Skip to main content

Coverless Information Hiding Method Based on the Chinese Mathematical Expression

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9483))

Abstract

Recently, many fruitful results have been presented in text information hiding such as text format-based, text image-based method and so on. However, existing information hiding approaches so far have been very difficult to resist the detecting techniques in steganalysis based on statistical analysis. Based on the Chinese mathematical expression, an efficient method of coverless text information hiding is presented, which is a brand-new method for information hiding. The proposed algorithm directly generates a stego-vector from the hidden information at first. Then based on text big data, a normal text that includes the stego-vector will be retrieved, which means that the secret messages can be send to the receiver without any modification for the stego-text. Therefore, this method is robust for any current steganalysis algorithm, and it has a great value in theory and practical significance.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cox, I.J., Miller, M.L.: The first 50 years of electronic watermarking. J. Appl. Signal Process. 2, 126–132 (2002)

    Article  Google Scholar 

  2. Low, S.H., Maxemchuk, N.F., Lapone, A.M.: Document identification for copyright protection using centroid detection. IEEE Trans. Commun. 46(3), 372–383 (1998)

    Article  Google Scholar 

  3. Brassil, J.T., Low, S.H., Maxemchuk, N.F.: Copyright protection for the electronic distribution of text documents. Proc. IEEE 87(7), 1181–1196 (1999)

    Article  Google Scholar 

  4. Ffencode for DOS (2015). http://www.burks.de/stegano/ffencode.html

  5. WbStego4.2 (2015). http://home.tele2.at/wbailer/wbstego/

  6. Kwan M. Snow (2015). http://www.darkside.com.au/snow/index.html

  7. Koluguri, A., Gouse, S., Reddy, P.B.: Text steganography methods and its tools. Int. J. Adv. Sci. Tech. Res. 2(4), 888–902 (2014)

    Google Scholar 

  8. Qi, X., Qi, J.: A desynchronization resilient watermarking scheme. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security IV. LNCS, vol. 5510, pp. 29–48. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  9. Blass, E.O., Mayberry, T., Noubir, G., Onarlioglu, K.: Toward robust hidden volumes using write-only oblivious RAM. In: Proceedings of the 2014 ACM Conference on Computer and Communications Security (CCS 2014), pp. 203–214 (2014)

    Google Scholar 

  10. Mayberry, T., Blass, E.O., Chan, A.H.: Efficient Private file retrieval by combining ORAM and PIR. In: Proceedings of 20th Annual Network & Distributed System Security Symposium (NDSS 2014), pp. 1–11 (2014)

    Google Scholar 

  11. Goyal, L., Raman, M., Diwan, P.: A robust method for integrity protection of digital data in text document watermarking. Int. J. Sci. Res. Dev. 1(6), 14–18 (2014)

    Google Scholar 

  12. Kwon, H., Kim, Y., Lee, S.: A tool for the detection of hidden data in microsoft compound document file format. In: 2008 International Conference on Information Science and Security, pp. 141–146 (2008)

    Google Scholar 

  13. Wu, M., Liu, B.: Data hiding in binary images for authentication and annotation. IEEE Trans. Multimedia 6(4), 528–538 (2004)

    Article  Google Scholar 

  14. Zhao, J., Koch, E.: Embedding robust labels into images for copyright protection. In: Proceedings of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Australia, pp. 242–251 (1995)

    Google Scholar 

  15. Xia, Z.H., Wang, S.H., Sun, X.M., Wang, J.: Print-scan resilient watermarking for the Chinese text image. Int. J. Grid Distrib. Comput. 6(6), 51–62 (2013)

    Article  Google Scholar 

  16. Tan, L.N., Sun, X.M., Sun, G.: Print-scan resilient text image watermarking based on stroke direction modulation for Chinese document authentication. Radioengineering 21(1), 170–181 (2012)

    MathSciNet  Google Scholar 

  17. Daraee, F., Mozaffari, S.: Watermarking in binary document images using fractal codes. Pattern Recogn. Lett. 35, 120–129 (2014)

    Article  Google Scholar 

  18. Satir, E., Isik, H.: A compression-based text steganography method. J. Syst. Softw. 85(10), 2385–2394 (2012)

    Article  Google Scholar 

  19. Wayner, P.: Disappearing Cryptography: Information Hiding: Steganography & Watermarking, 2nd edn. Morgan Kaufmann, San Francisco (2009)

    Google Scholar 

  20. Taskiran, C.M., Topkara, U., Topkara, M.: Attacks on lexical natural language steganography systems. In: Proceedings of the SPIE, Security, Steganography and Watermarking of Multimedia Contents VIII, San Jose, USA, pp. 97–105 (2006)

    Google Scholar 

  21. Meng, P., Huang, L.S, Yang, W.: Attacks on translation based steganography. In: 2009 IEEE Youth Conference on Information, Computing and Telecommunication, Beijing, China, pp. 227–230 (2009)

    Google Scholar 

  22. Nematollahi, M.A., Al-Haddad, S.A.R.: An overview of digital speech watermarking. Int. J. Speech Technol. 16(4), 471–488 (2013)

    Article  Google Scholar 

  23. Mali, M.L., Patil, N.N., Patil, J.B.: Implementation of text watermarking technique using natural language. In: IEEE International Conference on Communication Systems and Network Technologies, pp. 482–486 (2013)

    Google Scholar 

  24. Xiangrong, X., Xingming, S.: Design and implementation of content-based English text watermarking algorithm. Comput. Eng. 31(22), 29–31 (2005)

    Google Scholar 

  25. Topkara, M., Topkara, U., Atallah, M.J.: Information hiding through errors: a confusing approach. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents, San Jose, 6505 V (2007)

    Google Scholar 

  26. Rafat, K.F.: Enhanced text steganography in SMS. In: 2009 2nd International Conference on Computer, Control and Communication, Karachi, pp. 1–6 (2009)

    Google Scholar 

  27. Meral, H.M., Sankur, B., Ozsoy, A.S.: Natural language watermarking via morphosyntactic alterations. Comput. Speech Lang. 23(1), 107–125 (2009)

    Article  Google Scholar 

  28. Liu, Y., Sun, X., Wu, Y.: A natural language watermarking based on chinese syntax. In: Wang, L., Chen, K., Ong, Y.S. (eds.) ICNC 2005. LNCS, vol. 3612, pp. 958–961. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  29. Kim, M.Y., Zaiane, O.R., Goebel, R.: Natural language watermarking based on syntactic displacement and morphological division. In: 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, Seoul, Korea, pp. 164–169 (2010)

    Google Scholar 

  30. Dai, Z.X., Hong, F.: Watermarking text documents based on entropy of part of speech string. J. Inf. Comput. Sci. 4(1), 21–25 (2007)

    Google Scholar 

  31. Gang, L., Xingming, S., Lingyun, X., Yuling, L., Can, G.: Steganalysis on synonym substitution steganography. J. Comput. Res. Dev. 45(10), 1696–1703 (2008)

    Google Scholar 

  32. Peng, M., Liu-sheng, H., Zhi-li, C., Wei, Y., Ming, Y.: Analysis and detection of translation based steganography. ACTA Electronica Sinica 38(8), 1748–1752 (2010)

    Google Scholar 

  33. Sun, X.M., Chen, H.W., Yang, L.H., Tang, Y.Y.: Mathematical representation of a chinese character and its applications. Int. J. Pattern Recogn. Artif. Intell. 16(8), 735–747 (2002)

    Article  Google Scholar 

  34. Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 99 (2015). doi: 10.1109/TPDS.2015.2401003

  35. Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98, 190–200 (2015)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (NSFC) (61232016, U1405254, 61502242, 61173141, 61173142, 61173136, 61373133), Jiangsu Basic Research Programs-Natural Science Foundation (SBK2015041480), Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology (S8113084001), Open Fund of Demonstration Base of Internet Application Innovative Open Platform of Department of Education (KJRP1402), Priority Academic Program Development of Jiangsu Higher Education Institutions (PADA) Fund, Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) Fund, National Ministry of Science and Technology Special Project Research GYHY201301030, 2013DFG12860, BC2013012.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xingming Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Chen, X., Sun, H., Tobe, Y., Zhou, Z., Sun, X. (2015). Coverless Information Hiding Method Based on the Chinese Mathematical Expression. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds) Cloud Computing and Security. ICCCS 2015. Lecture Notes in Computer Science(), vol 9483. Springer, Cham. https://doi.org/10.1007/978-3-319-27051-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27051-7_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27050-0

  • Online ISBN: 978-3-319-27051-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics