Abstract
As a new information hiding method, coverless information hiding has become a hot issue in the field of information security. The existing coverless information hiding method has realized that one Chinese character can be hidden in one natural text. However, the problem of the method is that the hiding capacity is too small. To address this problem, a novel method named coverless information hiding method based on multi-keywords is proposed in this paper. The main idea of the method is that the number of keywords will be hidden in the text where keywords have been hidden. Experimental results show that the proposed method can improve the capacity of information hiding in text.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fu, Z., Ren, K., Shu, J., Sun, X.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 1 (2015)
Cox, I., Miller, M.: The first 50 years of electronic watermarking. J. Appl. Sig. Process. 2002(2), 126–132 (2002)
Maxemchuk, N.: Electronic document distribution. At & T Tech. J. 73(5), 73–80 (1994)
Brassil, J., Low, S., Maxemchuk, N., O’Gorman, L.: Electronic marking and identification techniques to discourage document copying. IEEE J. Sel. Areas Commun. 13(8), 1495–1504 (1995)
Low, S., Maxemchuk, N., Brassil, J., O’Gorman, L.: Document marking and identification using both line and word shifting. In: Proceedings of the 14th Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 853–853. IEEE, April 1995
Brassil, J., Low, S., Maxemchuk, N., O’Gorman, L.: Electronic marking and identification techniques to discourage document copying. IEEE J. Sel. Areas Commun. 13(8), 1495–1504 (1995)
Low, S., Maxemchuk, N., Lapone, A.: Document identification for copyright protection using centroid detection. IEEE Trans. Commun. 46(3), 372–383 (1998)
Low, S., Maxemchuk, N.: Performance comparison of two text marking methods. IEEE J. Sel. Areas Commun. 16(4), 561–572 (1998)
Brassil, J., Low, S., Maxemchuk, N.: Copyright protection for the electronic distribution of text documents. Proc. IEEE 87(7), 1181–1196 (1999)
Xia, Z., Wang, X., Sun, X., Wang, B.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014)
Mielikainen, J.: LSB matching revisited. IEEE Sig. Process. Lett. 13(5), 285–287 (2006)
Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75(4), 1–16 (2014)
Li, Z., Chen, X., Pan, X., Zheng, X.: Lossless data hiding scheme based on adjacent pixel difference. In: International Conference Computer Engineering and Technology, vol. 1, pp. 588–592. IEEE Computer Society, January 2009
Li, X., Wang, J.: A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf. Sci. Int. J. 177(15), 3099–3109 (2007)
Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Huang, Z., et al. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 123–132. Springer, Heidelberg (2015). doi:10.1007/978-3-319-27051-7_11
Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98.B(1), 190–200 (2015)
Shahrokh, H., Mosayeb, N.: A novel LSB based quantum watermarking. Int. J. Theor. Phys. 55(10), 1–14 (2016)
Chen, X., Sun, H., Tobe, Y., Zhou, Z., Sun, X.: Coverless information hiding method based on the chinese mathematical expression. In: Huang, Z., et al. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 133–143. Springer, Heidelberg (2015). doi:10.1007/978-3-319-27051-7_12
Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2015)
Duric, Z., Jacobs, M., Jajodia, S.: Information hiding: steganography and steganalysis. Handb. Stat. 24, 171–187 (2005)
Sun, X., Chen, H., Yang, L., Tang, Y.: Mathematical representation of a Chinese character and its applications. Int. J. Pattern Recognit. Artif. Intell. 16(6), 735–748 (2011)
Liu, Y., Sun, X., Cox, I.J., Wang, H.: Natural language information hiding based on Chinese mathematical expression. Int. J. Netw. Secur. 8(1), 10–15 (2009)
Sogou Labs. http://download.labs.sogou.com/
Acknowledgments
This work was supported in part by the National Natural Science Foundation of China under Grant 61602253, Grant U1536206, Grant 61232016, Grant U1405254, Grant 61373133, Grant 61502242, and Grant 61572258, in part by the Jiangsu Basic Research Programs-Natural Science Foundation under Grant BK20150925,BK20151530 in part by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund, in part by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) fund, and in part by College Students Practice Innovation Training Program under Grant 201610300022, China.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Zhou, Z., Mu, Y., Zhao, N., Wu, Q.M.J., Yang, CN. (2016). Coverless Information Hiding Method Based on Multi-keywords. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10039. Springer, Cham. https://doi.org/10.1007/978-3-319-48671-0_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-48671-0_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48670-3
Online ISBN: 978-3-319-48671-0
eBook Packages: Computer ScienceComputer Science (R0)