Abstract
In recent years, many researchers focus on the coverless information hiding because it realizes secret communication without modification by retrieving carriers including secret information (SI). However, the design of a coverless information hiding algorithm is very difficult, which mainly involves three aspects: (1) How to promote the efficiency of retrieving under the big data environment? (2) How to extract the SI in the received natural texts? (3) How to improve the hiding capacity (HC)? This paper proposes a novel text coverless information hiding algorithm based on the compound and selection of words, in which the reverse index is created to promote the efficiency of retrieving firstly. Then, Chinese characters are converted into binary numbers, which will serve as the location tags to determine the position of SI in the texts. Finally, combine the frequently used words and improve the HC according to the frequencies. The experimental results show that the proposed algorithm has a significant improvement in HC compared to the existing text coverless information hiding algorithms. In addition, the efficiency and security of the proposed algorithm are also proved.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Chapman M, Davida G (1997) Hiding the hidden: a software system for concealing ciphertext as innocuous text. Int Conf Inf Commun Secur 1334:335–345
Chen X, Chen S, Wu Y (2017) Coverless information hiding method based on the Chinese character encoding. J Internet Technol 18(2):91–98
Chen X, Sun H, Tobe Y, Zhou Z, Sun X (2015) Coverless information hiding method based on the Chinese mathematical expression. In: 1st international conference on cloud computing and security. Springer International Publishing, Nanjing, China, pp 133–143
Clemens B, Regenbogen C, Koch K et al (2015) Modeling and extending the ensemble classifier for steganalysis of digital images using hypothesis testing theory. IEEE Trans Inf Forensics Secur 10(12):2627–2642
Cogranne R, Retraint F (2013) An asymptotically uniformly most powerful test for LSB matching detection. IEEE Trans Inf Forensics Secur 8(3):464–476
Cox I, Miller M (2002) The first 50 years of electronic watermarking. J Appl Signal Process 2002(2):126–132
Fu Z, Sun X, Ji S, Xie G (2016) Towards efficient content-aware search over encrypted outsourced data in cloud. In: Proceedings of the 35th annual IEEE international conference on computer communications (IEEE INFOCOM). IEEE INFOCOM, San Francisco, USA, pp 1–9
Holub V, Fridrich J (2015) Low-Complexity Features for JPEG Steganalysis Using Undecimat-ed DCT [J]. IEEE Trans Inf Forensics Secur 10(2):219–228
Huang D, Yan H (2001) Inter word distance changes represented by sine waves for watermarking text images. IEEE Trans Circuits Syst Video Technol 11(12):1237–1245
Joshi S, Bokil A, Jain N et al (2012) Image steganography combination of spatial and frequency domain. Int J Comput Appl 53(5):25–29
Katzenbeisser S, Petitcolas FA (2000) Information hiding techniques for steganography and digital watermarking, vol 18. Artech House, Norwood, pp 53–54
Lee Y, Chen L (2000) High capacity image steganographic model. IEE Proc Vis Image Signal Process 147(3):288–294
Meng P, Huang L, Yang W (2009) Attacks on translation based steganography. In: 2009 IEEE youth conference on information, computing and telecommunication, Beijing, China, pp 227–230
Sun X, Chen H, Yang L, Tang Y (2002) Mathematical representation of a Chinese character and its applications. Int J Pattern Recognit Artif Intell 16(8):735–748
Thai T, Cogranne R, Retraint F (2014) Statistical model of quantized DCT coefficients: application in the steganalysis of Jsteg algorithm. IEEE Trans Image Process 23(5):1980–1993
The Chinese character Work Committee of the national language and writing committee, Frequency statistics of common Chinese characters in modern Chinese. Chinese Press (1989)
Wayner P (2009) Disappearing cryptography: information hiding: steganography & watermarking, 2nd edn. Morgan Kaufmann, San Francisco
Wu K, Wang C (2014) Steganography using reversible texture synthesis. IEEE Trans Image Process Publ IEEE Signal Process Soc 24(1):130–139
Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw 7(8):1283–1291
Xia Z, Zhu Y, Sun X, Qin Z, Ren K (2015) Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans Cloud Comput PP(99):1–1
Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016a) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947–1962
Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016b) A privacy-preserving and copydeterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608
Xia Z, Xiong N, Vasilakos A, Sun X (2017a) An efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf Sci 387:195–204
Xia Z, Lv R, Zhu Y, Ji P, Sun H, Shi Y (2017b) Fingerprint liveness detection using gradient-based texture features. Signal Image Video Process 11(2):381–388
Xiong L, Xu Z, Xu Y (2015) A secure re-encryption scheme for data services in a cloud computing environment. Concurr Comput Pract Exp 27(17):4573–4585
Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on SIFT and BOF without embeding. J Internet Technol 18(2):209–216
Zhou Z, Mu Y, Yang C, Zhao N (2016) Coverless multi-keywords information hiding method based on text. Int J Secur Appl 10(9):309–320
Zhou H, Chen K, Zhang W, Yu N (2017) Comments on steganography using reversible texture synthesis. IEEE Trans Image Process 26(4):1623
Zhou Z, Sun H, Harit R, et al (2015) Coverless image steganography without embedding. In: 1st international conference on cloud computing and security, Springer International Publishing, Nanjing, China, pp 123–132
Acknowledgements
This work is supported by the National Natural Science Foundation of China (NSFC) (61502242, U1536206, 61672294, 61602253, 61373133, 61232016, U1405254), Jiangsu Basic Research Programs Natural Science Foundation (BK20150925), Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology (2014r026sharp), Open Fund of Demonstration Base of Internet Application Innovative Open Platform of Department of Education (KJRP1402), Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) Fund, Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) Fund, National Ministry of Science and Technology Special Project Research GYHY201301030, 2013DFG12860, BC2013012.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Communicated by V. Loia.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chen, X., Chen, S. Text coverless information hiding based on compound and selection of words. Soft Comput 23, 6323–6330 (2019). https://doi.org/10.1007/s00500-018-3286-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-018-3286-7