Browse > Article
http://dx.doi.org/10.3837/tiis.2021.04.020

An Improved Coverless Text Steganography Algorithm Based on Pretreatment and POS  

Liu, Yuling (College of Computer Science and Electronic Engineering, Hunan University)
Wu, Jiao (College of Computer Science and Electronic Engineering, Hunan University)
Chen, Xianyi (School of Computer and Software, Nanjing University of Information Science & Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.15, no.4, 2021 , pp. 1553-1567 More about this Journal
Abstract
Steganography is a current hot research topic in the area of information security and privacy protection. However, most previous steganography methods are not effective against steganalysis and attacks because they are usually carried out by modifying covers. In this paper, we propose an improved coverless text steganography algorithm based on pretreatment and Part of Speech (POS), in which, Chinese character components are used as the locating marks, then the POS is used to hide the number of keywords, the retrieval of stego-texts is optimized by pretreatment finally. The experiment is verified that our algorithm performs well in terms of embedding capacity, the embedding success rate, and extracting accuracy, with appropriate lengths of locating marks and the large scale of the text database.
Keywords
Steganography; Coverless Text Steganography; Pretreatment; Chinese Character Component; Locating Mark; Part of Speech;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 X. Sun, H. Chen, L. Yang and Y. Y. Tang, "Mathematical representation of a Chinese character and its applications," International Journal of Pattern Recognition and Artificial Intelligence, vol. 16, no. 6, pp. 735-747, 2002.   DOI
2 I. J. Cox and M. L. Miller, "The first 50 years of electronic watermarking," Journal of Applied Signal Processing, vol. 2002, no. 2, pp. 126-132, 2002.
3 B. Murphy and C. Vogel, "Statistically-constrained Shallow Text Marking: Techniques, Evaluation Paradigm and Results," Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 65050Z, 2007.
4 Y. L. Liu, H. Peng, and J. Wang, "Verifiable eiversity ranking search over encrypted outsourced data," Computers, Materials & Continua, vol. 55, no. 1, pp. 37-57, 2018.
5 H. Sun, R. Grishman, and Y. Wang, "Active learning based named recognition and its application in natural language coverless information hiding," Journal of Internet Technology, vol. 18, no. 2, pp. 443-451, 2017.
6 A. Ekbal and S. Saha, "Simulated annealing based classifier ensemble techniques: application to part of speech tagging," Information Fusion, vol. 14, no. 3, pp. 288-300, 2013.   DOI
7 B. Feng, Z. H. Wang, D. Wang, C. Y. Chang, and M. C. Li, "A novel, reversible, Chinese text information hiding scheme based on lookalike traditional and simplified Chinese characters," KSII Transactions on Internet and Information Systems, vol. 8, no. 1, pp. 269-281, 2014.   DOI
8 I. S. Lee and W. H. Tsai, "Secret communication through web pages using special space codes in HTML files," International Journal of Applied Science & Engineering, vol. 6, no. 2, pp. 141-149, 2008.
9 K. Maher, "Texto". [Online]. Available: ftp://ftp.funet.fi/pub/crypt/steganography/texto.tar.gz
10 E. Satir and H. Isik, "A huffman compression based text steganography method," Multimedia Tools and Applications, vol. 70, no. 3, pp. 2085-2110, 2014.   DOI
11 Z. Zhou, H. Sun, R. Harit, X. Chen, and X. Sun, "Coverless image steganography without embedding," in Proc. of International Conference on Cloud Computing and Security (ICCCS), pp. 123-132, 2015.
12 C. Y. Chang and S. Clark, "Practical linguistic steganography using contextual synonym substitution and vertex color coding," Computational Linguistices, vol. 40, no. 2, pp. 403-448, 2010.
13 X. Shen, F. Shen, Q. S. Sun, Y. Yang, Y. H. Yuan, and H. T. Shen, "Semi-Paired Discrete Harshing: Learning Latent Hash Codes for Semi-Paired Cross-view Retrieval," IEEE Transactions on Cybernetics, vol. 47, no. 12, pp. 4275-4288, 2017.   DOI
14 Y. Wu and X. Sun, "Text coverless information hiding method based on hybrid tags," Journal of Internet Technology, vol. 19, no. 3, pp. 649-655, 2018.
15 C. Y. Chang and S. Clark, "Linguistic steganography using automatically generated paraphrases," in Proc. of Human Language Technologies: the 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL), pp. 591-599, 2010.
16 M. Wu and B. Liu, "Data hiding in binary image for authentication and annotation," IEEE Transactions on Multimedia, vol. 6, no. 4, pp. 528-538, 2004.   DOI
17 M. Chapman and G. I. Davida, "Hiding the hidden: a software system for concealing ciphertext as innocuous text," in Proc. of the 1st International Conference on Information and Communication Security, pp. 335-345, 1998.
18 A. Desoky, "Notestega: Notes-based steganography methodology," Information Security Journal: A Global Perspective, vol. 18, no. 4, pp. 178-193, 2009.   DOI
19 Y. B. Luo, Y. F. Huang, F. F. Li and C. C. Chang, "Text steganography based on Ci-poetry generation using markov chain model," KSII Transactions on Internet and Information Systems, vol. 10, no. 9, pp. 4568-4584, 2016.   DOI
20 S. Zhang, Z. Yao, X. Meng, and C. C. Liu, "New digital text watermarking algorithm based on new-defined characters," in Proc. of IEEE International Conference Symposium on Computer, Consumer and Control (IS3C), pp. 713-716, 2014.
21 X. Chen, S. Chen, and Y. Wu, "Coverless information hiding method based on the Chinese character encoding," Journal of Internet Technology, vol. 18, no. 2, pp. 313-320, 2017.
22 L. Y. Xiang, Y. Li, W. Hao, P. Yang, and X. B. Shen, "Reversible natural language watermarking using synonym substitution and arithmetic coding," Computers, Materials & Continua, vol. 55, no. 3, pp. 541-559, 2018.
23 B. Murphy and C. Vogel, "The syntax of concealment: reliable methods for plain text information hiding," Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, pp. 1-12, 2007.
24 P. Meng, L. Hang, W. Yang, and Z. Chen, "Attacks on Translation Based Steganography," in Proc. of IEEE Youth Conference on Information, Computing and Telecommunication (YC-ICT), pp. 227-230, 2009.
25 X. Chen, H. Sun, Y. Tobe, Z. Zhou, and X. Sun, "Coverless information hiding method based on the Chinese mathematical expression," in Proc. of International Conference on Cloud Computing and Security ( ICCCS), pp. 133-143, 2015.