Abstract
Steganography based on texts has always been a hot but extremely hard research topic. Due to the high coding characteristics of the text compared to other information carriers, the redundancy of information is very low, which makes it really difficult to hide information inside. In this paper, combined with the recurrent neural network (RNN) and reinforcement learning (RL), we designed and implemented a real-time interactive text steganography model (RITS). The proposed model can automatically generate semantically coherent and syntactically correct dialogues based on the input sentence, through the reasonable encoding of the text in the dialog generation process to realize secret information hiding and transmission. We trained our model using publicly collected datasets which contains 5808 dialogues and evaluated the proposed model from several perspectives. Experimental results show that the proposed model can be very efficient to implement the embedding and extraction of information. The generated dialogue texts are of high quality which shows high concealment.
This work is supported by the National Key Research and Development Program of China (No. 2016YFB0800402) and the National Natural Science Foundation of China (No. U1405254, U1536201, U1705261).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kipper, G.: Investigator’s Guide to Steganography. CRC Press, Inc., Boca Raton (2003)
Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 123–132. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27051-7_11
Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Sig. Process. 66, 385–403 (1998)
Peng, X., Huang, Y., Li, F.: A steganography scheme in a low-bit rate speech codec based on 3D-sudoku matrix. In: IEEE International Conference on Communication Software and Networks, pp. 13–18 (2016)
Avcibas, I.: Audio steganalysis with content-independent distortion measures. IEEE Sig. Process. Lett. 13(2), 92–95 (2006)
Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A new approach to Persian/Arabic text steganography. In: IEEE/ACIS International Conference on Computer and Information Science and IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse, pp. 310–315 (2006)
Majumder, A., Changder, S.: A novel approach for text steganography: generating text summary using reflection symmetry. Procedia Technol. 10(10), 112–120 (2013)
Cox, I.J., Miller, M.L.: The first 50 years of electronic watermarking. Eurasip J. Adv. Signal Process. 2002(2), 1–7 (2001)
Zou, D., Shi, Y.Q.: Formatted text document data hiding robust to printing, copying and scanning. In: IEEE International Symposium on Circuits and Systems, vol. 5, pp. 4971–4974 (2005)
Bennett, K.: Linguistic steganography: survey, analysis, and robustness concerns for hiding information in text (2004)
Chotikakamthorn, N.: Electronic document data hiding technique using inter-character space. In: The 1998 IEEE Asia-Pacific Conference on Circuits and Systems, IEEE APCCAS 1998, pp. 419–422 (1998)
Low, S.H., Maxemchuk, N.F., Lapone, A.M.: Document identification for copyright protection using centroid detection. IEEE Trans. Commun. 46(3), 372–383 (1998)
Desoky, A.: Comprehensive linguistic steganography survey. Int. J. Inf. Comput. Secur. 4(2), 164–197 (2010)
Chapman, M., Davida, G.I., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 156–165. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45439-X_11
Chapman, M., Davida, G.I.: Plausible Deniability Using Automated Linguistic Stegonagraphy. In: Davida, G., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol. 2437, pp. 276–287. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45831-X_19
Wayner, P.: Mimic functions. Cryptologia 16(3), 193–214 (1992)
Ge, X., Jiao, R., Tian, H., Wang, J.: Research on information hiding. US-China Educ. Rev. 3(5), 77–81 (2006)
Luo, Y., Huang, Y., Li, F., Chang, C.: Text steganography based on CI-poetry generation using Markov Chain model. KSII Trans. Internet Inf. Syst. 10, 4568–4584 (2016)
Shang, L., Lu, Z., Li, H.: Neural responding machine for short-text conversation, pp. 52–58 (2015)
Pascual, B., Gurruchaga, M., Ginebra, M.P., Gil, F.J., Planell, J.A., Goñ, I.: A neural network approach to context-sensitive generation of conversational responses. Trans. R. Soc. Trop. Med. Hyg. 51(6), 502–504 (2015)
Lewis, M., Yarats, D., Dauphin, Y.N., Parikh, D., Batra, D.: Deal or no deal? End-to-end learning for negotiation dialogues (2017)
Hochreiter, S.: The vanishing gradient problem during learning recurrent neural nets and problem solutions. Int. J. Uncertain., Fuzziness Knowl.-Based Syst. 06(02), 107–116 (1998)
Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)
Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate. Comput. Sci. (2014)
Williams, R.J.: Simple statistical gradient-following algorithms for connectionist reinforcement learning. Mach. Learn. 8(3–4), 229–256 (1992)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Yang, Z., Zhang, P., Jiang, M., Huang, Y., Zhang, YJ. (2018). RITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue Model. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-00012-7_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00011-0
Online ISBN: 978-3-030-00012-7
eBook Packages: Computer ScienceComputer Science (R0)