Research on Coverless Text Steganography Based on Multi-Rule Language Models Alternation

被引:5
|
作者
Wu, Ning [1 ]
Liu, Zhenru [2 ]
Ma, Weibo [2 ]
Shang, Poli [3 ]
Yang, Zhongliang [4 ]
Fan, Jin [5 ]
机构
[1] Lanzhou Inst Technol, Coll Software Engn, Lanzhou, Peoples R China
[2] Lanzhou Inst Technol, Sch Elect Engn, Lanzhou, Peoples R China
[3] Lanzhou Petrochem Polytech, Sch Elect & Elect Engn, Lanzhou, Peoples R China
[4] Tsinghua Univ, Dept Elect Engn, Beijing, Peoples R China
[5] Lanzhou Univ, Sch Informat Sci & Engn, Lanzhou, Peoples R China
关键词
coverless text steganography; Markov chain; multi-rule language model alternation;
D O I
10.1109/ICMCCE48743.2019.00184
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information hiding technology usually uses video, audio, image, and text as carriers. Among them, text redundancy is less and it is difficult to hide information. However, the text is widely used, so text-based information hiding has very important research significance. In this paper, a coverless text steganography based on multi-rule language models alternation is proposed. It is different from the traditional steganographic text generation method based on a single gram model. The method proposed in the paper tries to combine models under different language rules alternately, and tries to extract more language features from the training text. In order to verify the effectiveness of the method, we design some relevant experiments. The results show that, compared with other text steganography methods, the method proposed in the paper not only satisfies the concealment but also improves the hiding capacity.
引用
收藏
页码:803 / 806
页数:4
相关论文
共 50 条
  • [1] Coverless Text Steganography Based on Half Frequency Crossover Rule
    Wu, Ning
    Shang, Poli
    Ma, Weibo
    Yang, Zhongliang
    Liu, Zhenru
    Fan, Jin
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 726 - 729
  • [2] A Coverless Plain Text Steganography Based on Character Features
    Wang, Kaixi
    Gao, Quansheng
    IEEE ACCESS, 2019, 7 : 95665 - 95676
  • [3] An Improved Coverless Text Steganography Algorithm Based on Pretreatment and POS
    Liu, Yuling
    Wu, Jiao
    Chen, Xianyi
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (04) : 1553 - 1567
  • [4] Coverless Image Steganography Based on Multi-Object Recognition
    Luo, Yuanjing
    Qin, Jiaohua
    Xiang, Xuyu
    Tan, Yun
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 31 (07) : 2779 - 2791
  • [5] Subspace clustering algorithm based on multi-rule constraint
    Li, Huiping
    International Journal of Multimedia and Ubiquitous Engineering, 2014, 9 (12): : 107 - 116
  • [6] An Operating Equipment Scheduling System Based on Multi-Rule Constraints
    Bin, Duan
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS, ROBOTICS AND AUTOMATION (ICMRA 2015), 2015, 15 : 939 - 942
  • [7] STBS-Stega: Coverless text steganography based on state transition-binary sequence
    Wu, Ning
    Yang, Zhongliang
    Yang, Yi
    Li, Lian
    Shang, Poli
    Ma, Weibo
    Liu, Zhenru
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (03):
  • [8] Selecting multi-rule quality control procedures based on patient risk
    Bayat, Hassan
    CLINICAL CHEMISTRY AND LABORATORY MEDICINE, 2017, 55 (11) : 1702 - 1708
  • [9] Chaotic Evolution for Multimodal Optimization Based on Multi-rule Generation Strategy
    Yu, Jun
    Pei, Yan
    2022 JOINT 12TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS AND 23RD INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS (SCIS&ISIS), 2022,
  • [10] Coverless Multi-keywords Information Hiding Method Based on Text
    Zhou, Zhili
    Mu, Yan
    Yang, Ching-Nung
    Zhao, Ningsheng
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09): : 309 - 320