Covert Communication by Exploring Statistical and Linguistical Distortion in Text | SpringerLink
Skip to main content

Covert Communication by Exploring Statistical and Linguistical Distortion in Text

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11066))

Included in the following conference series:

Abstract

Most state-of-the-art text steganography algorithms are designed based on synonym substitution with the concern of simplicity and robustness. However, synonym substitution will cause some detectable impact on cover texts. In this paper, we propose an content-adaptive text steganography to minimize the impact caused by embedding process. We believe that synonym substitution will cause a hybird distortion consists of statistical distortion and linguistical distortion. We design a double-layered STC embedding algorithm (HSL) to minimize the distortion. Experiments results indicate that the security performance of HSL is better compared with traditional methods based on synonym substitution.

An earlier version of this paper was presented at the 2nd IEEE International Conference on Data Science in Cyberspace.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Shivani, Kumar, V., Batham, S.: A novel approach of bulk data hiding using text steganography. Procedia Comput. Sci. 57, 1401–1410 (2015)

    Article  Google Scholar 

  2. Huanhuan, H., Xin, Z., Weiming, Z., Nenghai, Y.: Adaptive text steganography by exploring statistical and linguistical distortion. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp. 145–150. IEEE (2017)

    Google Scholar 

  3. Denemark, T., Bas, P., Fridrich, J.: Natural steganography in JPEG compressed images. In: Electronic Imaging (2018)

    Google Scholar 

  4. Tayel, M., Gamal, A., Shawky, H.: A proposed implementation method of an audio steganography technique. In: 2016 18th International Conference on Advanced Communication Technology (ICACT), pp. 180–184. IEEE (2016)

    Google Scholar 

  5. Sadek, M.M., Khalifa, A.S., Mostafa, M.G.: Robust video steganography algorithm using adaptive skin-tone detection. Multimedia Tools Appl. 76(2), 3065–3085 (2017)

    Article  Google Scholar 

  6. Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A new synonym text steganography. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2008, pp. 1524–1526. IEEE (2008)

    Google Scholar 

  7. Yuling, L., Xingming, S., Can, G., Hong, W.: An efficient linguistic steganography for chinese text. In: IEEE International Conference on Multimedia and Expo, pp. 2094–2097. IEEE (2007)

    Google Scholar 

  8. Muhammad, H.Z., Rahman, S.M.S.A.A., Shakil, A.: Synonym based malay linguistic text steganography. In: Innovative Technologies in Intelligent Systems and Industrial Applications, CITISIA 2009, pp. 423–427. IEEE (2009)

    Google Scholar 

  9. Xiang, L., Sun, X., Luo, G., Xia, B.: Linguistic steganalysis using the features derived from synonym frequency. Multimedia Tools Appl. 71(3), 1893–1911 (2014)

    Article  Google Scholar 

  10. Hinton, G.E.: Distributed representations (1984)

    Google Scholar 

  11. Hinton, G., Rumelhart, D., Williams, R.: Learning internal representations by back-propagating errors. In: Parallel Distributed Processing: Explorations in the Microstructure of Cognition 1 (1985)

    Google Scholar 

  12. Elman, J.L.: Finding structure in time. Cogn. Sci. 14(2), 179–211 (1990)

    Article  Google Scholar 

  13. Bengio, Y., Ducharme, R., Vincent, P., Jauvin, C.: A neural probabilistic language model. J. Mach. Learn. Res. 3, 1137–1155 (2003)

    MATH  Google Scholar 

  14. Mikolov, T.: Language Modeling for Speech Recognition in Czech. Ph.D. thesis, Masters thesis, Brno University of Technology (2007)

    Google Scholar 

  15. Mikolov, T., Kopecky, J., Burget, L., Glembek, O., et al.: Neural network based language models for highly inflective languages. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2009, pp. 4725–4728. IEEE (2009)

    Google Scholar 

  16. Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)

  17. Filler, T., Fridrich, J.: Minimizing additive distortion functions with non-binary embedding operation in steganography. In: 2010 IEEE International Workshop on Information Forensics and Security, pp. 1–6, December 2010

    Google Scholar 

  18. Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920–935 (2011)

    Article  Google Scholar 

  19. Huang, F., Luo, W., Huang, J., Shi, Y.Q.: Distortion function designing for JPEG steganography with uncompressed side-image. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security. IH & MMSec 2013, pp. 69–76. ACM, New York (2013)

    Google Scholar 

  20. Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 4206–4210, October 2014

    Google Scholar 

  21. Zhao, Z., Guan, Q., Zhao, X.: Constructing near-optimal double-layered syndrome-trellis codes for spatial steganography. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 139–148. ACM, New York (2016)

    Google Scholar 

  22. Fridrich, J., Filler, T.: Practical methods for minimizing embedding impact in steganography (2007)

    Google Scholar 

  23. Miller, G.A.: WordNet: a lexical database for English. Commun. ACM 38(11), 39–41 (1995)

    Article  Google Scholar 

  24. Chen, Z., Huang, L., Miao, H., Yang, W., Meng, P.: Steganalysis against substitution-based linguistic steganography based on context clusters. Comput. Electr. Eng. 37(6), 1071–1081 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weiming Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hu, H., Zuo, X., Zhang, W., Yu, N. (2018). Covert Communication by Exploring Statistical and Linguistical Distortion in Text. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11066. Springer, Cham. https://doi.org/10.1007/978-3-030-00015-8_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00015-8_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00014-1

  • Online ISBN: 978-3-030-00015-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics