浏览全部资源
扫码关注微信
杭州电子科技大学网络空间安全学院,浙江 杭州 310018
[ "张祯(1978− ),男,山西大同人,杭州电子科技大学副教授,主要研究方向为计算机应用、保密信息化、图形图像处理" ]
[ "倪嘉铭(1995− ),男,江苏南通人,杭州电子科技大学硕士生,主要研究方向为信息内容安全、文本信息隐藏" ]
[ "姚晔(1978− ),男,湖北随州人,博士,杭州电子科技大学副教授,主要研究方向为多媒体内容安全、视频图像智能分析" ]
[ "龚礼春(1995− ),男,福建南平人,杭州电子科技大学硕士生,主要研究方向为信息内容安全、文本信息隐藏" ]
[ "王玉娟(1972- ),女,浙江宁波人,杭州电子科技大学馆员,主要研究方向为信息化与标准化研究" ]
[ "吴国华(1970- ),男,山东济南人,博士,杭州电子科技大学教授、博士生导师,主要研究方向为保密信息化、定密理论与实务" ]
网络出版日期:2021-09,
纸质出版日期:2021-09-25
移动端阅览
张祯, 倪嘉铭, 姚晔, 等. 基于同义词扩展和标签传递机制的文本无载体信息隐藏方法[J]. 通信学报, 2021,42(9):173-183.
Zhen ZHANG, Jiaming NI, Ye YAO, et al. Text coverless information hiding method based on synonyms expansion and label delivery mechanism[J]. Journal on communications, 2021, 42(9): 173-183.
张祯, 倪嘉铭, 姚晔, 等. 基于同义词扩展和标签传递机制的文本无载体信息隐藏方法[J]. 通信学报, 2021,42(9):173-183. DOI: 10.11959/j.issn.1000-436x.2021139.
Zhen ZHANG, Jiaming NI, Ye YAO, et al. Text coverless information hiding method based on synonyms expansion and label delivery mechanism[J]. Journal on communications, 2021, 42(9): 173-183. DOI: 10.11959/j.issn.1000-436x.2021139.
为了解决传统文本信息隐藏方法隐藏容量低、抗检测性弱等问题,提出一种基于同义词扩展和标签传递机制的文本无载体信息隐藏方法。该方法将秘密信息切分成若干个关键词,分别嵌入不同的文本载体中。考虑到汉语中同义词的可替换性,使用基于知网的词语相似度计算方法筛选符合上下文语义的同义词,尽可能将不同的关键词或其同义词嵌入同一文本中,以此来提升隐藏容量。同时,记录每篇文本中所有被隐藏关键词的标签信息,将其按固定格式转换为二进制序列,作为秘密信息生成载体文本。最后,将自然载体文本和生成载体文本一起发送给接收方完成秘密通信。实验结果表明,所提方法的隐藏容量与传统方法相比有了较大的提升,具有较强的抗检测能力,使用小型载体文本数据库即可实现完整的信息隐藏和提取,减少了建立和维护索引数据库的开销。
To solve the problems of low hiding capacity and weak detection resistance
a method of coverless information hiding based on synonyms expansion and label delivery mechanism was proposed.To begin the proposed method
the secret information were divided into several keywords
then those keywords were embedded in different carrier texts respectively.Considering the interchangeability of synonyms in Chinese
using the word similarity calculation method based on HowNet
it was possible to filter synonyms which met the contextual semantics.For the purpose of increasing hiding capacity
various keywords or their synonyms were embedded in the same carrier text as much as possible.At the same moment
when recording the positional parameters of the secret information in each carrier text
those parameters were converted into a binary sequence in a fixed format
which was used to generate carrier text.Finally
the carrier texts and generated text were sent to the receiver.Comparison of the results with those of other studies confirm that the proposed method not only makes great improvement in hiding capacity and detection resistance
but also reduces the overhead of establishing and maintaining databases by using small text database.
张新鹏 , 钱振兴 , 李晟 . 信息隐藏研究展望 [J ] . 应用科学学报 , 2016 , 34 ( 5 ): 475 - 489 .
ZHANG X P , QIAN Z X , LI S . Prospect of digital steganography research [J ] . Journal of Applied Sciences , 2016 , 34 ( 5 ): 475 - 489 .
吴国华 , 龚礼春 , 袁理锋 , 等 . 中文文本信息隐藏研究进展 [J ] . 通信学报 , 2019 , 40 ( 9 ): 145 - 156 .
WU G H , GONG L C , YUAN L F , et al . Review of information hiding on Chinese text [J ] . Journal on Communications , 2019 , 40 ( 9 ): 145 - 156 .
BAO Y J , YANG H , YANG Z L , et al . Text steganalysis with attentional L STM-CNN [C ] // 2020 5th International Conference on Computer and Communication Systems . Piscataway:IEEE Press , 2020 : 138 - 142 .
CHEN X Y , SUN H Y , TOBE Y , et al . Coverless information hiding method based on the Chinese mathematical expression [C ] // Cloud Computing and Security . Piscataway:IEEE Press , 2015 : 1 - 12 .
ZHOU Z L , MU Y , YANG C N , et al . Coverless multi-keywords information hiding method based on text [J ] . International Journal of Security and Its Applications , 2016 , 10 ( 9 ): 309 - 320 .
CHEN X , CHEN S , WU Y . Coverless information hiding method based on the Chinese character encoding [J ] . Journal of Internet Technology , 2017 , 18 ( 2 ): 313 - 320 .
LONG Y , LIU Y L . Text coverless information hiding based on Word2Vec [C ] // Cloud Computing and Security . Berlin:Springer , 2018 : 463 - 472 .
彭博 , 李晖 . 融合多语言特点的无载体信息隐藏 [J ] . 微处理机 , 2019 , 40 ( 1 ): 49 - 54 .
PENG B , LI H . Coverless information hiding by fusing multilingual features [J ] . Microprocessors , 2019 , 40 ( 1 ): 49 - 54 .
王建业 , 郭振波 , 王开西 . 基于汉字数学表达式的无载体文本隐写方法 [J ] . 青岛大学学报(自然科学版) , 2019 , 32 ( 1 ): 81 - 86 .
WANG J Y , GUO Z B , WANG K X . A method of text steganography without carrier based on mathematical expressions of Chinese characters [J ] . Journal of Qingdao University (Natural Science Edition) , 2019 , 32 ( 1 ): 81 - 86 .
LIU Y L , WU J , XIN G J . Multi-keywords carrier-free text steganography method based on Chinese Pinyin [J ] . International Journal of Computational Science and Engineering , 2020 , 21 ( 2 ): 202 - 209 .
张维 , 王晓梅 , 张晨旭 . 一种基于声调特征映射的无载体信息隐藏方法 [J ] . 信息工程大学学报 , 2021 , 22 ( 1 ): 38 - 43 .
ZHANG W , WANG X M , ZHANG C X . Coverless text steganography method based on tone feature mapping [J ] . Journal of Information Engineering University , 2021 , 22 ( 1 ): 38 - 43 .
SHNIPEROV A N , NIKITINA K A . A text steganography method based on Markov chains [J ] . Automatic Control and Computer Sciences , 2016 , 50 ( 8 ): 802 - 808 .
YANG Z L , GUO X Q , CHEN Z M , et al . RNN-stega:linguistic steganography based on recurrent neural networks [J ] . IEEE Transactions on Information Forensics and Security , 2019 , 14 ( 5 ): 1280 - 1295 .
KANG H X , WU H Z , ZHANG X P . Generative text steganography based on LSTM network and attention mechanism with keywords [J ] . Electronic Imaging , 2020 ( 4 ): 291-1 - 291-8 .
YANG Z L , WEI N , LIU Q H , et al . GAN-TStega:text steganography based on generative adversarial networks [C ] // Digital Forensics and Watermarking . Berlin:Springer , 2020 : 18 - 31 .
ABDELNABI S , FRITZ M . Adversarial watermarking transformer:towards tracing text provenance with data hiding [J ] . arXiv Preprint,arXiv:2009.03015 , 2020 .
刘群 , 李素建 . 基于知网的词汇语义相似度计算 [D ] . 北京:中国科学院计算技术研究所 , 2002 .
LIU Q , LI S J . Calculation of word semantic similarity based on HowNet [D ] . Beijing:Institute of Computing Technology,Chinese Academy of Sciences , 2002 .
CHEN X Y , CHEN S . Text coverless information hiding based on compound and selection of words [J ] . Soft Computing , 2019 , 23 ( 15 ): 6323 - 6330 .
0
浏览量
514
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构