Skip to main content

Information Hiding Based on Typing Errors

  • Conference paper
  • First Online:
  • 1348 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12022))

Abstract

Steganography hides secret in carrier. The carrier can be an image, a soundtrack, a video, a text or some other. Text steganography is sometimes more difficulty than others because of the high density of information carried by text. However, we found that most of the online texts is of a kind that tends to contain many typing errors, known as typos, but humans are very good at disambiguation, so these typos often do not frustrate understanding and sometimes it is even difficult to be recognized. This phenomenon can be found both in English and Chinese. In this paper, we propose a text steganography method using carefully injected typos and guarantee the security of the secret and the readability of the texts. With the help of a natural language processing (NLP) model named BERT, we can extract the secret message without the original text. Different from those format-based steganography algorithms, our method can resist format adjustments, OCR re-inputs, etc. Inspired by the text steganography in English text, text steganography in Chinese text with a similar principle is practical. Furthermore, social media platforms always contain many kinds of media, so Cross-Media or even Cross-Social-Network information hiding is practical when combining multi steganography algorithms.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    https://twitter.com/weibo_go/status/1173971748091379713.

  2. 2.

    https://twitter.com/qtmc1813/status/1173597803987132416.

  3. 3.

    https://twitter.com/KhaosT/status/1111086092667633666.

  4. 4.

    https://twitter.com/KhaosT/status/1128176844128129024.

  5. 5.

    https://twitter.com/slmxny/status/1173807293789589506.

  6. 6.

    https://twitter.com/Shermanbot/status/1128789210419355648.

  7. 7.

    https://www.apple.com/iphone-11-pro/.

  8. 8.

    https://twitter.com/KhaosT/status/1111177188001222656.

  9. 9.

    https://twitter.com/catchase/status/1174217973298601989.

  10. 10.

    https://twitter.com/zmanusa54/status/1174268814906798082.

  11. 11.

    https://twitter.com/VoiceofRaum/status/1174253504543825921.

  12. 12.

    https://twitter.com/porbidaaaa/status/1173819335007014912.

  13. 13.

    https://twitter.com/Candour100/status/1173547897226285056.

  14. 14.

    https://twitter.com/hunantvchina/status/1173836853176201217.

  15. 15.

    https://twitter.com/PDChina/status/1174302519792668672.

  16. 16.

    https://twitter.com/CharlesIIIBall/status/1174220891401723907.

  17. 17.

    https://www.apple.com/iphone-11-pro/.

  18. 18.

    https://twitter.com/KhaosT/status/1115483276276260864.

  19. 19.

    https://twitter.com/Bunny_Citizen98/status/1173972466059943937.

  20. 20.

    https://twitter.com/uuords/status/1128855726917640192.

  21. 21.

    https://www.apple.com/iphone-11-pro/.

  22. 22.

    https://twitter.com/Sony/status/1173621121331159042.

  23. 23.

    https://twitter.com/wemissmusic/status/1174254427890507777.

  24. 24.

    https://twitter.com/KhaosT/status/1125434528699273216.

  25. 25.

    https://twitter.com/The_Bot/status/1173625354965192706.

  26. 26.

    https://twitter.com/MariahCareyAU/status/1173538261618135040.

  27. 27.

    https://twitter.com/patr1ck_w116/status/1173577562230067200.

  28. 28.

    https://twitter.com/Sony/status/1173621262196891649.

References

  1. Por, L.Y., Delina, B.: Information hiding: a new approach in text steganography. In: WSEAS International Conference. Proceedings. Mathematics and Computers in Science and Engineering. No. 7. World Scientific and Engineering Academy and Society (2008)

    Google Scholar 

  2. Shirali-Shahreza, M.H., Shirali-Shahreza, M.: Text steganography in chat. In: 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet. IEEE (2007)

    Google Scholar 

  3. 甘灿(Can Gan), et al.: “一种改进的基于同义词替换的中文文本信息隐藏方法.” (An Improved Chinese Text Steganography Based on Synonym Substitution) 东南大学学报: 自然科学版(Journal of Southeast University: Natural Science Edition) 37.A01, 137–140 (2007)

    Google Scholar 

  4. Luo, Y., Huang, Y.: Text steganography with high embedding rate: using recurrent neural networks to generate chinese classic poetry. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. ACM (2017)

    Google Scholar 

  5. Rawlinson, Graham: The significance of letter position in word recognition. IEEE Aerosp. Electron. Syst. Mag. 22(1), 26–27 (2007)

    Article  Google Scholar 

  6. Matt Davis. MRC Cognition and Brain Sciences Unit. http://www.mrc-cbu.cam.ac.uk/people/matt.davis/Cmabrigde/. Accessed 30 Oct 2003

  7. Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: Bert: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)

  8. Peter Wayner. Hiding Information in the Order of Letters. http://www.wayner.org/books/discrypt2/wordsteg.html. Accessed 08 Jul 2019

  9. Liu, M., Guo, Y., Zhou, L.: Text steganography based on online chat. In: 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE (2009)

    Google Scholar 

  10. Topkara, M., Topkara, U., Atallah, M.J.: Information hiding through errors: a confusing approach. In: Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505. International Society for Optics and Photonics (2007)

    Google Scholar 

  11. Fridrich, J., Goljan, M., Soukal, D.: Wet paper codes with improved embedding efficiency. IEEE Trans. Inf. Forensics Secur. 1(1), 102–110 (2006)

    Article  Google Scholar 

Download references

Acknowledgment

The work is supported by the National Natural Science Foundation of China (NSFC) under Grant no. U1536207, the National Key Research and Development Program of China under no.2016QY08D1600 and the National Key Research and Development Project of China under no. 2016YFB0801405.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Derui Liao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhou, L., Liao, D. (2020). Information Hiding Based on Typing Errors. In: Wang, H., Zhao, X., Shi, Y., Kim, H., Piva, A. (eds) Digital Forensics and Watermarking. IWDW 2019. Lecture Notes in Computer Science(), vol 12022. Springer, Cham. https://doi.org/10.1007/978-3-030-43575-2_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-43575-2_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-43574-5

  • Online ISBN: 978-3-030-43575-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics