Intelligent Security Defense Theory and Technology in Special Region

Recent Advances in Text Steganography and Steganalysis

Expand
  • School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China

Received date: 2021-06-01

  Online published: 2021-12-04

Abstract

This paper sorts out the development context of text steganography and steganalysis, and divides text steganography algorithms into two categories:modified text steganography and generative text steganography. The implementation process of the two types of algorithms is summarized, and the advantages and disadvantages of mainstream algorithms are analyzed from the aspects of rate-distortion performance and safety. Aiming at the two types of text steganography algorithms, the realization process of the corresponding steganalysis algorithms is summarized, and the development trend of text steganography and steganalysis is prospected.

Cite this article

KANG Huixian, YI Biao, WU Hanzhou . Recent Advances in Text Steganography and Steganalysis[J]. Journal of Applied Sciences, 2021 , 39(6) : 923 -938 . DOI: 10.3969/j.issn.0255-8297.2021.06.004

References

[1] Shannon C E. Communication theory of secrecy systems[J]. The Bell System Technical Journal, 1949, 28(4):656-715.
[2] Low S H, Maxemchuk N F, Brassil J T, et al. Document marking and identification using both line and word shifting[C]//Proceedings of INFOCOM. IEEE, 1995, 2:853-860.
[3] Mahato S, Yadav D K, Khan D A. A novel approach to text steganography using font size of invisible space characters in Microsoft word document[M]. New Delhi:Springer, 2014.
[4] Kumar R, Malik A, Singh S, et al. A space based reversible high capacity text steganography scheme using font type and style[C]//International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2016:1090-1094.
[5] Ali A A, Saad A. New text steganography technique by using mixed-case font[J]. International Journal of Computer Applications, 2013, 62(3):6-9.
[6] Khairullah M D. A novel text steganography system using font color of the invisible characters in Microsoft word documents[C]//2009 second international conference on computer and electrical engineering. IEEE, 2009:482-484.
[7] Tang X, Chen M S. Design and implementation of information hiding system based on RGB[C]//20133rd International Conference on Consumer Electronics, Communications and Networks. IEEE, 2013:217-220.
[8] 陈芳, 王冰. 基于文本字体的信息隐藏算法[J]. 计算机技术与发展, 2006, 16(1):20-22. Chen F, Wang B. An algorithm of text information hiding based on font[J]. Computer Technology and Development, 2006, 16(1):20-22. (in Chinese)
[9] 付兵. 基于字符Unicode编码奇偶性的文本信息隐藏算法研究[J]. 福建电脑, 2008, 24(12):66. Fu B. Research on text information hiding algorithms based on Unicode coding parity[J]. Fujian Computer, 2008, 24(12):66. (in Chinese)
[10] 陆绿, 方勇. 基于字符Unicode奇偶性的数字水印设计与实现[J]. 计算机技术与发展, 2010, 20(8):176-179. Lu L, Fang Y. Design and implementation of digital watermark based on character Unicode parity[J]. Computer Technology and Development, 2010, 20(8):176-179. (in Chinese)
[11] 黄国超, 王衍波, 张凯泽. 基于Unicode编码的信息隐藏算法研究与设计[J]. 计算机技术与发展, 2011, 21(10):233-236. Huang G C, Wang Y B, Zhang K Z. Research and design of information hiding algorithm based on encoding of Unicode[J]. Computer Technology and Development, 2011, 21(10):233- 236. (in Chinese)
[12] Liu F, Luo P P, Ma Z J, et al. Security secret information hiding based on hash function and invisible ASCII characters replacement[C]//2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2016:1963-1969.
[13] 崔光明, 洪星, 袁翔, 等. 基于不可见字符替换的信息隐藏方法研究[J]. 计算机应用与软件, 2016, 33(4):277-280. Cui G M, Hong X, Yuan X, et al. Research on information hiding based on invisible characters replacement[J]. Computer Applications & Software, 2016, 33(4):277-280. (in Chinese)
[14] 张震宇, 李千目, 戚湧. 基于不可见字符的文本水印设计[J]. 南京理工大学学报(自然科学版), 2017, 41(4):405-411. Zhang Z Y, Li Q M, Qi Y. Text watermarking design based on invisible characters[J]. Journal of Nanjing University of Science and Technology, 2017, 41(4):405-411. (in Chinese)
[15] 赵敏之, 孙星明, 向华政. 基于虚词变换的自然语言信息隐藏算法研究[J]. 计算机工程与应用, 2006, 42(3):158-160. Zhao M Z, Sun X M, Xiang H Z. Research on the Chinese text steganography based on the modification of the empty word[J]. Computer Engineering and Application, 2006, 42(3):158-160. (in Chinese)
[16] 刘玉玲, 孙星明, 辛国江. 基于移位变换的句子层自然语言信息隐藏算法[J]. 控制与决策, 2009, 24(12):1861-1864. Liu Y L, Sun X M, Xin G J. Algorithm of natural language information hiding based on shift conversion in sentence level[J]. Control and Decision, 2009:24(12):1861-1864. (in Chinese)
[17] Wang F, Huang L S, Chen Z L, et al. A novel text steganography by context-based equivalent substitution[C]//2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013). IEEE, 2013:1-6.
[18] Shirali-Shahreza M, Shirali-Shahreza M H. Text steganography in SMS[C]//International Conference on Convergence Information Technology (ICCIT 2007). IEEE, 2007:2260-2265.
[19] Rafat K F. Enhanced text steganography in SMS[C]//20092nd International Conference on Computer, Control and Communication. IEEE, 2009:1-6.
[20] 甘灿. 基于同义词替换的自然语言文本信息隐藏技术研究[D]. 长沙:湖南大学, 2008.
[21] 甘灿, 孙星明, 刘玉玲, 等. 一种改进的基于同义词替换的中文文本信息隐藏方法[J]. 东南大学学报(自然科学版), 2007, 37(增刊1):137-140. Gan C, Sun X M, Liu Y L, et al. Improved steganographic algorithm based on synonymy substitution for Chinese text[J]. Journal of Southeast University (Natural Science Edition), 2007, 37(Suppl.1):137-140. (in Chinese)
[22] 杨潇, 李峰, 向凌云. 基于矩阵编码的同义词替换隐写算法[J]. 小型微型计算机系统, 2015, 36(6):1296-1300. Yang X, Li F, Xiang L Y. Synonym substitution-based steganographic algorithm with matrix coding[J]. Journal of Chinese Mini-Micro Computer Systems, 2015, 36(6):1296-1300. (in Chinese)
[23] Bolshakov I A, Gelbukh A. Synonymous paraphrasing using word net and Internet[C]//International Conference on Application of Natural Language to Information Systems. Heidelberg:Springer, 2004:312-323.
[24] Dai W H, Yu Y, Dai Y H, et al. Text steganography system using Markov chain source model and DES algorithm[J]. Journal of Software, 2010, 5(7):785-792.
[25] Moraldo H H. An Approach for text steganography based on Markov chains[EB/OL].[2014- 09-02]. https://arxiv.org/abs/1409.0915.
[26] Luo Y B, Huang Y F, Li F F, et al. Text steganography based on ci-poetry generation using Markov chain model[J]. KSII Transactions on Internet and Information Systems (TIIS), 2016, 10(9):4568-4584.
[27] Yang Z L, Jin S Y, Huang Y F, et al. Automatically generate steganographic text based on Markov model and Huffman coding[EB/OL].[2018-11-12]. https://arxiv.org/abs/1811.04720.
[28] Fang T, Jaggi M, Argyraki K. Generating steganographic text with LSTMs[EB/OL].[2017- 05-30]. https://arxiv.org/abs/1705.10742.
[29] Yang Z L, Guo X Q, Chen Z M, et al. RNN-Stega:linguistic steganography based on recurrent neural networks[J]. IEEE Transactions on Information Forensics and Security, 2018, 14(5):1280-1295.
[30] Yang Z L, Wei N, Liu Q S, et al. GAN-TStega:text steganography based on generative adversarial networks[C]//International Workshop on Digital Watermarking. Cham:Springer, 2019, 12022 LNCS:18-31.
[31] Kang H X, Wu H Z, Zhang X P. Generative text steganography based on LSTM network and attention mechanism with keywords[J]. Electronic Imaging, 2020(4):2911-2918.
[32] Ziegler Z M, Deng Y, Rush A M. Neural linguistic steganography[EB/OL].[2019-09-03]. https://arxiv.org/abs/1909.01496.
[33] Shen J M, Ji H, Han J W. Near-imperceptible neural linguistic steganography via selfadjusting arithmetic coding[EB/OL].[2020-10-01].https://arxiv.org/abs/2010.00677.
[34] Yang Z L, Zhang S Y, Hu Y T, et al. VAE-Stega:linguistic steganography based on variational auto-encoder[J]. IEEE Transactions on Information Forensics and Security, 2020, 16:880-895.
[35] Yang Z L, Zhang P Y, Jiang M Y, et al. Rits:real-time interactive text steganography based on automatic dialogue model[C]//International Conference on Cloud Computing and Security. Cham:Springer, 2018, 11065:253-264.
[36] 薛一鸣, 周雪婧, 周小诗, 等. 基于图像描述的文本信息隐藏[J]. 北京邮电大学学报, 2018, 41(6):7-13. Xue Y M, Zhou X Q, Zhou X S, et al. Text information hiding based on image caption[J]. Journal of Beijing University of Posts and Telecommunications, 2018, 41(6):7-13. (in Chinese)
[37] Guo Y Y, Wu H Z, Zhang X P. Steganographic visual story with mutual-perceived joint attention[J]. EURASIP Journal on Image and Video Processing, 2021(1):1-14.
[38] Li L J, Huang L S, Zhao X X, et al. A statistical attack on a kind of word-shift textsteganography[C]//International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IEEE, 2008:1503-1507.
[39] Xiang L Y, Sun X M, Luo G, et al. Research on steganalysis for text steganography based on font format[C]//Third International Symposium on Information Assurance and Security. IEEE, 2007:287-294.
[40] 曾莱蓓, 孙星明, 向凌云, 等. 基于虚词变换的文本隐藏信息检测方法研究[J]. 计算机研究与发展, 2009, 46(增刊1):177-181. Zeng L B, Sun X M, Xiang L Y, et al. Research on text hidden information detection method based on virtual word transformation[J]//Journal of Computer Research and Development, 2009, 46(Suppl.1):177-181. (in Chinese)
[41] Taskiran C M, Topkara U, Topkara M, et al. Attacks on lexical natural language steganography systems[C]//Security, Steganography, and Watermarking of Multimedia Contents VIII. International Society for Optics and Photonics, 2006, 6072:607209.
[42] Ling Y X, Sun X M, Gang L, et al. Linguistic steganalysis using the features derived from synonym frequency[J]. Multimedia Tools and Applications, 2014, 71(3):1893-1911.
[43] Chen Z L, Huang L S, Yu Z S, et al. A statistical algorithm for linguistic steganography detection based on distribution of words[C]//2008 Third International Conference on Availability, Reliability and Security. IEEE, 2008. 558-563.
[44] Chen Z L, Huang L S, Yu Z S, et al. Effective linguistic steganography detection[C]//IEEE International Conference on Computer & Information Technology Workshops. IEEE, 2008:224- 229.
[45] Yang H, Cao X B. Linguistic steganalysis based on meta-features and immune mechanism[J]. Chinese Journal of Electronics, 2010, 19(4):661-666.
[46] Meng P, Hang L S, Yang W, et al. Linguistic steganography detection algorithm using statistical language model[C]//2009 International Conference on Information Technology and Computer Science. IEEE, 2009:540-543.
[47] Samanta S, Dutta S, Sanyal G. A real time text steganalysis by using statistical method[C]//2016 IEEE International Conference on Engineering and Technology (ICETECH). IEEE, 2016:264-268.
[48] Yang Z L, Huang Y F, Zhang Y J. A fast and efficient text steganalysis method[J]. IEEE Signal Processing Letters, 2019, 26(4):627-631.
[49] Wen J, Zhou X J, Zhong P, et al. Convolutional neural network based text steganalysis[J]. IEEE Signal Processing Letters, 2019, 26(3):460-464.
[50] Yang Z L, Wei N, Sheng J Y, et al. TS-CNN:text steganalysis from semantic space based on convolutional neural network[EB/OL].[2018-10-18]. https://arxiv.org/abs/1810.08136.
[51] Yang Z L, Wang K, Li J, et al. TS-RNN:text steganalysis based on recurrent neural networks[J]. IEEE Signal Processing Letters, 2019, 26(12):1743-1747.
[52] Bao Y J, Yang H, Yang Z L, et al. Text steganalysis with attentional LSTM-CNN[C]//International Conference on Computer and Communication Systems (ICCCS 2020). IEEE, 2020:138-142.
[53] Yang Z L, Huang Y F, Zhang Y J. TS-CSW:text steganalysis and hidden capacity estimation based on convolutional sliding windows[J]. Multimedia Tools and Applications, 2020, 79(25):18293-18316.
[54] Yang H, Bao Y J, Yang Z L, et al. Linguistic steganalysis via densely connected LSTM with feature pyramid[C]//Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security, 2020:5-10.
[55] Wu H Z, Yi B, Ding F, et al. Linguistic steganalysis with graph neural networks[J]. IEEE Signal Processing Letters, 2021, 28:558-562.
Outlines

/