Abstract
With the continuous development of modern network technology and data informatization, information security has been paid more and more attention by the society, and coverless information hiding has been becoming a new and important research field of information security. At present, the capacity of text coverless information hiding is very limited, generally 3–4 words per text. In order to increase the capacity of text coverless information hiding, this paper proposed a novel method of text coverless information hiding. In this method, the punctuation combination modified by Morse code is combined with the use of starter, list and loop statement to realize the hiding of a number of words in a normal text without modified. The experiments’ results show that this new method can hide more words and express all the words composed of representable characters.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Luo, Y., Huang, Y.: Text steganography with high embedding rate: using recurrent neural networks to generate Chinese classic poetry. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pp. 99–104. Association for Computing Machinery, New York (2017)
Huang, Y., Tang, S., Yuan, J.: Steganography in inactive frames of VoIP streams en-coded by source code. IEEE Trans. Inf. Forensics Secur. 6(2), 296–306 (2011)
Huang, Y., Liu, C., Tang, S., Bai, S.: Steganography integration into a low-bit rate speech codec. IEEE Trans. Inf. Forensics Secur. 7(6), 1865–1875 (2012)
Xiao, B., Huang, Y.: Modeling and optimizing of the information hiding communication system over streaming media. J. Xidian Univ. 35(3), 554–558 (2008)
Chen, X., Chen, S., Wu, Y.: Coverless information hiding method based on the Chinese character encoding. J. Internet Technol. 18(2), 313–320 (2017)
Zhou, Z., Mu, Y., Zhao, N., Wu, Q.M.J., Yang, C.-N.: Coverless information hiding method based on multi-keywords. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10039, pp. 39–47. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-48671-0_4
Fu, Z., Ji, H., Ding, Y.: Label model based coverless information hiding method. J. Internet Technol. 19(5), 1509–1514 (2018)
Liu, Y., Wu, J., Xin, G.: Multi-keywords carrier-free text steganography method based on Chinese Pinyin. Int. J. Comput. Sci. Eng. 21(2), 202 (2020)
Zhou, X., Chen, X., Zhang, F., Zheng, N.: A novel coverless text information hiding method based on double-tags and twice-send. Int. J. Comput. Sci. Eng. 21(1), 116–124 (2020)
Xiang, L., Yang, S., Liu, Y., Li, Q., Zhu, C.: Novel linguistic steganography based on character-level text generation. Mathematics 8, 1558 (2020)
Zhang, J., Shen, J., Wang, L., Lin, H.: Coverless text information hiding method based on the word rank map. J. Internet Technol. 18(2), 427–434 (2017)
Xia, Z., Li, X.: Coverless information hiding method based on LSB of the character’s unicode. J. Internet Technol. 18(6), 1353–1360 (2017)
Acknowledgments
This research was funded by the National Natural Science Foundation of China (No. 61304208), Scientific Research Fund of Hunan Province Education Department (18C0003), Research project on teaching reform in colleges and universities of Hunan Province Education Department (20190147), Changsha City Science and Technology Plan Program (K1501013-11), Hunan Normal University University-Industry Cooperation. This work is implemented at the 2011 Collaborative Innovation Center for Development and Utilization of Finance and Economics Big Data Property, Universities of Hunan Province, Open project, grant number 20181901CRP04.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Wen, Y., Zhang, J., Xia, Y., Lin, H., Sun, G. (2021). Coverless Information Hiding Method Based on Combination Morse Code and Double Cycle Application of Starter. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2021. Communications in Computer and Information Science, vol 1423. Springer, Cham. https://doi.org/10.1007/978-3-030-78618-2_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-78618-2_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78617-5
Online ISBN: 978-3-030-78618-2
eBook Packages: Computer ScienceComputer Science (R0)