Skip to main content
Erschienen in: Soft Computing 15/2019

05.06.2018 | Methodologies and Application

Text coverless information hiding based on compound and selection of words

verfasst von: Xianyi Chen, Sheng Chen

Erschienen in: Soft Computing | Ausgabe 15/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years, many researchers focus on the coverless information hiding because it realizes secret communication without modification by retrieving carriers including secret information (SI). However, the design of a coverless information hiding algorithm is very difficult, which mainly involves three aspects: (1) How to promote the efficiency of retrieving under the big data environment? (2) How to extract the SI in the received natural texts? (3) How to improve the hiding capacity (HC)? This paper proposes a novel text coverless information hiding algorithm based on the compound and selection of words, in which the reverse index is created to promote the efficiency of retrieving firstly. Then, Chinese characters are converted into binary numbers, which will serve as the location tags to determine the position of SI in the texts. Finally, combine the frequently used words and improve the HC according to the frequencies. The experimental results show that the proposed algorithm has a significant improvement in HC compared to the existing text coverless information hiding algorithms. In addition, the efficiency and security of the proposed algorithm are also proved.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Chapman M, Davida G (1997) Hiding the hidden: a software system for concealing ciphertext as innocuous text. Int Conf Inf Commun Secur 1334:335–345MATH Chapman M, Davida G (1997) Hiding the hidden: a software system for concealing ciphertext as innocuous text. Int Conf Inf Commun Secur 1334:335–345MATH
Zurück zum Zitat Chen X, Chen S, Wu Y (2017) Coverless information hiding method based on the Chinese character encoding. J Internet Technol 18(2):91–98 Chen X, Chen S, Wu Y (2017) Coverless information hiding method based on the Chinese character encoding. J Internet Technol 18(2):91–98
Zurück zum Zitat Chen X, Sun H, Tobe Y, Zhou Z, Sun X (2015) Coverless information hiding method based on the Chinese mathematical expression. In: 1st international conference on cloud computing and security. Springer International Publishing, Nanjing, China, pp 133–143 Chen X, Sun H, Tobe Y, Zhou Z, Sun X (2015) Coverless information hiding method based on the Chinese mathematical expression. In: 1st international conference on cloud computing and security. Springer International Publishing, Nanjing, China, pp 133–143
Zurück zum Zitat Clemens B, Regenbogen C, Koch K et al (2015) Modeling and extending the ensemble classifier for steganalysis of digital images using hypothesis testing theory. IEEE Trans Inf Forensics Secur 10(12):2627–2642CrossRef Clemens B, Regenbogen C, Koch K et al (2015) Modeling and extending the ensemble classifier for steganalysis of digital images using hypothesis testing theory. IEEE Trans Inf Forensics Secur 10(12):2627–2642CrossRef
Zurück zum Zitat Cogranne R, Retraint F (2013) An asymptotically uniformly most powerful test for LSB matching detection. IEEE Trans Inf Forensics Secur 8(3):464–476CrossRef Cogranne R, Retraint F (2013) An asymptotically uniformly most powerful test for LSB matching detection. IEEE Trans Inf Forensics Secur 8(3):464–476CrossRef
Zurück zum Zitat Cox I, Miller M (2002) The first 50 years of electronic watermarking. J Appl Signal Process 2002(2):126–132MATH Cox I, Miller M (2002) The first 50 years of electronic watermarking. J Appl Signal Process 2002(2):126–132MATH
Zurück zum Zitat Fu Z, Sun X, Ji S, Xie G (2016) Towards efficient content-aware search over encrypted outsourced data in cloud. In: Proceedings of the 35th annual IEEE international conference on computer communications (IEEE INFOCOM). IEEE INFOCOM, San Francisco, USA, pp 1–9 Fu Z, Sun X, Ji S, Xie G (2016) Towards efficient content-aware search over encrypted outsourced data in cloud. In: Proceedings of the 35th annual IEEE international conference on computer communications (IEEE INFOCOM). IEEE INFOCOM, San Francisco, USA, pp 1–9
Zurück zum Zitat Holub V, Fridrich J (2015) Low-Complexity Features for JPEG Steganalysis Using Undecimat-ed DCT [J]. IEEE Trans Inf Forensics Secur 10(2):219–228CrossRef Holub V, Fridrich J (2015) Low-Complexity Features for JPEG Steganalysis Using Undecimat-ed DCT [J]. IEEE Trans Inf Forensics Secur 10(2):219–228CrossRef
Zurück zum Zitat Huang D, Yan H (2001) Inter word distance changes represented by sine waves for watermarking text images. IEEE Trans Circuits Syst Video Technol 11(12):1237–1245CrossRef Huang D, Yan H (2001) Inter word distance changes represented by sine waves for watermarking text images. IEEE Trans Circuits Syst Video Technol 11(12):1237–1245CrossRef
Zurück zum Zitat Joshi S, Bokil A, Jain N et al (2012) Image steganography combination of spatial and frequency domain. Int J Comput Appl 53(5):25–29CrossRef Joshi S, Bokil A, Jain N et al (2012) Image steganography combination of spatial and frequency domain. Int J Comput Appl 53(5):25–29CrossRef
Zurück zum Zitat Katzenbeisser S, Petitcolas FA (2000) Information hiding techniques for steganography and digital watermarking, vol 18. Artech House, Norwood, pp 53–54 Katzenbeisser S, Petitcolas FA (2000) Information hiding techniques for steganography and digital watermarking, vol 18. Artech House, Norwood, pp 53–54
Zurück zum Zitat Lee Y, Chen L (2000) High capacity image steganographic model. IEE Proc Vis Image Signal Process 147(3):288–294CrossRef Lee Y, Chen L (2000) High capacity image steganographic model. IEE Proc Vis Image Signal Process 147(3):288–294CrossRef
Zurück zum Zitat Meng P, Huang L, Yang W (2009) Attacks on translation based steganography. In: 2009 IEEE youth conference on information, computing and telecommunication, Beijing, China, pp 227–230 Meng P, Huang L, Yang W (2009) Attacks on translation based steganography. In: 2009 IEEE youth conference on information, computing and telecommunication, Beijing, China, pp 227–230
Zurück zum Zitat Sun X, Chen H, Yang L, Tang Y (2002) Mathematical representation of a Chinese character and its applications. Int J Pattern Recognit Artif Intell 16(8):735–748CrossRef Sun X, Chen H, Yang L, Tang Y (2002) Mathematical representation of a Chinese character and its applications. Int J Pattern Recognit Artif Intell 16(8):735–748CrossRef
Zurück zum Zitat Thai T, Cogranne R, Retraint F (2014) Statistical model of quantized DCT coefficients: application in the steganalysis of Jsteg algorithm. IEEE Trans Image Process 23(5):1980–1993MathSciNetCrossRefMATH Thai T, Cogranne R, Retraint F (2014) Statistical model of quantized DCT coefficients: application in the steganalysis of Jsteg algorithm. IEEE Trans Image Process 23(5):1980–1993MathSciNetCrossRefMATH
Zurück zum Zitat The Chinese character Work Committee of the national language and writing committee, Frequency statistics of common Chinese characters in modern Chinese. Chinese Press (1989) The Chinese character Work Committee of the national language and writing committee, Frequency statistics of common Chinese characters in modern Chinese. Chinese Press (1989)
Zurück zum Zitat Wayner P (2009) Disappearing cryptography: information hiding: steganography & watermarking, 2nd edn. Morgan Kaufmann, San Francisco Wayner P (2009) Disappearing cryptography: information hiding: steganography & watermarking, 2nd edn. Morgan Kaufmann, San Francisco
Zurück zum Zitat Wu K, Wang C (2014) Steganography using reversible texture synthesis. IEEE Trans Image Process Publ IEEE Signal Process Soc 24(1):130–139MathSciNetMATH Wu K, Wang C (2014) Steganography using reversible texture synthesis. IEEE Trans Image Process Publ IEEE Signal Process Soc 24(1):130–139MathSciNetMATH
Zurück zum Zitat Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw 7(8):1283–1291CrossRef Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw 7(8):1283–1291CrossRef
Zurück zum Zitat Xia Z, Zhu Y, Sun X, Qin Z, Ren K (2015) Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans Cloud Comput PP(99):1–1 Xia Z, Zhu Y, Sun X, Qin Z, Ren K (2015) Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans Cloud Comput PP(99):1–1
Zurück zum Zitat Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016a) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947–1962 Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016a) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947–1962
Zurück zum Zitat Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016b) A privacy-preserving and copydeterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608 Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016b) A privacy-preserving and copydeterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608
Zurück zum Zitat Xia Z, Xiong N, Vasilakos A, Sun X (2017a) An efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf Sci 387:195–204 Xia Z, Xiong N, Vasilakos A, Sun X (2017a) An efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf Sci 387:195–204
Zurück zum Zitat Xia Z, Lv R, Zhu Y, Ji P, Sun H, Shi Y (2017b) Fingerprint liveness detection using gradient-based texture features. Signal Image Video Process 11(2):381–388 Xia Z, Lv R, Zhu Y, Ji P, Sun H, Shi Y (2017b) Fingerprint liveness detection using gradient-based texture features. Signal Image Video Process 11(2):381–388
Zurück zum Zitat Xiong L, Xu Z, Xu Y (2015) A secure re-encryption scheme for data services in a cloud computing environment. Concurr Comput Pract Exp 27(17):4573–4585CrossRef Xiong L, Xu Z, Xu Y (2015) A secure re-encryption scheme for data services in a cloud computing environment. Concurr Comput Pract Exp 27(17):4573–4585CrossRef
Zurück zum Zitat Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on SIFT and BOF without embeding. J Internet Technol 18(2):209–216 Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on SIFT and BOF without embeding. J Internet Technol 18(2):209–216
Zurück zum Zitat Zhou Z, Mu Y, Yang C, Zhao N (2016) Coverless multi-keywords information hiding method based on text. Int J Secur Appl 10(9):309–320 Zhou Z, Mu Y, Yang C, Zhao N (2016) Coverless multi-keywords information hiding method based on text. Int J Secur Appl 10(9):309–320
Zurück zum Zitat Zhou H, Chen K, Zhang W, Yu N (2017) Comments on steganography using reversible texture synthesis. IEEE Trans Image Process 26(4):1623MathSciNetCrossRefMATH Zhou H, Chen K, Zhang W, Yu N (2017) Comments on steganography using reversible texture synthesis. IEEE Trans Image Process 26(4):1623MathSciNetCrossRefMATH
Zurück zum Zitat Zhou Z, Sun H, Harit R, et al (2015) Coverless image steganography without embedding. In: 1st international conference on cloud computing and security, Springer International Publishing, Nanjing, China, pp 123–132 Zhou Z, Sun H, Harit R, et al (2015) Coverless image steganography without embedding. In: 1st international conference on cloud computing and security, Springer International Publishing, Nanjing, China, pp 123–132
Metadaten
Titel
Text coverless information hiding based on compound and selection of words
verfasst von
Xianyi Chen
Sheng Chen
Publikationsdatum
05.06.2018
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 15/2019
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-018-3286-7

Weitere Artikel der Ausgabe 15/2019

Soft Computing 15/2019 Zur Ausgabe