Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Text coverless information hiding based on compound and selection of words

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

In recent years, many researchers focus on the coverless information hiding because it realizes secret communication without modification by retrieving carriers including secret information (SI). However, the design of a coverless information hiding algorithm is very difficult, which mainly involves three aspects: (1) How to promote the efficiency of retrieving under the big data environment? (2) How to extract the SI in the received natural texts? (3) How to improve the hiding capacity (HC)? This paper proposes a novel text coverless information hiding algorithm based on the compound and selection of words, in which the reverse index is created to promote the efficiency of retrieving firstly. Then, Chinese characters are converted into binary numbers, which will serve as the location tags to determine the position of SI in the texts. Finally, combine the frequently used words and improve the HC according to the frequencies. The experimental results show that the proposed algorithm has a significant improvement in HC compared to the existing text coverless information hiding algorithms. In addition, the efficiency and security of the proposed algorithm are also proved.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Chapman M, Davida G (1997) Hiding the hidden: a software system for concealing ciphertext as innocuous text. Int Conf Inf Commun Secur 1334:335–345

    MATH  Google Scholar 

  • Chen X, Chen S, Wu Y (2017) Coverless information hiding method based on the Chinese character encoding. J Internet Technol 18(2):91–98

    Google Scholar 

  • Chen X, Sun H, Tobe Y, Zhou Z, Sun X (2015) Coverless information hiding method based on the Chinese mathematical expression. In: 1st international conference on cloud computing and security. Springer International Publishing, Nanjing, China, pp 133–143

  • Clemens B, Regenbogen C, Koch K et al (2015) Modeling and extending the ensemble classifier for steganalysis of digital images using hypothesis testing theory. IEEE Trans Inf Forensics Secur 10(12):2627–2642

    Article  Google Scholar 

  • Cogranne R, Retraint F (2013) An asymptotically uniformly most powerful test for LSB matching detection. IEEE Trans Inf Forensics Secur 8(3):464–476

    Article  Google Scholar 

  • Cox I, Miller M (2002) The first 50 years of electronic watermarking. J Appl Signal Process 2002(2):126–132

    MATH  Google Scholar 

  • Fu Z, Sun X, Ji S, Xie G (2016) Towards efficient content-aware search over encrypted outsourced data in cloud. In: Proceedings of the 35th annual IEEE international conference on computer communications (IEEE INFOCOM). IEEE INFOCOM, San Francisco, USA, pp 1–9

  • Holub V, Fridrich J (2015) Low-Complexity Features for JPEG Steganalysis Using Undecimat-ed DCT [J]. IEEE Trans Inf Forensics Secur 10(2):219–228

    Article  Google Scholar 

  • Huang D, Yan H (2001) Inter word distance changes represented by sine waves for watermarking text images. IEEE Trans Circuits Syst Video Technol 11(12):1237–1245

    Article  Google Scholar 

  • Joshi S, Bokil A, Jain N et al (2012) Image steganography combination of spatial and frequency domain. Int J Comput Appl 53(5):25–29

    Article  Google Scholar 

  • Katzenbeisser S, Petitcolas FA (2000) Information hiding techniques for steganography and digital watermarking, vol 18. Artech House, Norwood, pp 53–54

    Google Scholar 

  • Lee Y, Chen L (2000) High capacity image steganographic model. IEE Proc Vis Image Signal Process 147(3):288–294

    Article  Google Scholar 

  • Meng P, Huang L, Yang W (2009) Attacks on translation based steganography. In: 2009 IEEE youth conference on information, computing and telecommunication, Beijing, China, pp 227–230

  • Sun X, Chen H, Yang L, Tang Y (2002) Mathematical representation of a Chinese character and its applications. Int J Pattern Recognit Artif Intell 16(8):735–748

    Article  Google Scholar 

  • Thai T, Cogranne R, Retraint F (2014) Statistical model of quantized DCT coefficients: application in the steganalysis of Jsteg algorithm. IEEE Trans Image Process 23(5):1980–1993

    Article  MathSciNet  MATH  Google Scholar 

  • The Chinese character Work Committee of the national language and writing committee, Frequency statistics of common Chinese characters in modern Chinese. Chinese Press (1989)

  • Wayner P (2009) Disappearing cryptography: information hiding: steganography & watermarking, 2nd edn. Morgan Kaufmann, San Francisco

    Google Scholar 

  • Wu K, Wang C (2014) Steganography using reversible texture synthesis. IEEE Trans Image Process Publ IEEE Signal Process Soc 24(1):130–139

    MathSciNet  MATH  Google Scholar 

  • Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw 7(8):1283–1291

    Article  Google Scholar 

  • Xia Z, Zhu Y, Sun X, Qin Z, Ren K (2015) Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans Cloud Comput PP(99):1–1

    Google Scholar 

  • Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016a) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947–1962

  • Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016b) A privacy-preserving and copydeterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608

  • Xia Z, Xiong N, Vasilakos A, Sun X (2017a) An efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf Sci 387:195–204

  • Xia Z, Lv R, Zhu Y, Ji P, Sun H, Shi Y (2017b) Fingerprint liveness detection using gradient-based texture features. Signal Image Video Process 11(2):381–388

  • Xiong L, Xu Z, Xu Y (2015) A secure re-encryption scheme for data services in a cloud computing environment. Concurr Comput Pract Exp 27(17):4573–4585

    Article  Google Scholar 

  • Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on SIFT and BOF without embeding. J Internet Technol 18(2):209–216

    Google Scholar 

  • Zhou Z, Mu Y, Yang C, Zhao N (2016) Coverless multi-keywords information hiding method based on text. Int J Secur Appl 10(9):309–320

    Google Scholar 

  • Zhou H, Chen K, Zhang W, Yu N (2017) Comments on steganography using reversible texture synthesis. IEEE Trans Image Process 26(4):1623

    Article  MathSciNet  MATH  Google Scholar 

  • Zhou Z, Sun H, Harit R, et al (2015) Coverless image steganography without embedding. In: 1st international conference on cloud computing and security, Springer International Publishing, Nanjing, China, pp 123–132

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (NSFC) (61502242, U1536206, 61672294, 61602253, 61373133, 61232016, U1405254), Jiangsu Basic Research Programs Natural Science Foundation (BK20150925), Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology (2014r026sharp), Open Fund of Demonstration Base of Internet Application Innovative Open Platform of Department of Education (KJRP1402), Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) Fund, Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) Fund, National Ministry of Science and Technology Special Project Research GYHY201301030, 2013DFG12860, BC2013012.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xianyi Chen.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by V. Loia.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, X., Chen, S. Text coverless information hiding based on compound and selection of words. Soft Comput 23, 6323–6330 (2019). https://doi.org/10.1007/s00500-018-3286-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-018-3286-7

Keywords