Abstract
Steganography hides secret in carrier. The carrier can be an image, a soundtrack, a video, a text or some other. Text steganography is sometimes more difficulty than others because of the high density of information carried by text. However, we found that most of the online texts is of a kind that tends to contain many typing errors, known as typos, but humans are very good at disambiguation, so these typos often do not frustrate understanding and sometimes it is even difficult to be recognized. This phenomenon can be found both in English and Chinese. In this paper, we propose a text steganography method using carefully injected typos and guarantee the security of the secret and the readability of the texts. With the help of a natural language processing (NLP) model named BERT, we can extract the secret message without the original text. Different from those format-based steganography algorithms, our method can resist format adjustments, OCR re-inputs, etc. Inspired by the text steganography in English text, text steganography in Chinese text with a similar principle is practical. Furthermore, social media platforms always contain many kinds of media, so Cross-Media or even Cross-Social-Network information hiding is practical when combining multi steganography algorithms.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
- 14.
- 15.
- 16.
- 17.
- 18.
- 19.
- 20.
- 21.
- 22.
- 23.
- 24.
- 25.
- 26.
- 27.
- 28.
References
Por, L.Y., Delina, B.: Information hiding: a new approach in text steganography. In: WSEAS International Conference. Proceedings. Mathematics and Computers in Science and Engineering. No. 7. World Scientific and Engineering Academy and Society (2008)
Shirali-Shahreza, M.H., Shirali-Shahreza, M.: Text steganography in chat. In: 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet. IEEE (2007)
甘灿(Can Gan), et al.: “一种改进的基于同义词替换的中文文本信息隐藏方法.” (An Improved Chinese Text Steganography Based on Synonym Substitution) 东南大学学报: 自然科学版(Journal of Southeast University: Natural Science Edition) 37.A01, 137–140 (2007)
Luo, Y., Huang, Y.: Text steganography with high embedding rate: using recurrent neural networks to generate chinese classic poetry. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. ACM (2017)
Rawlinson, Graham: The significance of letter position in word recognition. IEEE Aerosp. Electron. Syst. Mag. 22(1), 26–27 (2007)
Matt Davis. MRC Cognition and Brain Sciences Unit. http://www.mrc-cbu.cam.ac.uk/people/matt.davis/Cmabrigde/. Accessed 30 Oct 2003
Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: Bert: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)
Peter Wayner. Hiding Information in the Order of Letters. http://www.wayner.org/books/discrypt2/wordsteg.html. Accessed 08 Jul 2019
Liu, M., Guo, Y., Zhou, L.: Text steganography based on online chat. In: 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE (2009)
Topkara, M., Topkara, U., Atallah, M.J.: Information hiding through errors: a confusing approach. In: Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505. International Society for Optics and Photonics (2007)
Fridrich, J., Goljan, M., Soukal, D.: Wet paper codes with improved embedding efficiency. IEEE Trans. Inf. Forensics Secur. 1(1), 102–110 (2006)
Acknowledgment
The work is supported by the National Natural Science Foundation of China (NSFC) under Grant no. U1536207, the National Key Research and Development Program of China under no.2016QY08D1600 and the National Key Research and Development Project of China under no. 2016YFB0801405.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhou, L., Liao, D. (2020). Information Hiding Based on Typing Errors. In: Wang, H., Zhao, X., Shi, Y., Kim, H., Piva, A. (eds) Digital Forensics and Watermarking. IWDW 2019. Lecture Notes in Computer Science(), vol 12022. Springer, Cham. https://doi.org/10.1007/978-3-030-43575-2_19
Download citation
DOI: https://doi.org/10.1007/978-3-030-43575-2_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43574-5
Online ISBN: 978-3-030-43575-2
eBook Packages: Computer ScienceComputer Science (R0)