Skip to main content

Hiding Information by Context-Based Synonym Substitution

  • Conference paper
Digital Watermarking (IWDW 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5703))

Included in the following conference series:

Abstract

Many methods of linguistic steganography have been proposed by using synonym-substitution to preserve the meaning of the text. However, most of these methods replace words simply according to a static synonym set without considering the context. In this paper, we present a novel method that replaces a word by its synonym on condition that its synonym is suitable for the context. A synonym’s candidates are chosen according to context, therefore, in different context the candidates can be different although the word to be replaced is the same. As a result, both of the synonym set and the encoding are dynamic. In our experiment, we use Chinese language to implement our method. The experimental results show that the method is almost twice as good as other two existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bennett, K.: Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text. Purdue University, CERIAS Tech. Report, 13:2004 (2004)

    Google Scholar 

  2. Bolshakov, I.A.: A method of linguistic steganography based on collocationally-verified synonymy. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 180–191. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Chapman, M., Davida, G.I., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 156–165. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Chiang, Y.L., Chang, L.P., Hsieh, W.T., Chen, W.C.: Natural language watermarking using semantic substitution for chinese text. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 129–140. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Sougou Labs. SogouR, http://www.sogou.com/labs/dl/r.html

  6. Hui, W.: The statistical study of Chinese vocabulary. Date of publication unknown from the online source, http://www.huayuqiao.org/articles/wanghui/wanghui06 (doc. Last checked: 2005-06-20)

  7. HIT IR Lab. Chilin-Thesaurus of Chinese Words

    Google Scholar 

  8. Low, S.H., Maxemchuk, N.F., Brassil, J.T., O’Gorman, L.: Document marking and identification using both line and wordshifting. In: IEEE INFOCOM 1995. Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Bringing Information to People. Proceedings, pp. 853–860 (1995)

    Google Scholar 

  9. Miller, G.A.: WordNet: a lexical database for English. Communications of the ACM 38(11), 39–41 (1995)

    Article  Google Scholar 

  10. Topkara, M., Taskiran, C.M., Delp III, E.J., et al.: Natural language watermarking. In: Proc. SPIE, vol. 5681, pp. 441–452 (2005)

    Google Scholar 

  11. Wayner, P.: Disappearing cryptography: information hiding: steganography & watermarking. Morgan Kaufmann, San Francisco (2002)

    Google Scholar 

  12. Winstein, K.: Lexical steganography through adaptive modulation of the word choice hash

    Google Scholar 

  13. Yuling, L., Xingming, S., Can, G., Hong, W.: An Efficient Linguistic Steganography for Chinese Text. In: 2007 IEEE International Conference on Multimedia and Expo, pp. 2094–2097 (2007)

    Google Scholar 

  14. Zhang, H.P., Yu, H.K., Xiong, D.Y., Liu, Q.: HHMM-based Chinese lexical analyzer ICTCLAS. In: Proceedings of Second SIGHAN Workshop on Chinese Language Processing, pp. 184–187 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zheng, X., Huang, L., Chen, Z., Yu, Z., Yang, W. (2009). Hiding Information by Context-Based Synonym Substitution. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds) Digital Watermarking. IWDW 2009. Lecture Notes in Computer Science, vol 5703. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03688-0_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03688-0_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03687-3

  • Online ISBN: 978-3-642-03688-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics