Abstract
Text information hiding has attracted the attention of many scholars and made a lot of achievements. However, for the text information hiding methods such as text format-based, generation method-based, text image-based and so on, there is a major flaw that cannot resist steganography detection. Based on the rank map of the words, a novel method of coverless text information hiding is presented. Firstly, stego-vectors are directly generated from the secret message by using the rank map. Then, some normal texts, stego-texts including the generated sgeto-vectors, will be searched form the text big data. Finally, the secret information can be sent to the receiver without any modification of the stego-texts. The proposed algorithm has a higher theoretical significance and practice value because it is robust for almost all current steganalysis methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Liu, T.Y., Tsai, W.H.: A new steganographic method for data hiding in microsoft word documents by a change tracking technique. IEEE Trans. Inf. Forensics Secur. 2(1), 24–30 (2007)
Maxemchuk, N.F., Liu, T.Y., Tsai, W.H.: Electronic document distribution. AT&T Tech. J. 73(5), 73–80 (1994)
Low, S.H., Maxemchuk, N.F., Brassil, J.T.: Document marking and identification using both line and word shifting. In: Proceedings of Infocom 1995, vol. 2007, pp. 853–860. IEEE (1995)
Brassil, J.T., Low, S.H., Maxemchuk, N.F.: Electronic marking and identification techniques to discourage document copying. IEEE J. Sel. Areas Commun. 13(8), 1495–1504 (1995)
Low, S.H., Maxemchuk, N.F., Lapone, A.M.: Document identification for copyright protection using centroid detection. IEEE Trans. Commun. 46(3), 372–383 (1998)
Low, S.H., Maxemchuk, N.F.: Performance comparison of two text marking methods. IEEE J. Sel. Areas Commun. 16(4), 561–572 (1998)
Brassil, J.T., Low, S.H., Maxemchuk, N.F.: Copyright protection for the electronic distribution of text documents. In: Proceedings of the IEEE, vol. 87, pp. 1181–1196 (1999)
Huang, D., Yan, H.: Inter word distance changes represented by sine waves for watermarking text images. IEEE Trans. Circ. Syst. 11(12), 1237–1245 (2001)
Adnan, M.A., Osama, M.A.: Watermarking electronic text documents containing justified paragraphs and irregular line spacing. In: Proceedings of the SPIE, pp. 685–695 (2004)
Kim, Y.W., Moon, K.A., Oh I.S.: A text watermarking algorithm based on word classification and inter word space statistics. In: Proceedings of Seventh International Conference on Document Analysis and Recognition, pp. 775–779 (2003)
Xie, L., Huang, H., Qin, J.: A Text similarity detection algorithm based on components interconnected graph. In: Proceedings of 2015 China Information Hiding and Multimedia Security Workshop (CIHW2015), pp. 251–260 (2015)
Por, L.Y., Ang, T.F., Delina, B.: WhiteSteg: a new Scheme in information hiding using text steganography. WSEAS Trans. Comput. 7(6), 735–745 (2008)
Lee, I.S., Tsai, W.H.: Secret communication through web pages using special space codes in HTML files. Int. J. Appl. Sci. Eng. 6(2), 141–149 (2008)
Bender, W., Gruhl, D., Morimoto, N.: Techniques for data hiding. IBM Syst. J. 35(34), 313–336 (1996)
Takizawa, O., Makino, K., Matsumoto, T., Nakagawa, H., Murase, I.: Method of hiding information in agglutinative language documents using adjustment to new line positions. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3683, pp. 1039–1048. Springer, Heidelberg (2005)
Koluguri, A., Gouse, S., Reddy, P.B.: Text steganography methods and its tools. Int. J. Adv. Sci. Tech. Res. 2(4), 888–902 (2014)
Goyal, L., Raman, M., Diwan, P.: A robust method for integrity protection of digital data in text document watermarking. Int. J. Sci. Res. Dev. 1(6), 14–18 (2014)
Sui, X.G., Luo, H.: A steganalysis method based on the distribution of space characters. In: Proceedings of IEEE International Conference on Communications, Circuits and Systems, vol. 1, pp. 54–56. IEEE (2006)
Luo, G., Sun, X., Liu, Y.: A text hiding information detection algorithm based on noise detecting. J. Hunan Univ. (Nat. Sci.) 32(6), 181–184 (2005)
Kwon, H., Kim, Y., Lee, S.: A tool for the detection of hidden data in microsoft compound document file format. In: Proceedings of International Conference on Information Science and Security (ICISS), pp. 141–146 (2008)
Wu, M., Tang, E., Liu, B.: Data hiding in digital binary image. In: Proceedings of IEEE International Conference on Multimedia and Expo, pp. 393–396 (2000)
Wu, M., Liu, B.: Data hiding in binary images for authentication and annotation. IEEE Trans. Multimedia 6(4), 528–538 (2004)
Zhao, J., Koch, E.: Embedding robust labels into images for copyright protection. In: Proceedings of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, pp. 242–251 (1995)
Mei, Q., Wong, E.K., Memon, N.: Data hiding in binary text documents. In: Proceedings of International Society for Optics and Photonics, pp. 369–375 (2001)
Qi, W., Li, X., Yang, B., Cheng, D.: Document watermarking scheme for information tracking. J. Commun. 29(10), 183–190 (2008)
Wang, H., Li, R.: A binary text digital watermarking algorithm. J. Syst. Simul.16(3), 521–524 (2004)
Bo, S., Hu, Z., Wu, L., Zhou, H.: Steganography of Telecommunication Information. National Defense University, Beijing (2005)
Nematollahi, M.A., Al-Haddad, S.A.R.: An overview of digital speech watermarking. Int. J. Speech Technol. 16(4), 471–488 (2013)
Mali, M.L., Patil, N.N., Patil, J.B.: Implementation of text watermarking technique using natural language. In: Proceedings of IEEE International Conference on Communication Systems and Network Technologies, 482–486 (2013)
Meng, P., Huang, L., Chen, Z., Yang, W., Yang, M.: Analysis and detection of translation based steganography. Acta Electronica Sinica 38(8), 1748–1852 (2012)
Chen, X., Sun, H., Tobe, Y., Zhou, Z., Sun, X.: Coverless information hiding method based on the chinese mathematical expression. In: Aixiang, Z., et al. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 133–143. Springer, Heidelberg (2015). doi:10.1007/978-3-319-27051-7_12
Acknowledgments
This work is supported by Open Fund of Demonstration Base of Internet Application Innovative Open Platform of Department of Education (KJRP1402), Hunan Province Science And Technology Plan Project Fund (2012GK3120), Scientific Research Fund of Hunan Province Education Department (13CY003, 14B106), Changsha City Science and Technology Plan Program (K1501013-11), and Hunan Normal University University-Industry Cooperation Fund.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Zhang, J., Shen, J., Wang, L., Lin, H. (2016). Coverless Text Information Hiding Method Based on the Word Rank Map. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10039. Springer, Cham. https://doi.org/10.1007/978-3-319-48671-0_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-48671-0_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48670-3
Online ISBN: 978-3-319-48671-0
eBook Packages: Computer ScienceComputer Science (R0)