Browse > Article
http://dx.doi.org/10.3837/tiis.2016.09.029

Text Steganography Based on Ci-poetry Generation Using Markov Chain Model  

Luo, Yubo (Department of Electronic Engineering, Tsinghua University)
Huang, Yongfeng (Department of Electronic Engineering, Tsinghua University)
Li, Fufang (School of Computer Science and Educational Software, GuangZhou University)
Chang, Chinchen (Department of Information Engineering and Computer Science, Feng Chia University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.9, 2016 , pp. 4568-4584 More about this Journal
Abstract
Steganography based on text generation has become a hot research topic in recent years. However, current text-generation methods which generate texts of normal style have either semantic or syntactic flaws. Note that texts of special genre, such as poem, have much simpler language model, less grammar rules, and lower demand for naturalness. Motivated by this observation, in this paper, we propose a text steganography that utilizes Markov chain model to generate Ci-poetry, a classic Chinese poem style. Since all Ci poems have fixed tone patterns, the generation process is to select proper words based on a chosen tone pattern. Markov chain model can obtain a state transfer matrix which simulates the language model of Ci-poetry by learning from a given corpus. To begin with an initial word, we can hide secret message when we use the state transfer matrix to choose a next word, and iterating until the end of the whole Ci poem. Extensive experiments are conducted and both machine and human evaluation results show that our method can generate Ci-poetry with higher naturalness than former researches and achieve competitive embedding rate.
Keywords
Steganography; Ci-poetry Generation; Markov Chain; Mutual Information;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Desoky, “Chestega: Chess Steganography Methodology,” Security and Communication Networks, vol. 2(6), pp. 555-566, 2009. Article (CrossRef Link)
2 A. Desoky, M. Younis and H. EI-Sayed, “Auto-Summarization-Based Steganography,” in Proc. of the 5th IEEE International Conference on Innovations in Information Technology, pp. 608-612, 2008. Article (CrossRef Link)
3 A. Desoky, “Listega: List-Based Steganography Methodology,” International Journal of Information Security, vol. 8(4), pp. 247-261, 2009. Article (CrossRef Link)   DOI
4 Y. F. Huang, C. H. Liu, S. Y. Tang and S. Bai, “Steganography Integration into a Low-Bit Rate Speech Codec,” Information Forensics & Security, IEEE Transactions on, vol. 7(6), pp. 1865-1875, 2012. Article (CrossRef Link)   DOI
5 S. F. Wu, “Research on Information Hiding,” Master Thesis, University of Science and Technology of China, 2003.
6 P. Wayner, “Mimic Functions,” Cryptologia 16(3), pp. 192-213, 1992. Article (CrossRef Link)   DOI
7 Spammimic. www.spammimic.com.
8 G. Chen, L. Cui and M. Zhou, “Chinese Couplet Generator”, couplet.msra.cn/app/couplet.aspx.
9 J. He and M. Zhou, “Generating Chinese Metrical Poetry by a Statistical MT Approach,” Journal of Chinese Information Processing, vol. 24(2), pp. 96-103, 2010. Article (CrossRef Link)
10 C. L. Zhou and W. You, “Genetic Algorithm and Its Implementation of Automatic Generation of Chinese SongCi,” Journal of Software, vol. 21(3), pp. 427-437, 2010. Article (CrossRef Link)   DOI
11 L. Bahl, P. Brown, P. de Souza and R. Mercer, “Maximum mutual information estimation of hidden Markov model parameters for speech recognition,” in Proc. of Acoustics, Speech, and Signal Processing, IEEE International Conference on ICASSP, pp. 49-52, 1986. Article (CrossRef Link)
12 P. Brown, “The Acoustic-modeling Problem in Automatic Speech Recognition,” Ph.D. thesis, Carnegie Mellon University, 1987.
13 M. Shirali-Shahreza and M. H. Shirali-Shahreza, “Text steganography in SMS,” International Conference on Convergence Information Technology, pp. 2260-2265, 2007. Article (CrossRef Link)
14 J.W. Li, M. Gallry, C. Brockett, J. Gao and B. Dolan, “A diversity-promoting objective function for neural conversation models,” arXiv preprint arXiv:1510.03055, 2015.
15 Y. F. Huang, S. Tang and J. Yuan, “Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec,” Information Forensics & Security IEEE Transactions on, vol. 6(2), pp. 296-306, 2011. Article (CrossRef Link)   DOI
16 C. Nopporn, “Electronic Document Data Hiding Technique using Inter-character Space,” in Proc. of IEEE Asia-Pacific Conference on Circuits and System, pp. 419-122, 1998. Article (CrossRef Link)
17 MH. Shirali-Shahreza and M. Shirali-Shahreza, “A New Approach to Persian/Arabic Text Steganography,” in Proc. of 5th IEEE/ACIS International Conference on Computer and Information Science, pp. 310-315, 2006. Article (CrossRef Link)
18 S. H. Low, N. F. Maxemchuk and A. M. Lapone, “Document Identification for Copyright Protection Using Centroid Detection,” IEEE Transactions Communications, vol. 46(3) , pp. 372-383, 1998. Article (CrossRef Link)   DOI
19 K. Maher, “Texto”, available at URL: ftp://ftp.funet.fi/pub/crypt/steganography/texto.tar.gz.
20 M. Chapman, “Hiding the hidden: A software system for concealing ciphertext as innocuous text,” Master Thesis, University of Wisconsin-Milwaukee, 1998.
21 Z. S. Yu and L. S. Huang, “High Embedding Ratio Text Steganography by Ci-poetry of the Song Dynasty,” Journal of Chinese Information Processing, vol. 23(4) , pp. 55-62, 2009. Article (CrossRef Link)
22 C. Grothoff, K. Grothoff, L Alkhutova, R Stutsman and M Atallah, “Translation-based Steganography,” in Proc. of 7th International Workshop on Information Hiding, Lecture Notes in Computer Science, pp. 219-233, 2005. Article (CrossRef Link)
23 A. Desoky, “Notestega: Notes-Based Steganography Methodology,” Information Security Journal: A Global Perspective, vol. 18(4) , pp. 178-193, 2009. Article (CrossRef Link)   DOI
24 A. Desoky, “Jokestega: Automatic Joke Generation–based Steganography Methodology,” International Journal of Security and Networks, vol. 7(3) , pp. 148-160, 2012. Article (CrossRef Link)   DOI