Browse > Article
http://dx.doi.org/10.3837/tiis.2014.01.016

A novel, reversible, Chinese text information hiding scheme based on lookalike traditional and simplified Chinese characters  

Feng, Bin (School of software, Dalian University of Technology)
Wang, Zhi-Hui (School of software, Dalian University of Technology)
Wang, Duo (School of software, Dalian University of Technology)
Chang, Ching-Yun (Computer Laboratory, University of Cambridge)
Li, Ming-Chu (School of software, Dalian University of Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.8, no.1, 2014 , pp. 269-281 More about this Journal
Abstract
Compared to hiding information into digital image, hiding information into digital text file requires less storage space and smaller bandwidth for data transmission, and it has obvious universality and extensiveness. However, text files have low redundancy, so it is more difficult to hide information in text files. To overcome this difficulty, Wang et al. proposed a reversible information hiding scheme using left-right and up-down representations of Chinese characters, but, when the scheme is implemented, it does not provide good visual steganographic effectiveness, and the embedding and extracting processes are too complicated to be done with reasonable effort and cost. We observed that a lot of traditional and simplified Chinese characters look somewhat the same (also called lookalike), so we utilize this feature to propose a novel information hiding scheme for hiding secret data in lookalike Chinese characters. Comparing to Wang et al.'s scheme, the proposed scheme simplifies the embedding and extracting procedures significantly and improves the effectiveness of visual steganographic images. The experimental results demonstrated the advantages of our proposed scheme.
Keywords
Text data hiding; information hiding; Chinese characters; steganography;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Winstein, "Lexical Steganography through Adaptive Modulation of the Word Choice Hash,".
2 S. F. Wu and L. S. Huang, "Research on Information Hiding," US-China Education Review, pp. 77-81, 2003.
3 "Spam Mimic," 2000.
4 P. Wayner, "Mimic Functions," Cryptologia XVI, pp. 193-214, 1992.
5 R. G. Kammer, "Data Encryption Standard (DES)", National Institute of Standards and Technology, 1999.
6 C. C. Chang, P. Y. Pai, C. M. Yeh, and Y. K. Chan, "A High Payload Frequency-based Reversible Image Hiding Method," Information Sciences, vol. 180, no. 11, pp. 2286-2298, 2010.   DOI   ScienceOn
7 C. C. Chang and T. D. Kieu, "A Reversible Data Hiding Scheme Using Complementary Embedding Strategy," Information Sciences, vol. 180, no. 16, pp. 3045-3058, 2010.   DOI   ScienceOn
8 C. C. Chang, Y. P. Hsieh, and C. Y. Lin, "Lossless Data Embedding with High Embedding Capacity Based on Declustering for VQ-compressed Codes," IEEE Trans. Inf. Forensics Security, vol, 2, no. 3, pp. 341-349, 2007.   DOI   ScienceOn
9 C. C. Chang and C.Y. Lin, "Reversible Steganographic Method Using SMVQ Approach Bases on Declustering," Information Sciences, vol. 177, no. 8, pp. 1796-1805, 2007.   DOI   ScienceOn
10 K. Maher, TEXTO,
11 B. Murphy and C. Vogel, "The Syntax of Concealment: Reliable Methods for Plain Text Information Hiding," International Society for Optics and Photonics, 2007.
12 R. Rivest, A. Shamir and L. Adleman, "Cryptographic Communications System and Method", U.S. Patent 4405829, 1977.
13 X. M. Sun, H. W. Chen, L. H. Yang, and Y. Y. Tang, "Mathematical Representation of a Chinese Character and its Applications," International Journal of Pattern Recognition and Artificial Intelligence, vol. 16, no. 8, pp. 735-747, 2002.   DOI   ScienceOn
14 X. M. Sun, G. Luo, and H. J. Huang, "Component-based Digital Watermarking of Chinese Texts," in Proc. of the 3rd International Conference on Information Security, Shanghai, China, pp. 76-81, 2004.
15 Z. H. Wang , C. C. Chang, C. C. Lin, and M. C. Li, "A Reversible Information Hiding Scheme Using Left-Right and Up-Down Chinese Character Representation" The Journal of Systems and Software, vol. 82, no. 8, pp. 1362-1369, 2009.   DOI   ScienceOn
16 O. Vybornova and B. Macq, "Natural Language Watermarking and Robust Hashing Based on Presuppositional Analysis," in Proc. of the IEEE International Conference on Information Reuse and Integration (IRI 2007), Las Vegas, Nevada, USA, pp. 177-182, 2007.
17 M. J. Atallah, V. Raskin, M. Crogan, C. Hempelmann, F. Kerschbaum and D. Mohamed, "Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation," in Proc. of the 4th International Workshop on Information Hiding, Pittsburgh, PA, USA, pp. 185-200, 2001.
18 M. Chapman, "Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text," Information and Communications Security, pp. 335-345, 1997.
19 Y. L. Chiang, L. P. Chang, W. T. Hsieh and W. C. Chen, "Natural Language Watermarking Using Semantic Substitution for Chinese Text," in Proc. of IWDW2003, Seoul, Korea, pp. 129-140, 2003.