Skip to main content

Coverless Information Hiding Method Based on Combination Morse Code and Double Cycle Application of Starter

  • Conference paper
  • First Online:
Advances in Artificial Intelligence and Security (ICAIS 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1423))

Included in the following conference series:

Abstract

With the continuous development of modern network technology and data informatization, information security has been paid more and more attention by the society, and coverless information hiding has been becoming a new and important research field of information security. At present, the capacity of text coverless information hiding is very limited, generally 3–4 words per text. In order to increase the capacity of text coverless information hiding, this paper proposed a novel method of text coverless information hiding. In this method, the punctuation combination modified by Morse code is combined with the use of starter, list and loop statement to realize the hiding of a number of words in a normal text without modified. The experiments’ results show that this new method can hide more words and express all the words composed of representable characters.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Luo, Y., Huang, Y.: Text steganography with high embedding rate: using recurrent neural networks to generate Chinese classic poetry. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pp. 99–104. Association for Computing Machinery, New York (2017)

    Google Scholar 

  2. Huang, Y., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams en-coded by source code. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)

    Article  Google Scholar 

  3. Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865–1875 (2012)

    Article  Google Scholar 

  4. Xiao, B., Huang, Y.: Modeling and optimizing of the information hiding communication system over streaming media. J. Xidian Univ. 35(3), 554–558 (2008)

    Google Scholar 

  5. Chen, X., Chen, S., Wu, Y.: Coverless information hiding method based on the Chinese character encoding. J. Internet Technol. 18(2), 313–320 (2017)

    Google Scholar 

  6. Zhou, Z., Mu, Y., Zhao, N., Wu, Q.M.J., Yang, C.-N.: Coverless information hiding method based on multi-keywords. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10039, pp. 39–47. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-48671-0_4

    Chapter  Google Scholar 

  7. Fu, Z., Ji, H., Ding, Y.: Label model based coverless information hiding method. J. Internet Technol. 19(5), 1509–1514 (2018)

    Google Scholar 

  8. Liu, Y., Wu, J., Xin, G.: Multi-keywords carrier-free text steganography method based on Chinese Pinyin. Int. J. Comput. Sci. Eng. 21(2), 202 (2020)

    Google Scholar 

  9. Zhou, X., Chen, X., Zhang, F., Zheng, N.: A novel coverless text information hiding method based on double-tags and twice-send. Int. J. Comput. Sci. Eng. 21(1), 116–124 (2020)

    Google Scholar 

  10. Xiang, L., Yang, S., Liu, Y., Li, Q., Zhu, C.: Novel linguistic steganography based on character-level text generation. Mathematics 8, 1558 (2020)

    Article  Google Scholar 

  11. Zhang, J., Shen, J., Wang, L., Lin, H.: Coverless text information hiding method based on the word rank map. J. Internet Technol. 18(2), 427–434 (2017)

    Google Scholar 

  12. Xia, Z., Li, X.: Coverless information hiding method based on LSB of the character’s unicode. J. Internet Technol. 18(6), 1353–1360 (2017)

    Google Scholar 

Download references

Acknowledgments

This research was funded by the National Natural Science Foundation of China (No. 61304208), Scientific Research Fund of Hunan Province Education Department (18C0003), Research project on teaching reform in colleges and universities of Hunan Province Education Department (20190147), Changsha City Science and Technology Plan Program (K1501013-11), Hunan Normal University University-Industry Cooperation. This work is implemented at the 2011 Collaborative Innovation Center for Development and Utilization of Finance and Economics Big Data Property, Universities of Hunan Province, Open project, grant number 20181901CRP04.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wen, Y., Zhang, J., Xia, Y., Lin, H., Sun, G. (2021). Coverless Information Hiding Method Based on Combination Morse Code and Double Cycle Application of Starter. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2021. Communications in Computer and Information Science, vol 1423. Springer, Cham. https://doi.org/10.1007/978-3-030-78618-2_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78618-2_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78617-5

  • Online ISBN: 978-3-030-78618-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics