Skip to main content

Coverless Text Information Hiding Method Based on the Word Rank Map

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10039))

Included in the following conference series:

Abstract

Text information hiding has attracted the attention of many scholars and made a lot of achievements. However, for the text information hiding methods such as text format-based, generation method-based, text image-based and so on, there is a major flaw that cannot resist steganography detection. Based on the rank map of the words, a novel method of coverless text information hiding is presented. Firstly, stego-vectors are directly generated from the secret message by using the rank map. Then, some normal texts, stego-texts including the generated sgeto-vectors, will be searched form the text big data. Finally, the secret information can be sent to the receiver without any modification of the stego-texts. The proposed algorithm has a higher theoretical significance and practice value because it is robust for almost all current steganalysis methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, T.Y., Tsai, W.H.: A new steganographic method for data hiding in microsoft word documents by a change tracking technique. IEEE Trans. Inf. Forensics Secur. 2(1), 24–30 (2007)

    Article  MathSciNet  Google Scholar 

  2. Maxemchuk, N.F., Liu, T.Y., Tsai, W.H.: Electronic document distribution. AT&T Tech. J. 73(5), 73–80 (1994)

    Article  Google Scholar 

  3. Low, S.H., Maxemchuk, N.F., Brassil, J.T.: Document marking and identification using both line and word shifting. In: Proceedings of Infocom 1995, vol. 2007, pp. 853–860. IEEE (1995)

    Google Scholar 

  4. Brassil, J.T., Low, S.H., Maxemchuk, N.F.: Electronic marking and identification techniques to discourage document copying. IEEE J. Sel. Areas Commun. 13(8), 1495–1504 (1995)

    Article  Google Scholar 

  5. Low, S.H., Maxemchuk, N.F., Lapone, A.M.: Document identification for copyright protection using centroid detection. IEEE Trans. Commun. 46(3), 372–383 (1998)

    Article  Google Scholar 

  6. Low, S.H., Maxemchuk, N.F.: Performance comparison of two text marking methods. IEEE J. Sel. Areas Commun. 16(4), 561–572 (1998)

    Article  Google Scholar 

  7. Brassil, J.T., Low, S.H., Maxemchuk, N.F.: Copyright protection for the electronic distribution of text documents. In: Proceedings of the IEEE, vol. 87, pp. 1181–1196 (1999)

    Google Scholar 

  8. Huang, D., Yan, H.: Inter word distance changes represented by sine waves for watermarking text images. IEEE Trans. Circ. Syst. 11(12), 1237–1245 (2001)

    Article  MathSciNet  Google Scholar 

  9. Adnan, M.A., Osama, M.A.: Watermarking electronic text documents containing justified paragraphs and irregular line spacing. In: Proceedings of the SPIE, pp. 685–695 (2004)

    Google Scholar 

  10. Kim, Y.W., Moon, K.A., Oh I.S.: A text watermarking algorithm based on word classification and inter word space statistics. In: Proceedings of Seventh International Conference on Document Analysis and Recognition, pp. 775–779 (2003)

    Google Scholar 

  11. Xie, L., Huang, H., Qin, J.: A Text similarity detection algorithm based on components interconnected graph. In: Proceedings of 2015 China Information Hiding and Multimedia Security Workshop (CIHW2015), pp. 251–260 (2015)

    Google Scholar 

  12. Por, L.Y., Ang, T.F., Delina, B.: WhiteSteg: a new Scheme in information hiding using text steganography. WSEAS Trans. Comput. 7(6), 735–745 (2008)

    Google Scholar 

  13. Lee, I.S., Tsai, W.H.: Secret communication through web pages using special space codes in HTML files. Int. J. Appl. Sci. Eng. 6(2), 141–149 (2008)

    MathSciNet  Google Scholar 

  14. Bender, W., Gruhl, D., Morimoto, N.: Techniques for data hiding. IBM Syst. J. 35(34), 313–336 (1996)

    Article  Google Scholar 

  15. Takizawa, O., Makino, K., Matsumoto, T., Nakagawa, H., Murase, I.: Method of hiding information in agglutinative language documents using adjustment to new line positions. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3683, pp. 1039–1048. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  16. Koluguri, A., Gouse, S., Reddy, P.B.: Text steganography methods and its tools. Int. J. Adv. Sci. Tech. Res. 2(4), 888–902 (2014)

    Google Scholar 

  17. Goyal, L., Raman, M., Diwan, P.: A robust method for integrity protection of digital data in text document watermarking. Int. J. Sci. Res. Dev. 1(6), 14–18 (2014)

    Google Scholar 

  18. Sui, X.G., Luo, H.: A steganalysis method based on the distribution of space characters. In: Proceedings of IEEE International Conference on Communications, Circuits and Systems, vol. 1, pp. 54–56. IEEE (2006)

    Google Scholar 

  19. Luo, G., Sun, X., Liu, Y.: A text hiding information detection algorithm based on noise detecting. J. Hunan Univ. (Nat. Sci.) 32(6), 181–184 (2005)

    Google Scholar 

  20. Kwon, H., Kim, Y., Lee, S.: A tool for the detection of hidden data in microsoft compound document file format. In: Proceedings of International Conference on Information Science and Security (ICISS), pp. 141–146 (2008)

    Google Scholar 

  21. Wu, M., Tang, E., Liu, B.: Data hiding in digital binary image. In: Proceedings of IEEE International Conference on Multimedia and Expo, pp. 393–396 (2000)

    Google Scholar 

  22. Wu, M., Liu, B.: Data hiding in binary images for authentication and annotation. IEEE Trans. Multimedia 6(4), 528–538 (2004)

    Article  Google Scholar 

  23. Zhao, J., Koch, E.: Embedding robust labels into images for copyright protection. In: Proceedings of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, pp. 242–251 (1995)

    Google Scholar 

  24. Mei, Q., Wong, E.K., Memon, N.: Data hiding in binary text documents. In: Proceedings of International Society for Optics and Photonics, pp. 369–375 (2001)

    Google Scholar 

  25. Qi, W., Li, X., Yang, B., Cheng, D.: Document watermarking scheme for information tracking. J. Commun. 29(10), 183–190 (2008)

    Google Scholar 

  26. Wang, H., Li, R.: A binary text digital watermarking algorithm. J. Syst. Simul.16(3), 521–524 (2004)

    Google Scholar 

  27. Bo, S., Hu, Z., Wu, L., Zhou, H.: Steganography of Telecommunication Information. National Defense University, Beijing (2005)

    Google Scholar 

  28. Nematollahi, M.A., Al-Haddad, S.A.R.: An overview of digital speech watermarking. Int. J. Speech Technol. 16(4), 471–488 (2013)

    Article  Google Scholar 

  29. Mali, M.L., Patil, N.N., Patil, J.B.: Implementation of text watermarking technique using natural language. In: Proceedings of IEEE International Conference on Communication Systems and Network Technologies, 482–486 (2013)

    Google Scholar 

  30. Meng, P., Huang, L., Chen, Z., Yang, W., Yang, M.: Analysis and detection of translation based steganography. Acta Electronica Sinica 38(8), 1748–1852 (2012)

    Google Scholar 

  31. Chen, X., Sun, H., Tobe, Y., Zhou, Z., Sun, X.: Coverless information hiding method based on the chinese mathematical expression. In: Aixiang, Z., et al. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 133–143. Springer, Heidelberg (2015). doi:10.1007/978-3-319-27051-7_12

    Chapter  Google Scholar 

Download references

Acknowledgments

This work is supported by Open Fund of Demonstration Base of Internet Application Innovative Open Platform of Department of Education (KJRP1402), Hunan Province Science And Technology Plan Project Fund (2012GK3120), Scientific Research Fund of Hunan Province Education Department (13CY003, 14B106), Changsha City Science and Technology Plan Program (K1501013-11), and Hunan Normal University University-Industry Cooperation Fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianjun Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Zhang, J., Shen, J., Wang, L., Lin, H. (2016). Coverless Text Information Hiding Method Based on the Word Rank Map. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10039. Springer, Cham. https://doi.org/10.1007/978-3-319-48671-0_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48671-0_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48670-3

  • Online ISBN: 978-3-319-48671-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics