Skip to main content

RITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue Model

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11065))

Included in the following conference series:

Abstract

Steganography based on texts has always been a hot but extremely hard research topic. Due to the high coding characteristics of the text compared to other information carriers, the redundancy of information is very low, which makes it really difficult to hide information inside. In this paper, combined with the recurrent neural network (RNN) and reinforcement learning (RL), we designed and implemented a real-time interactive text steganography model (RITS). The proposed model can automatically generate semantically coherent and syntactically correct dialogues based on the input sentence, through the reasonable encoding of the text in the dialog generation process to realize secret information hiding and transmission. We trained our model using publicly collected datasets which contains 5808 dialogues and evaluated the proposed model from several perspectives. Experimental results show that the proposed model can be very efficient to implement the embedding and extraction of information. The generated dialogue texts are of high quality which shows high concealment.

This work is supported by the National Key Research and Development Program of China (No. 2016YFB0800402) and the National Natural Science Foundation of China (No. U1405254, U1536201, U1705261).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kipper, G.: Investigator’s Guide to Steganography. CRC Press, Inc., Boca Raton (2003)

    Book  Google Scholar 

  2. Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 123–132. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27051-7_11

    Chapter  Google Scholar 

  3. Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Sig. Process. 66, 385–403 (1998)

    Article  Google Scholar 

  4. Peng, X., Huang, Y., Li, F.: A steganography scheme in a low-bit rate speech codec based on 3D-sudoku matrix. In: IEEE International Conference on Communication Software and Networks, pp. 13–18 (2016)

    Google Scholar 

  5. Avcibas, I.: Audio steganalysis with content-independent distortion measures. IEEE Sig. Process. Lett. 13(2), 92–95 (2006)

    Article  Google Scholar 

  6. Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A new approach to Persian/Arabic text steganography. In: IEEE/ACIS International Conference on Computer and Information Science and IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse, pp. 310–315 (2006)

    Google Scholar 

  7. Majumder, A., Changder, S.: A novel approach for text steganography: generating text summary using reflection symmetry. Procedia Technol. 10(10), 112–120 (2013)

    Article  Google Scholar 

  8. Cox, I.J., Miller, M.L.: The first 50 years of electronic watermarking. Eurasip J. Adv. Signal Process. 2002(2), 1–7 (2001)

    MATH  Google Scholar 

  9. Zou, D., Shi, Y.Q.: Formatted text document data hiding robust to printing, copying and scanning. In: IEEE International Symposium on Circuits and Systems, vol. 5, pp. 4971–4974 (2005)

    Google Scholar 

  10. Bennett, K.: Linguistic steganography: survey, analysis, and robustness concerns for hiding information in text (2004)

    Google Scholar 

  11. Chotikakamthorn, N.: Electronic document data hiding technique using inter-character space. In: The 1998 IEEE Asia-Pacific Conference on Circuits and Systems, IEEE APCCAS 1998, pp. 419–422 (1998)

    Google Scholar 

  12. Low, S.H., Maxemchuk, N.F., Lapone, A.M.: Document identification for copyright protection using centroid detection. IEEE Trans. Commun. 46(3), 372–383 (1998)

    Article  Google Scholar 

  13. Desoky, A.: Comprehensive linguistic steganography survey. Int. J. Inf. Comput. Secur. 4(2), 164–197 (2010)

    Google Scholar 

  14. Chapman, M., Davida, G.I., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 156–165. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45439-X_11

    Chapter  Google Scholar 

  15. Chapman, M., Davida, G.I.: Plausible Deniability Using Automated Linguistic Stegonagraphy. In: Davida, G., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol. 2437, pp. 276–287. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45831-X_19

    Chapter  Google Scholar 

  16. Wayner, P.: Mimic functions. Cryptologia 16(3), 193–214 (1992)

    Article  MathSciNet  Google Scholar 

  17. Ge, X., Jiao, R., Tian, H., Wang, J.: Research on information hiding. US-China Educ. Rev. 3(5), 77–81 (2006)

    Google Scholar 

  18. Luo, Y., Huang, Y., Li, F., Chang, C.: Text steganography based on CI-poetry generation using Markov Chain model. KSII Trans. Internet Inf. Syst. 10, 4568–4584 (2016)

    Google Scholar 

  19. Shang, L., Lu, Z., Li, H.: Neural responding machine for short-text conversation, pp. 52–58 (2015)

    Google Scholar 

  20. Pascual, B., Gurruchaga, M., Ginebra, M.P., Gil, F.J., Planell, J.A., Goñ, I.: A neural network approach to context-sensitive generation of conversational responses. Trans. R. Soc. Trop. Med. Hyg. 51(6), 502–504 (2015)

    Google Scholar 

  21. Lewis, M., Yarats, D., Dauphin, Y.N., Parikh, D., Batra, D.: Deal or no deal? End-to-end learning for negotiation dialogues (2017)

    Google Scholar 

  22. Hochreiter, S.: The vanishing gradient problem during learning recurrent neural nets and problem solutions. Int. J. Uncertain., Fuzziness Knowl.-Based Syst. 06(02), 107–116 (1998)

    Article  Google Scholar 

  23. Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)

    Article  Google Scholar 

  24. Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate. Comput. Sci. (2014)

    Google Scholar 

  25. Williams, R.J.: Simple statistical gradient-following algorithms for connectionist reinforcement learning. Mach. Learn. 8(3–4), 229–256 (1992)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhongliang Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, Z., Zhang, P., Jiang, M., Huang, Y., Zhang, YJ. (2018). RITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue Model. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00012-7_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00011-0

  • Online ISBN: 978-3-030-00012-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics