Journal of Applied Sciences ›› 2021, Vol. 39 ›› Issue (6): 923-938.doi: 10.3969/j.issn.0255-8297.2021.06.004
• Intelligent Security Defense Theory and Technology in Special Region • Previous Articles Next Articles
KANG Huixian, YI Biao, WU Hanzhou
Received:
2021-06-01
Published:
2021-12-04
CLC Number:
KANG Huixian, YI Biao, WU Hanzhou. Recent Advances in Text Steganography and Steganalysis[J]. Journal of Applied Sciences, 2021, 39(6): 923-938.
[1] Shannon C E. Communication theory of secrecy systems[J]. The Bell System Technical Journal, 1949, 28(4):656-715. [2] Low S H, Maxemchuk N F, Brassil J T, et al. Document marking and identification using both line and word shifting[C]//Proceedings of INFOCOM. IEEE, 1995, 2:853-860. [3] Mahato S, Yadav D K, Khan D A. A novel approach to text steganography using font size of invisible space characters in Microsoft word document[M]. New Delhi:Springer, 2014. [4] Kumar R, Malik A, Singh S, et al. A space based reversible high capacity text steganography scheme using font type and style[C]//International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2016:1090-1094. [5] Ali A A, Saad A. New text steganography technique by using mixed-case font[J]. International Journal of Computer Applications, 2013, 62(3):6-9. [6] Khairullah M D. A novel text steganography system using font color of the invisible characters in Microsoft word documents[C]//2009 second international conference on computer and electrical engineering. IEEE, 2009:482-484. [7] Tang X, Chen M S. Design and implementation of information hiding system based on RGB[C]//20133rd International Conference on Consumer Electronics, Communications and Networks. IEEE, 2013:217-220. [8] 陈芳, 王冰. 基于文本字体的信息隐藏算法[J]. 计算机技术与发展, 2006, 16(1):20-22. Chen F, Wang B. An algorithm of text information hiding based on font[J]. Computer Technology and Development, 2006, 16(1):20-22. (in Chinese) [9] 付兵. 基于字符Unicode编码奇偶性的文本信息隐藏算法研究[J]. 福建电脑, 2008, 24(12):66. Fu B. Research on text information hiding algorithms based on Unicode coding parity[J]. Fujian Computer, 2008, 24(12):66. (in Chinese) [10] 陆绿, 方勇. 基于字符Unicode奇偶性的数字水印设计与实现[J]. 计算机技术与发展, 2010, 20(8):176-179. Lu L, Fang Y. Design and implementation of digital watermark based on character Unicode parity[J]. Computer Technology and Development, 2010, 20(8):176-179. (in Chinese) [11] 黄国超, 王衍波, 张凯泽. 基于Unicode编码的信息隐藏算法研究与设计[J]. 计算机技术与发展, 2011, 21(10):233-236. Huang G C, Wang Y B, Zhang K Z. Research and design of information hiding algorithm based on encoding of Unicode[J]. Computer Technology and Development, 2011, 21(10):233- 236. (in Chinese) [12] Liu F, Luo P P, Ma Z J, et al. Security secret information hiding based on hash function and invisible ASCII characters replacement[C]//2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2016:1963-1969. [13] 崔光明, 洪星, 袁翔, 等. 基于不可见字符替换的信息隐藏方法研究[J]. 计算机应用与软件, 2016, 33(4):277-280. Cui G M, Hong X, Yuan X, et al. Research on information hiding based on invisible characters replacement[J]. Computer Applications & Software, 2016, 33(4):277-280. (in Chinese) [14] 张震宇, 李千目, 戚湧. 基于不可见字符的文本水印设计[J]. 南京理工大学学报(自然科学版), 2017, 41(4):405-411. Zhang Z Y, Li Q M, Qi Y. Text watermarking design based on invisible characters[J]. Journal of Nanjing University of Science and Technology, 2017, 41(4):405-411. (in Chinese) [15] 赵敏之, 孙星明, 向华政. 基于虚词变换的自然语言信息隐藏算法研究[J]. 计算机工程与应用, 2006, 42(3):158-160. Zhao M Z, Sun X M, Xiang H Z. Research on the Chinese text steganography based on the modification of the empty word[J]. Computer Engineering and Application, 2006, 42(3):158-160. (in Chinese) [16] 刘玉玲, 孙星明, 辛国江. 基于移位变换的句子层自然语言信息隐藏算法[J]. 控制与决策, 2009, 24(12):1861-1864. Liu Y L, Sun X M, Xin G J. Algorithm of natural language information hiding based on shift conversion in sentence level[J]. Control and Decision, 2009:24(12):1861-1864. (in Chinese) [17] Wang F, Huang L S, Chen Z L, et al. A novel text steganography by context-based equivalent substitution[C]//2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013). IEEE, 2013:1-6. [18] Shirali-Shahreza M, Shirali-Shahreza M H. Text steganography in SMS[C]//International Conference on Convergence Information Technology (ICCIT 2007). IEEE, 2007:2260-2265. [19] Rafat K F. Enhanced text steganography in SMS[C]//20092nd International Conference on Computer, Control and Communication. IEEE, 2009:1-6. [20] 甘灿. 基于同义词替换的自然语言文本信息隐藏技术研究[D]. 长沙:湖南大学, 2008. [21] 甘灿, 孙星明, 刘玉玲, 等. 一种改进的基于同义词替换的中文文本信息隐藏方法[J]. 东南大学学报(自然科学版), 2007, 37(增刊1):137-140. Gan C, Sun X M, Liu Y L, et al. Improved steganographic algorithm based on synonymy substitution for Chinese text[J]. Journal of Southeast University (Natural Science Edition), 2007, 37(Suppl.1):137-140. (in Chinese) [22] 杨潇, 李峰, 向凌云. 基于矩阵编码的同义词替换隐写算法[J]. 小型微型计算机系统, 2015, 36(6):1296-1300. Yang X, Li F, Xiang L Y. Synonym substitution-based steganographic algorithm with matrix coding[J]. Journal of Chinese Mini-Micro Computer Systems, 2015, 36(6):1296-1300. (in Chinese) [23] Bolshakov I A, Gelbukh A. Synonymous paraphrasing using word net and Internet[C]//International Conference on Application of Natural Language to Information Systems. Heidelberg:Springer, 2004:312-323. [24] Dai W H, Yu Y, Dai Y H, et al. Text steganography system using Markov chain source model and DES algorithm[J]. Journal of Software, 2010, 5(7):785-792. [25] Moraldo H H. An Approach for text steganography based on Markov chains[EB/OL].[2014- 09-02]. https://arxiv.org/abs/1409.0915. [26] Luo Y B, Huang Y F, Li F F, et al. Text steganography based on ci-poetry generation using Markov chain model[J]. KSII Transactions on Internet and Information Systems (TIIS), 2016, 10(9):4568-4584. [27] Yang Z L, Jin S Y, Huang Y F, et al. Automatically generate steganographic text based on Markov model and Huffman coding[EB/OL].[2018-11-12]. https://arxiv.org/abs/1811.04720. [28] Fang T, Jaggi M, Argyraki K. Generating steganographic text with LSTMs[EB/OL].[2017- 05-30]. https://arxiv.org/abs/1705.10742. [29] Yang Z L, Guo X Q, Chen Z M, et al. RNN-Stega:linguistic steganography based on recurrent neural networks[J]. IEEE Transactions on Information Forensics and Security, 2018, 14(5):1280-1295. [30] Yang Z L, Wei N, Liu Q S, et al. GAN-TStega:text steganography based on generative adversarial networks[C]//International Workshop on Digital Watermarking. Cham:Springer, 2019, 12022 LNCS:18-31. [31] Kang H X, Wu H Z, Zhang X P. Generative text steganography based on LSTM network and attention mechanism with keywords[J]. Electronic Imaging, 2020(4):2911-2918. [32] Ziegler Z M, Deng Y, Rush A M. Neural linguistic steganography[EB/OL].[2019-09-03]. https://arxiv.org/abs/1909.01496. [33] Shen J M, Ji H, Han J W. Near-imperceptible neural linguistic steganography via selfadjusting arithmetic coding[EB/OL].[2020-10-01].https://arxiv.org/abs/2010.00677. [34] Yang Z L, Zhang S Y, Hu Y T, et al. VAE-Stega:linguistic steganography based on variational auto-encoder[J]. IEEE Transactions on Information Forensics and Security, 2020, 16:880-895. [35] Yang Z L, Zhang P Y, Jiang M Y, et al. Rits:real-time interactive text steganography based on automatic dialogue model[C]//International Conference on Cloud Computing and Security. Cham:Springer, 2018, 11065:253-264. [36] 薛一鸣, 周雪婧, 周小诗, 等. 基于图像描述的文本信息隐藏[J]. 北京邮电大学学报, 2018, 41(6):7-13. Xue Y M, Zhou X Q, Zhou X S, et al. Text information hiding based on image caption[J]. Journal of Beijing University of Posts and Telecommunications, 2018, 41(6):7-13. (in Chinese) [37] Guo Y Y, Wu H Z, Zhang X P. Steganographic visual story with mutual-perceived joint attention[J]. EURASIP Journal on Image and Video Processing, 2021(1):1-14. [38] Li L J, Huang L S, Zhao X X, et al. A statistical attack on a kind of word-shift textsteganography[C]//International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IEEE, 2008:1503-1507. [39] Xiang L Y, Sun X M, Luo G, et al. Research on steganalysis for text steganography based on font format[C]//Third International Symposium on Information Assurance and Security. IEEE, 2007:287-294. [40] 曾莱蓓, 孙星明, 向凌云, 等. 基于虚词变换的文本隐藏信息检测方法研究[J]. 计算机研究与发展, 2009, 46(增刊1):177-181. Zeng L B, Sun X M, Xiang L Y, et al. Research on text hidden information detection method based on virtual word transformation[J]//Journal of Computer Research and Development, 2009, 46(Suppl.1):177-181. (in Chinese) [41] Taskiran C M, Topkara U, Topkara M, et al. Attacks on lexical natural language steganography systems[C]//Security, Steganography, and Watermarking of Multimedia Contents VIII. International Society for Optics and Photonics, 2006, 6072:607209. [42] Ling Y X, Sun X M, Gang L, et al. Linguistic steganalysis using the features derived from synonym frequency[J]. Multimedia Tools and Applications, 2014, 71(3):1893-1911. [43] Chen Z L, Huang L S, Yu Z S, et al. A statistical algorithm for linguistic steganography detection based on distribution of words[C]//2008 Third International Conference on Availability, Reliability and Security. IEEE, 2008. 558-563. [44] Chen Z L, Huang L S, Yu Z S, et al. Effective linguistic steganography detection[C]//IEEE International Conference on Computer & Information Technology Workshops. IEEE, 2008:224- 229. [45] Yang H, Cao X B. Linguistic steganalysis based on meta-features and immune mechanism[J]. Chinese Journal of Electronics, 2010, 19(4):661-666. [46] Meng P, Hang L S, Yang W, et al. Linguistic steganography detection algorithm using statistical language model[C]//2009 International Conference on Information Technology and Computer Science. IEEE, 2009:540-543. [47] Samanta S, Dutta S, Sanyal G. A real time text steganalysis by using statistical method[C]//2016 IEEE International Conference on Engineering and Technology (ICETECH). IEEE, 2016:264-268. [48] Yang Z L, Huang Y F, Zhang Y J. A fast and efficient text steganalysis method[J]. IEEE Signal Processing Letters, 2019, 26(4):627-631. [49] Wen J, Zhou X J, Zhong P, et al. Convolutional neural network based text steganalysis[J]. IEEE Signal Processing Letters, 2019, 26(3):460-464. [50] Yang Z L, Wei N, Sheng J Y, et al. TS-CNN:text steganalysis from semantic space based on convolutional neural network[EB/OL].[2018-10-18]. https://arxiv.org/abs/1810.08136. [51] Yang Z L, Wang K, Li J, et al. TS-RNN:text steganalysis based on recurrent neural networks[J]. IEEE Signal Processing Letters, 2019, 26(12):1743-1747. [52] Bao Y J, Yang H, Yang Z L, et al. Text steganalysis with attentional LSTM-CNN[C]//International Conference on Computer and Communication Systems (ICCCS 2020). IEEE, 2020:138-142. [53] Yang Z L, Huang Y F, Zhang Y J. TS-CSW:text steganalysis and hidden capacity estimation based on convolutional sliding windows[J]. Multimedia Tools and Applications, 2020, 79(25):18293-18316. [54] Yang H, Bao Y J, Yang Z L, et al. Linguistic steganalysis via densely connected LSTM with feature pyramid[C]//Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security, 2020:5-10. [55] Wu H Z, Yi B, Ding F, et al. Linguistic steganalysis with graph neural networks[J]. IEEE Signal Processing Letters, 2021, 28:558-562. |
[1] | DONG Tenglin, LI Xinran, YAO Heng, QIN Chuan. Robust Coverless Information Hiding Based on Image Classification [J]. Journal of Applied Sciences, 2021, 39(6): 893-905. |
[2] | OU Qiaofeng, XIAO Jiabing, XIE Qunqun, XIONG Bangshu. Multi-target Detection and Recognition for Vehicle Inspection Images Based on Deep Learning [J]. Journal of Applied Sciences, 2021, 39(6): 939-951. |
[3] | LI Wenju, HE Maoxian, ZHANG Yaoxing, CHEN Huiling, LI Peigang. Crack Detection of Track Slab Based on Convolutional Neural Network and Voting Mechanism [J]. Journal of Applied Sciences, 2021, 39(4): 627-640. |
[4] | GUO Yubo, LU Jun, DUAN Pengqi. Automatic Classification of Bamboo Flute Playing Skills Based on Deep Learning [J]. Journal of Applied Sciences, 2021, 39(4): 685-694. |
[5] | HAO Yan, SHI Huiyu, HUO Shoujun, HAN Dan, CAO Rui. Emotion Classification Based on EEG Deep Learning [J]. Journal of Applied Sciences, 2021, 39(3): 347-346. |
[6] | DU Chengze, DUAN Youxiang, SUN Qifeng. Seismic Fault Identification Method Based on ResUNet and Dense CRF Model [J]. Journal of Applied Sciences, 2021, 39(3): 367-366. |
[7] | WANG Wanguo, MU Shiyou, LIU Yue, LIU Guangxiu, LANG Fenling. Research on Insulator Self Exploding Detection in UAV Inspection Based on Deep Learning [J]. Journal of Applied Sciences, 2021, 39(2): 222-231. |
[8] | LIU Zhiyu, ZHANG Shufen, LIU Yang, LUO Changyin, LI Min. Data Augmentation Method Based on Image Gradient [J]. Journal of Applied Sciences, 2021, 39(2): 302-311. |
[9] | YU Shuangsheng, YANG Zhongliang, JIANG Minyu, HUANG Yongfeng. Text Steganography Based on Neural Machine Translation [J]. Journal of Applied Sciences, 2020, 38(6): 976-985. |
[10] | SUN Ronghai, SHI Linfu, YU Chunqiang, LAO Huan, TANG Zhenjun. Random Interpolation Method for Data Hiding in Encrypted Images [J]. Journal of Applied Sciences, 2020, 38(3): 419-430. |
[11] | WANG Canjun, LIAO Xin, CHEN Jiaxin, QIN Zheng, LIU Xuchong. Research on Facial Modification Detection Algorithm Based on Convolutional Neural Network [J]. Journal of Applied Sciences, 2019, 37(5): 618-630. |
[12] | LI Songbin, YANG Jie, LIU Peng, WANG Lingrui. Steganalysis of Motion Vector-Based Steganography in H.264/AVC by Correlation Network Model [J]. Journal of Applied Sciences, 2019, 37(5): 663-672. |
[13] | ZHAO Yunying, SHAO Liping, WANG Yang, LU Hai. Improved Generation Camouflage Method Combined with Block Rotation and Photo Mosaic [J]. Journal of Applied Sciences, 2019, 37(5): 673-690. |
[14] | ZHU Yiming, CHEN Fan, HE Hongjie, CHEN Hongyou. Orthogonal GAN Information Hiding Model Based on Secret Information Driven [J]. Journal of Applied Sciences, 2019, 37(5): 721-732. |
[15] | LI Fang, ZHONG Yingchun, QI Jian, LUO Peng. Automatic Extraction of Regions of Peripheral Nerve Internal Fascicular Groups from MicroCT Images [J]. Journal of Applied Sciences, 2019, 37(3): 359-368. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||