Coverless Text Steganography Based on Half Frequency Crossover Rule

被引:4
|
作者
Wu, Ning [1 ]
Shang, Poli [2 ]
Ma, Weibo [3 ]
Yang, Zhongliang [4 ]
Liu, Zhenru [3 ]
Fan, Jin [5 ]
机构
[1] Lanzhou Inst Technol, Coll Software Engn, Lanzhou, Peoples R China
[2] Lanzhou Petrochem Polytech, Sch Elect & Elect Engn, Lanzhou, Peoples R China
[3] Lanzhou Inst Technol, Sch Elect Engn, Lanzhou, Peoples R China
[4] Tsinghua Univ, Dept Elect Engn, Beijing, Peoples R China
[5] Lanzhou Univ, Sch Informat Sci & Engn, Lanzhou, Peoples R China
关键词
coverless; text steganography; Markov chain; half frequency crossover;
D O I
10.1109/ICMCCE48743.2019.00168
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the development process of the information hiding technology, text steganography is a challenging task for researchers because of the small redundancy of information and the difficulty in hiding information. In this paper, a coverless text steganography method is proposed based on the Markov model and the half frequency crossover rule, which accords with the statistical characteristics of natural language. In order to prove the effectiveness of the algorithm, we select two large scale datasets for modeling and testing. The experimental results show that, compared with similar methods, the proposed model shows better concealment and hidden capacity in steganography.
引用
收藏
页码:726 / 729
页数:4
相关论文
共 50 条
  • [21] A Coverless Audio Steganography Based on Generative Adversarial Networks
    Li, Jing
    Wang, Kaixi
    Jia, Xiaozhu
    ELECTRONICS, 2023, 12 (05)
  • [22] Coverless Data Hiding in VoIP based on DNA Steganography with Authentication
    Soundararajan, Deepikaa
    Ramakrishnan, Saravanan
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2023, 20 (02) : 190 - 198
  • [23] Novel Coverless Steganography Method Based on Image Selection and StarGAN
    Chen, Xianyi
    Zhang, Zhentian
    Qiu, Anqi
    Xia, Zhihua
    Xiong, Neal N.
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (01): : 219 - 230
  • [24] Coverless Image Steganography Based on Jigsaw Puzzle Image Generation
    Saad, Al Hussien Seddik
    Mohamed, M. S.
    Hafez, E. H.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (02): : 2077 - 2091
  • [25] A Coverless Image Steganography Based on a Robust Object Detection Network
    Meng, Laijin
    Jiang, Xinghao
    Xu, Qiang
    Mi, Zhongjie
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT VIII, ICIC 2024, 2024, 14869 : 343 - 356
  • [26] Robust coverless video steganography based on pose estimation and object tracking
    Li, Nan
    Qin, Jiaohua
    Xiang, Xuyu
    Tan, Yun
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 87
  • [27] Coverless Image Steganography Based on Multi-Object Recognition
    Luo, Yuanjing
    Qin, Jiaohua
    Xiang, Xuyu
    Tan, Yun
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 31 (07) : 2779 - 2791
  • [28] Privacy Protection for Medical Images Based on DenseNet and Coverless Steganography
    Tan, Yun
    Qin, Jiaohua
    Tang, Hao
    Xiang, Xuyu
    Tan, Ling
    Xiong, Neal N.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (03): : 1797 - 1817
  • [29] Robust coverless image steganography based on human pose estimation
    Tan, Yang
    Xiang, Xuyu
    Qin, Jiaohua
    Tan, Yun
    KNOWLEDGE-BASED SYSTEMS, 2024, 296
  • [30] Coverless Steganography Based on Low Similarity Feature Selection in DCT Domain
    Tan, Lina
    Liu, Jiajun
    Zhou, Yu
    Chen, Rongyuan
    RADIOENGINEERING, 2023, 32 (04) : 603 - 615