Abstract
This paper proposes a novel coverless information hiding method based on news aggregation. It converts the secret message M to a large integer N, and hides N in a news web by changing the order of news headlines. Experimental results and analysis show that this method is robust for any current steganalysis algorithm, and effective for stego-message delivery.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shen, C., Zhang, H., Feng, D.: A survey of information security. Sci. China 37(2), 129–150 (2007)
Zhang, G., Yue, Y., Zhang, C.: Adaptive steganography algorithm of rapid wet paper code based on Hilbert. Comput. Eng. 39(7), 161–164 (2013)
Budhia, U., Kundur, D., Zourntos, T.: Digital video steganalysis exploiting statistical visibilityin the temporal domain. IEEE Trans. Inf. Forensics Secur. 1(4), 502–516 (2006)
Bai, Y., Bai, S., Liu, C.: Digital audio watermarking algorithm based on wavelet and cepstrum domain. Comput. Appl. Softw. 29(3), 163–167 (2012)
Fu, D., Chen, G., Yang, Q.: A covert communication method based on XML documents slicing. Comput. Appl. Softw. 28(9), 106–107 (2011)
Xia, Z., Wang, X., Sun, X., et al.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed. Tools Appl. 75(4), 1947–1962 (2016)
Xia, Z., Wang, X., Sun, X., et al.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014)
Fu, Z., Ren, K., Shu, J., et al.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546–2559 (2016)
Fu, Z., Wu, X., Guan, C., et al.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)
Fu, Z., Sun, X., Liu, Q., et al.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98-B(1), 190–200 (2015)
Chen, X., Sun, H., Tobe, Y., Zhou, Z., Sun, X.: Coverless information hiding method based on the chinese mathematical expression. In: Huang, Z., Sun, X., Luo, J., Wang, Jian (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 133–143. Springer, Cham (2015). doi:10.1007/978-3-319-27051-7_12
Zhou, Z., Mu, Y., Zhao, N., Wu, Q.M.J., Yang, C.-N.: Coverless information hiding method based on multi-keywords. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10039, pp. 39–47. Springer, Cham (2016). doi:10.1007/978-3-319-48671-0_4
Zhang, J., Shen, J., Wang, L., Lin, H.: Coverless text information hiding method based on the word rank map. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10039, pp. 145–155. Springer, Cham (2016). doi:10.1007/978-3-319-48671-0_14
Chen, X., Chen, S., Wu, Y.: Coverless information hiding method based on the chinese character encoding. J. Internet Technol. 18(2), 91–98 (2017)
Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 123–132. Springer, Cham (2015). doi:10.1007/978-3-319-27051-7_11
Zhou, Z., Cao, Y., Sun, X.: Coverless information hiding based on bag-of-words model of image. Electron. Inf. Eng. 527–536 (2016)
Yuan, C., Xia, Z., Sun, X.: Coverless image steganography based on SIFT and BOF. J. Internet Technol. 18(2), 209–216 (2017)
Lu, K.C.: Combination Mathematics, 2nd edn, pp. 16–18. Tsinghua University Press, Beijing (1991)
Sun, X., Huang, H., Wang, B., et al.: An algorithm of webpage information hiding based on equal tag. J. Comput. Res. Dev. 756–760 (2007)
Zhao, H., Lin, G., Chen, S., et al.: Chinese character coding and redundancy analysis. J. Dongguan Univ. Technol. 39–44 (2012)
Acknowledgments
This work is supported by National Natural Science Foundation of China (61373132), Key Laboratory of Hunan Province Of Basic Education Information Technology (2015TP1017), Research Project of Teaching Reform in Colleges and Universities in Hunan (2012[528]).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Liu, C., Luo, G., Tian, Z. (2017). Coverless Information Hiding Technology Research Based on News Aggregation. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10602. Springer, Cham. https://doi.org/10.1007/978-3-319-68505-2_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-68505-2_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68504-5
Online ISBN: 978-3-319-68505-2
eBook Packages: Computer ScienceComputer Science (R0)