to main content
Top

2018 | OriginalPaper | Chapter

Text Semantic Steganalysis Based on Word Embedding

Authors : Xin Zuo, Huanhuan Hu, Weiming Zhang, Nenghai Yu

Published in: Cloud Computing and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Most state-of-the-art detection methods against synonym substitution based steganography extract features based on statistical distortion. However, synonym substitution will cause not only statistical distortion but also semantic distortion. In this paper, we propose word embedding feature (WEF) to detect the semantic distortion. Furthermore, a fused feature called word embedding and statistical feature set (WESF) which consists of WEF and statistical feature based on word frequency is designed to improve detection performance. Experiments show that WESF can achieve lower detection error rates compared with prmethods.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, New York (2009)CrossRef Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, New York (2009)CrossRef
4.
go back to reference Liu, Y., Sun, X., Liu, Y., Li, C.T.: MIMIC-PPT: Mimicking-based steganography for microsoft power point document. Inf. Technol. J. 7(4), 654–660 (2008)CrossRef Liu, Y., Sun, X., Liu, Y., Li, C.T.: MIMIC-PPT: Mimicking-based steganography for microsoft power point document. Inf. Technol. J. 7(4), 654–660 (2008)CrossRef
7.
go back to reference Yuling, L., Xingming, S., Can, G., Hong, W.: An efficient linguistic steganography for Chinese text. In: 2007 IEEE International Conference on Multimedia and Expo, pp. 2094–2097. IEEE (2007) Yuling, L., Xingming, S., Can, G., Hong, W.: An efficient linguistic steganography for Chinese text. In: 2007 IEEE International Conference on Multimedia and Expo, pp. 2094–2097. IEEE (2007)
8.
go back to reference Muhammad, H.Z., Rahman, S.M.S.A.A., Shakil, A.: Synonym based Malay linguistic text steganography. In: Innovative Technologies in Intelligent Systems and Industrial Applications, CITISIA 2009, pp. 423–427. IEEE (2009) Muhammad, H.Z., Rahman, S.M.S.A.A., Shakil, A.: Synonym based Malay linguistic text steganography. In: Innovative Technologies in Intelligent Systems and Industrial Applications, CITISIA 2009, pp. 423–427. IEEE (2009)
9.
go back to reference Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A new synonym text steganography. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2008, pp. 1524–1526. IEEE (2008) Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A new synonym text steganography. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2008, pp. 1524–1526. IEEE (2008)
10.
go back to reference Wilson, A., Ker, A.D.: Avoiding detection on twitter: embedding strategies for linguistic steganography. Electron. Imaging 2016(8), 1–9 (2016)CrossRef Wilson, A., Ker, A.D.: Avoiding detection on twitter: embedding strategies for linguistic steganography. Electron. Imaging 2016(8), 1–9 (2016)CrossRef
12.
go back to reference Wilson, A., Blunsom, P., Ker, A.D.: Linguistic steganography on twitter: hierarchical language modeling with manual interaction. In: IS&T/SPIE Electronic Imaging, p. 902803. International Society for Optics and Photonics (2014) Wilson, A., Blunsom, P., Ker, A.D.: Linguistic steganography on twitter: hierarchical language modeling with manual interaction. In: IS&T/SPIE Electronic Imaging, p. 902803. International Society for Optics and Photonics (2014)
13.
go back to reference Taskiran, C.M., Topkara, U., Topkara, M., Delp, E.J.: Attacks on lexical natural language steganography systems. In: Electronic Imaging 2006, p. 607209. International Society for Optics and Photonics (2006) Taskiran, C.M., Topkara, U., Topkara, M., Delp, E.J.: Attacks on lexical natural language steganography systems. In: Electronic Imaging 2006, p. 607209. International Society for Optics and Photonics (2006)
14.
go back to reference Yu, Z., Huang, L., Chen, Z., Li, L., Zhao, X., Zhu, Y.: Detection of synonym-substitution modified articles using context information. In: Second International Conference on Future Generation Communication and Networking, FGCN 2008, vol. 1, pp. 134–139. IEEE (2008) Yu, Z., Huang, L., Chen, Z., Li, L., Zhao, X., Zhu, Y.: Detection of synonym-substitution modified articles using context information. In: Second International Conference on Future Generation Communication and Networking, FGCN 2008, vol. 1, pp. 134–139. IEEE (2008)
15.
go back to reference Chen, Z., Huang, L., Miao, H., Yang, W., Meng, P.: Steganalysis against substitution-based linguistic steganography based on context clusters. Comput. Electr. Eng. 37(6), 1071–1081 (2011)CrossRef Chen, Z., Huang, L., Miao, H., Yang, W., Meng, P.: Steganalysis against substitution-based linguistic steganography based on context clusters. Comput. Electr. Eng. 37(6), 1071–1081 (2011)CrossRef
16.
go back to reference Xiang, L., Sun, X., Luo, G., Xia, B.: Linguistic steganalysis using the features derived from synonym frequency. Multimed. Tools Appl. 71(3), 1893–1911 (2014)CrossRef Xiang, L., Sun, X., Luo, G., Xia, B.: Linguistic steganalysis using the features derived from synonym frequency. Multimed. Tools Appl. 71(3), 1893–1911 (2014)CrossRef
17.
go back to reference Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013) Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:​1301.​3781 (2013)
18.
go back to reference Joulin, A., Grave, E., Bojanowski, P., Mikolov, T.: Bag of tricks for efficient text classification. arXiv preprint arXiv:1607.01759 (2016) Joulin, A., Grave, E., Bojanowski, P., Mikolov, T.: Bag of tricks for efficient text classification. arXiv preprint arXiv:​1607.​01759 (2016)
19.
go back to reference Ji, S., Yun, H., Yanardag, P., Matsushima, S., Vishwanathan, S.: WordRank: Learning word embeddings via robust ranking. arXiv preprint arXiv:1506.02761 (2015) Ji, S., Yun, H., Yanardag, P., Matsushima, S., Vishwanathan, S.: WordRank: Learning word embeddings via robust ranking. arXiv preprint arXiv:​1506.​02761 (2015)
20.
go back to reference Miller, G.A.: Wordnet: a lexical database for English. Commun. ACM 38(11), 39–41 (1995)CrossRef Miller, G.A.: Wordnet: a lexical database for English. Commun. ACM 38(11), 39–41 (1995)CrossRef
21.
go back to reference Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273–297 (1995)MATH Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273–297 (1995)MATH
Metadata
Title
Text Semantic Steganalysis Based on Word Embedding
Authors
Xin Zuo
Huanhuan Hu
Weiming Zhang
Nenghai Yu
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00015-8_42

Premium Partner