Abstract
The attackers may discover the existence of the secret information or even get it by analyzing the cover’s statistical characteristics, changes of which often occur due to the embedding. In this paper, a novel coverless text information hiding method was proposed. By using the words rank map and the frequent words distance, normal texts containing the secret information could be retrieved from the text database, and will be sent to the receiver without any modification. Because the embedding is not needed, the proposed method could be able to escape from almost all state-of-the-art steganalysis methods.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Fridrich, J.: Steganography in Digital Media – Principle, Algorithms, and Application. National Defense Industry Press, Beijing (2014)
Por, L.Y., Ang, T.F., Delina, B.: WhiteSteg: a new scheme in information hiding using text steganography. WSEAS Trans. Comput. 7(6), 735–745 (2008)
Xia, Z., Lv, R., Zhu, Y., Ji, P., Sun, H., Shi, Y.: Fingerprint liveness detection using gradient-based texture features. Sig. Image Video Process. 11(2), 381–388 (2017)
Huang, L., Tseng, L., Hwang, M.: The study on data hiding in medical images. Int. J. Netw. Secur. 14(6), 301–309 (2012)
Wang, S., Xiao, C., Lin, Y.: A high bitrate information hiding algorithm for video in video. In. J. Comput. Electr. Autom. Control Inf. Eng. 3(11), 2572–2577 (2009)
Liu, T.Y., Tsai, W.H.: A new steganographic method for data hiding in microsoft word documents by a change tracking technique. IEEE Trans. Inf. Forensics Secur. 2(1), 24–30 (2007)
Zhou, Z., Wang, Y., Wu, Q.M.J., Yang, C., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. (2016). doi:10.1109/TIFS.2016.2601065
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2016)
Zhang, J., Shen, J., Wang, L., Lin, H.: Coverless text information hiding method based on the word rank map. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10039, pp. 145–155. Springer, Cham (2016). doi:10.1007/978-3-319-48671-0_14
Low, S.H., Maxemchuk, N.F., Brassil, J.T.: Document marking and identification using both line and word shifting. In: Proceedings of INFOCOM 1995, vol. 2007, pp. 853–860. IEEE (1995)
Low, S.H., Maxemchuk, N.F., Lapone, A.M.: Document identification for copyright protection using centroid detection. IEEE Trans. Commun. 46(3), 372–383 (1998)
Brassil, J.T., Low, S.H., Maxemchuk, N.F.: Copyright protection for the electronic distribution of text documents. Proc. IEEE 87, 1181–1196 (1999)
Bo, S., Hu, Z., Wu, L., Zhou, H.: Steganography of Telecommunication Information. National Defense University, Beijing (2005)
Meng, P., Huang, L., Chen, Z., Yang, W., Yang, M.: Analysis and detection of translation based steganography. Acta Electronica Sinica 38(8), 1748–1852 (2012)
Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 123–132. Springer, Cham (2015). doi:10.1007/978-3-319-27051-7_11
Chen, X., Sun, H., Tobe, Y., Zhou, Z., Sun, X.: Coverless information hiding method based on the Chinese mathematical expression. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 133–143. Springer, Cham (2015). doi:10.1007/978-3-319-27051-7_12
Chen, X., Chen, S., Wu, Y.: Coverless information hiding method based on the Chinese character encoding. J. Int. Technol. 18(2), 313–320 (2017)
Zhou, Z., Mu, Y., Yang, C., Zhao, N.: Coverless multi-keywords information hiding method based on text. Int. J. Secur. Its Appl. 10(9), 309–320 (2016)
Yuan, C., Xia, Z., Sun, X.: Coverless image steganography based on SIFT and BOF. J. Int. Technol. 18(2), 435–442 (2017)
Sun, H., Grishman, R., Wang, Y.: Active learning based named entity recognition and its application in natural language coverless information hiding. J. Int. Technol. 18(2), 443–451 (2017)
Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75(4), 1–16 (2014)
Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998). doi:10.1007/3-540-49380-8_21
Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers, Boston (1999)
Petitcolas, F.A., Anderson, R., Kuhn, M.: Information hiding - a survey. Proc. IEEE 87(7), 1062–1078 (1999)
Zhang, J., Lin, H., Wang, L.: Coverless text information hiding method based on the rank map. J. Int. Technol. 18(2), 427–434 (2017)
Fu, Z., Huang, F., Sun, X., Vasilakos, Athanasios V., Yang, C.: Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Serv. Comput. (2016). doi:10.1109/TSC.2016.2622697
Fu, Z., Sun, X., Ji, S., Xie, G.: Towards efficient content-aware search over encrypted outsourced data in cloud. In: Proceedings of the 35th Annual IEEE International Conference on Computer Communications (IEEE INFOCOM), San Francisco, CA (2016). doi:10.1109/INFOCOM.2016.7524606
Acknowledgments
This work is supported by National Natural Science Foundation of China (61304208), Open Fund of Demonstration Base of Internet Application Innovative Open Platform of Department of Education (KJRP1402), Open Fund of China-USA Computer Science Research Center (KJR16239), Hunan Province Science And Technology Plan Project Fund (2012GK3120), Scientific Research Fund of Hunan Province Education Department (13CY003, 14B106), Changsha City Science and Technology Plan Program (K1501013-11), Hunan Normal University University-Industry Cooperation.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Zhang, J., Xie, Y., Wang, L., Lin, H. (2017). Coverless Text Information Hiding Method Using the Frequent Words Distance. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10602. Springer, Cham. https://doi.org/10.1007/978-3-319-68505-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-68505-2_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68504-5
Online ISBN: 978-3-319-68505-2
eBook Packages: Computer ScienceComputer Science (R0)