Coverless Information Hiding Method Based on the Chinese Character Encoding

被引:82
作者
Chen, Xianyi [1 ]
Chen, Sheng
Wu, Yulei
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing, Jiangsu, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2017年 / 18卷 / 02期
关键词
Coverless information hiding; Chinese character encoding; Tags; Success rate; IMAGE; STEGANALYSIS;
D O I
10.6138/JIT.2017.18.2.20160815
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, coverless information hiding, which requires no modification on covers and could resist various steganalysis technologies, draws more and more attention from researchers. However, how to locate and extract the secret message is still a major challenge. Based on the big data of texts, we propose a coverless information hiding method using Chinese character encoding technology. In the proposed method, the tags which are based on binary numbers and transformed by Chinese characters, are designed to locate the secret information and meet the requirements of both randomness and universality. It could enhance the security of the proposed method. Then the receiver would extract the secret information according to several certain tags, which are selected based on an independent secret key of the receiver. The experimental results show that the success rate of hiding could reach up to about 95.25%, and this proves the proposed method works efficiently.
引用
收藏
页码:313 / 320
页数:8
相关论文
共 25 条
  • [1] [Anonymous], INT J ADV SCI TECHNI
  • [2] [Anonymous], INT C CLOUD COMP SEC
  • [3] [Anonymous], DISAPPEARING CRYPTOG
  • [4] Chen X., 2016, INT C CLOUD COMP SEC, P133
  • [5] Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
    Fu, Zhangjie
    Wu, Xinle
    Guan, Chaowen
    Sun, Xingming
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) : 2706 - 2716
  • [6] Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
    Fu, Zhangjie
    Ren, Kui
    Shu, Jiangang
    Sun, Xingming
    Huang, Fengxiao
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (09) : 2546 - 2559
  • [7] Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT
    Holub, Vojtech
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (02) : 219 - 228
  • [8] A Secret Communication Method Based on Watermarking Technique Using Genetic Algorithm
    Huang, Der-Chen
    Hung, Kun-Ding
    Hou, Ting-Wei
    Chan, Yung-Kuan
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (01): : 85 - 93
  • [9] Segmentation-Based Image Copy-Move Forgery Detection Scheme
    Li, Jian
    Li, Xiaolong
    Yang, Bin
    Sun, Xingming
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 507 - 518
  • [10] Document identification for copyright protection using centroid detection
    Low, SH
    Maxemchuk, NF
    Lapone, AM
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1998, 46 (03) : 372 - 383