Abstract
Most state-of-the-art text steganography algorithms are designed based on synonym substitution with the concern of simplicity and robustness. However, synonym substitution will cause some detectable impact on cover texts. In this paper, we propose an content-adaptive text steganography to minimize the impact caused by embedding process. We believe that synonym substitution will cause a hybird distortion consists of statistical distortion and linguistical distortion. We design a double-layered STC embedding algorithm (HSL) to minimize the distortion. Experiments results indicate that the security performance of HSL is better compared with traditional methods based on synonym substitution.
An earlier version of this paper was presented at the 2nd IEEE International Conference on Data Science in Cyberspace.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Shivani, Kumar, V., Batham, S.: A novel approach of bulk data hiding using text steganography. Procedia Comput. Sci. 57, 1401–1410 (2015)
Huanhuan, H., Xin, Z., Weiming, Z., Nenghai, Y.: Adaptive text steganography by exploring statistical and linguistical distortion. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp. 145–150. IEEE (2017)
Denemark, T., Bas, P., Fridrich, J.: Natural steganography in JPEG compressed images. In: Electronic Imaging (2018)
Tayel, M., Gamal, A., Shawky, H.: A proposed implementation method of an audio steganography technique. In: 2016 18th International Conference on Advanced Communication Technology (ICACT), pp. 180–184. IEEE (2016)
Sadek, M.M., Khalifa, A.S., Mostafa, M.G.: Robust video steganography algorithm using adaptive skin-tone detection. Multimedia Tools Appl. 76(2), 3065–3085 (2017)
Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A new synonym text steganography. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2008, pp. 1524–1526. IEEE (2008)
Yuling, L., Xingming, S., Can, G., Hong, W.: An efficient linguistic steganography for chinese text. In: IEEE International Conference on Multimedia and Expo, pp. 2094–2097. IEEE (2007)
Muhammad, H.Z., Rahman, S.M.S.A.A., Shakil, A.: Synonym based malay linguistic text steganography. In: Innovative Technologies in Intelligent Systems and Industrial Applications, CITISIA 2009, pp. 423–427. IEEE (2009)
Xiang, L., Sun, X., Luo, G., Xia, B.: Linguistic steganalysis using the features derived from synonym frequency. Multimedia Tools Appl. 71(3), 1893–1911 (2014)
Hinton, G.E.: Distributed representations (1984)
Hinton, G., Rumelhart, D., Williams, R.: Learning internal representations by back-propagating errors. In: Parallel Distributed Processing: Explorations in the Microstructure of Cognition 1 (1985)
Elman, J.L.: Finding structure in time. Cogn. Sci. 14(2), 179–211 (1990)
Bengio, Y., Ducharme, R., Vincent, P., Jauvin, C.: A neural probabilistic language model. J. Mach. Learn. Res. 3, 1137–1155 (2003)
Mikolov, T.: Language Modeling for Speech Recognition in Czech. Ph.D. thesis, Masters thesis, Brno University of Technology (2007)
Mikolov, T., Kopecky, J., Burget, L., Glembek, O., et al.: Neural network based language models for highly inflective languages. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2009, pp. 4725–4728. IEEE (2009)
Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)
Filler, T., Fridrich, J.: Minimizing additive distortion functions with non-binary embedding operation in steganography. In: 2010 IEEE International Workshop on Information Forensics and Security, pp. 1–6, December 2010
Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2011)
Huang, F., Luo, W., Huang, J., Shi, Y.Q.: Distortion function designing for JPEG steganography with uncompressed side-image. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security. IH & MMSec 2013, pp. 69–76. ACM, New York (2013)
Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 4206–4210, October 2014
Zhao, Z., Guan, Q., Zhao, X.: Constructing near-optimal double-layered syndrome-trellis codes for spatial steganography. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 139–148. ACM, New York (2016)
Fridrich, J., Filler, T.: Practical methods for minimizing embedding impact in steganography (2007)
Miller, G.A.: WordNet: a lexical database for English. Commun. ACM 38(11), 39–41 (1995)
Chen, Z., Huang, L., Miao, H., Yang, W., Meng, P.: Steganalysis against substitution-based linguistic steganography based on context clusters. Comput. Electr. Eng. 37(6), 1071–1081 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Hu, H., Zuo, X., Zhang, W., Yu, N. (2018). Covert Communication by Exploring Statistical and Linguistical Distortion in Text. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11066. Springer, Cham. https://doi.org/10.1007/978-3-030-00015-8_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-00015-8_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00014-1
Online ISBN: 978-3-030-00015-8
eBook Packages: Computer ScienceComputer Science (R0)