Abstract
This paper proposes a secret information transmission scheme for English texts by using the characteristics of invisible ASCII codes. The scheme incorporates two stages, the information hiding stage and the information extracting stage. The first stage takes the prepared carrier documents and the secret information need to be embedded as the input. Then, the information hiding procedure of the scheme will synthesize the carrier document and the secret information into a stego document. In the second stage, an extracting procedure will pick up the secret information when it receives the stego document that generated by the first stage. The scheme achieves hiding effects by processing the bland spaces in the English texts. The experimental results have shown that our information hiding scheme is feasible, reliable, safe and efficient.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bennett, K.: Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text. Technical Report 2004-13, Purdue University (2004)
Fu, D.L., Chen, G.X., Yang, Q.X.: A Covert Communication Method Based on XML Documents Slicing. Computer Applications and Software 28(9), 106–108 (2011)
Gu, T.F., Yue, H.Y.: DCT Coefficient-based Encrypted Information Hiding Technology and its Implementation. Computer Applications and Software 28(6), 173–175 (2011)
Udit, B., Deepa, K., Takis, Z.: Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain. IEEE Transactions on Information Forensics and Security 1(4), 502–516 (2006)
Ehsan, N., Jane, Z.W., Rabab, K.W.: Robust Image Watermarking Based on Multiscale Gradient Direction Quantization. IEEE Transactions on Information Forensics and Security 6(4), 1200–1239 (2011)
Murphy, B.: Syntactic information hiding in plain text. Master’s thesis. Trinity College Dublin (2001)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Li, Y., Hong, X., Cui, G., Zhu, E. (2015). Study of a Secret Information Transmission Scheme Based on Invisible ASCII Characters. In: Tan, Y., Shi, Y., Buarque, F., Gelbukh, A., Das, S., Engelbrecht, A. (eds) Advances in Swarm and Computational Intelligence. ICSI 2015. Lecture Notes in Computer Science(), vol 9141. Springer, Cham. https://doi.org/10.1007/978-3-319-20472-7_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-20472-7_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-20471-0
Online ISBN: 978-3-319-20472-7
eBook Packages: Computer ScienceComputer Science (R0)