Browse > Article
http://dx.doi.org/10.3837/tiis.2013.11.021

Data Hiding for HTML Files Using Character Coding Table and Index Coding Table  

Chou, Yung-Chen (Department of Computer Science and Information Engineering, Asia University)
Hsu, Ping-Kun (Department of Information Management, National Chung Hsing University)
Lin, Iuon-Chang (Department of Information Management, National Chung Hsing University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.7, no.11, 2013 , pp. 2913-2927 More about this Journal
Abstract
A data hiding scheme in HTML files is presented in this paper. Web pages are a very popular medium for broadcasting information and knowledge nowadays, and web pages are a good way to achieve the goal of secret message delivery because the different HTML coding codes will render the same screen in any of the popular browsers. The proposed method utilizes the HTML special space codes and sentence segmentation to conceal secret messages into a HTML file. The experimental results show that the stego HTML file generated by the proposed method is imperceptible. Also, the proposed method can conceal one more secret bit in every between-word location.
Keywords
Data hiding; HTML; Segment; Secret data delivery;
Citations & Related Records
연도 인용수 순위
  • Reference
1 I.S. Lee and W.H. Tsai, "Secret Communication through Web Pages Using Special Space Codes in HTML Files," International Journal of Applied Science and Engineering, vol. 6, no. 2, 2008, pp. 141-149.
2 H.J. Huang, S.H. Zhong, and X.M. Sun, "An Algorithm of Webpage Information Hiding Based on Attributes Permutation," in Proc. of the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, Aug. 2008, pp. 257-260.
3 Y.W. Kim, K.A. Moon, and I.S. Oh, "A Text Watermarking Algorithm Based on Word Classification and Inter-word Space Statistics," in Proc. of the Seventh International Conference on Document Analysis and Recognition, Edinburgh, Scotland, Aug. 2003, pp. 775-779.
4 I.S. Lee and W.H. Tsai, "Data Hiding in Emails and Applications Using Unused ASCII Control Codes," Journal of Information Technology and Applications, vol. 3, no. 1, 2008, pp. 13-24.
5 I.S. Lee and W.H. Tsai, "A New Approach to Covert Communication via PDF Files," Signal Processing, vol. 90, no. 2, 2010, pp. 557-565.   DOI   ScienceOn
6 I.S. Lee and W.H. Tsai, "Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes," International Journal of Network Security, vol. 10, no. 1, 2010, pp. 1-10.
7 B. Li, J. He, J. Huang, and Y.Q. Shi, "A Survey on Image Steganography and Steganalysis," Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 2, 2011, pp. 142-172.
8 I.C. Lin and P.K. Hsu, "A Data Hiding Scheme on Word Documents Using Multiple-base Notation System," in Proc. of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, Oct. 2010, pp. 31-33.
9 T.Y. Liu and W.H. Tsai, "A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique," IEEE Transactions on Information Forensics and Security, vol. 2, no. 1, 2007, pp. 24-30.   DOI
10 M.A. Qadir and I. Ahmad, "Digital Text Watermarking: Secure Content Delivery and Data Hiding in Digital Documents," IEEE Aerospace and Electronic Systems Magazine, vol. 21, no. 11, 2006, pp. 18-21.
11 S. Weng, Y. Zhao, J.S. Pan, and R. Ni, "Reversible Watermarking based on Invariability and Adjustment on Pixel Pairs," IEEE Signal Processing Letters, vol. 15, 2008, pp. 721-724.   DOI   ScienceOn
12 X.G. Sui and H. Luo, "A New Steganography Method Based on Hypertext," in Proc. of Asia-Pacific Radio Science Conference, Qingdao, China, Aug. 2004, pp. 181-184.
13 X.M Sun, G. Lou, and H.J. Huang, "Component-based Digital Watermarking of Chinese Texts," in Proc. of the Third International Conference on Information Security, Shanghai, China, Nov. 2004,vol. 85, pp. 76-81.
14 Z.H. Wang, C.C. Chang, C.C Lin, and M.C Li, "A Reversible Information Hiding Scheme Using Left-Right and Up-Down Chinese Character Representation," Systems and Software, vol. 82, no. 8, 2009, pp. 1362-1369.   DOI   ScienceOn
15 Y.J. Yang and Y.M. Yang, "An Efficient Webpage Information Hiding Method Based on Tag Attributes," in Proc. of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, Yantai, China, Aug. 2010, pp. 1181-1184.
16 X.P. Zhang and S.Z. Wang, "Steganography Using Multiple-Base Notational System and Human Vision Sensitivity," IEEE Signal Processing Letters, vol. 12, no. 1, 2005, pp. 67-70.   DOI   ScienceOn
17 Y. Zhao, R. Ni, and Z. Zhu, "RST Transforms Resistant Image Watermarking based on Centroid and Sector-shaped Partition," Science in China: Series F Information Science, vol. 55, no. 3, 2012.
18 S.P. Zhong, X.Q. Cheng, and T.R. Chen, "Data Hiding in a Kind of PDF Texts for Secret Communication," International Journal of Network Security, vol. 4, no. 1, 2007, pp. 17-26.
19 C. Chen, S.Z. Wang, and X.P. Zhang, "Information Hiding in Text Using Typesetting Tools with Stego-Encoding," in Proc. of the First International Conference on Innovative Computing, Information and Control, Beijing, China, vol. 1, Aug. 2006, pp. 459-462.
20 M. Barni and F. Bartolini, "Data Hiding for Fighting Piracy," IEEE Signal Processing Magazine, vol. 21, no. 2, 2004, pp. 28-39.
21 C.C. Chang, C.C. Wu, and I.C. Lin, "A Data Hiding Method for Text Documents Using Multiple-Base Encoding," High Performance Networking, Computing, Communication Systems, and Mathematical Foundations, (Yanwen Wu, Qi Luo Eds.), Springer-Verlag Berlin Heidelberg, Sanya, Hainan Island, China , vol. 66, 2010, pp. 101-109.   DOI
22 I.J. Cox, J. Kilian, F. Thomson Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on Image Processing, vol. 6, no. 12, 1997, pp. 1673-1687.   DOI   ScienceOn
23 S. Dey, H. Al-Qaheri, and S. Sanyal, "Embedding Secret Data in HTML Web Page," Image Processing & Communications Challenges, (Ryszard S. Choraoe, Antoni Zabludowski Eds.), Academy Publishing House EXIT Warsaw, 2009, pp. 474-481.
24 M. Grosvald and C. Orhan Orgun, "Free from the Cover Text: A Human-generated Natural Language Approach to Text-based Steganography," Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 2, 2011, pp. 133-141.
25 H.J. Huang, X.M. Sun, Z.S. Li, and G., Sun, "Detection of Hidden Information in Webpage," in Proc. of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, Haikou, China, vol. 4, Aug. 2007, pp. 317-321.