期刊文献+

用宋词实现高嵌入率文本信息隐藏 被引量:17

High Embedding Ratio Text Steganography by Ci-Poetry of the Song Dynasty
下载PDF
导出
摘要 文本信息隐藏是将秘密信息隐藏到文本中的一种技术。与加密后的密文通常是无意义的一串编码不同,文本隐藏生成的隐写文本看起来与普通文本无异,不容易引人怀疑。但是因为文本本身的冗余度低,与图像、视频等载体相比,文本隐藏算法较少且容量偏低。该文提出了一个新的利用宋词的文本隐藏算法,并设计实现了由编码器、解码器、词典和词牌模板组成的系统。秘密信息被隐藏到在字数、行数、句子形式、格律和韵脚等方面符合某个词牌的隐写宋词中。系统在保证良好安全性的同时,嵌入率达到了16%。据我们所知,这是第一个利用特殊体裁的文本信息隐藏算法。 Text steganography is a method of concealing secrets in texts. Different from cryptography which encrypts plain text to meaningless strings, text steganography generates innocuous stego-texts, which arouse less suspicion. However, compared with other types of multimedia documents such as image and video, text is not a well developed kind of carrier in information hiding because of its low redundancy and, consequently, the low embedding ratio achieved. A novel text steganography algorithm using Ci-poetry of the Song Dynasty is proposed in this paper, and the system composed of the encoder, the decoder, the lexicon and the tune template is realized. Secret messages are embedded into stego-Cis of the tune with proper number of lines, words, sentence patterns, rhythm and rhyme. This system reaches 16% embedding ratio while ensuring linguistic robustness. This is, to the best of our knowledge, the first text steganography algorithm making use of special type of literature.
出处 《中文信息学报》 CSCD 北大核心 2009年第4期55-62,共8页 Journal of Chinese Information Processing
基金 国家自然科学基金资助项目(60773032 60573171和60703071) 教育部高校博士点基金资助项目(20060358014) 江苏省自然科学基金资助项目(BK2007060) 安徽省自然科学基金资助项目(070412043)
关键词 计算机应用 中文信息处理 信息隐藏 文本隐写 嵌入率 语义安全 宋词 词牌 computer application Chinese information processing information hiding text steganography embedding ratio linguistic security Ci-poetry of Song Dynasty tune
  • 相关文献

参考文献13

  • 1F.A.P.Petitcolas,R.J.Anderson,and M.G.Kuhn.Information hiding-a survey[C]//Proceedings of the IEEE,special issue on protection of multimedia content.July 1999,87(7):1062-1078.
  • 2S.Katzenbeisser and F.A.P.Petitcolas.Information hiding techniques for steganography and digital watermarking[M].Boston,London:Artech House,2000.
  • 3M.Chapman and G.Davida.Hiding the hidden:A software system for concealing ciphertext in innocuous text[C]//Proceedings of the International Conference on Information and Communications Security.Beijing,China:1997:335-345.
  • 4R.J.Anderson and F.A.P.Petitcolas.On the limits of steganography[J].IEEE Journal of Selected Areas in Communications,May 1998,16(4):474-481.
  • 5D.Huang and H.Yan.Interword distance changes represented by sine waves for watermarking text images[J].IEEE Trans on Circuits and System for Video Technology,2001,11(12):1237-1245.
  • 6S.H.Low,N.F.Maxemchuk,J.T.Brassil,et al.Document marking and identification using both line and word shifting[C]//Proceedings of IEEE INFOCOM'95.Boston,MA:1995:853-860.
  • 7M.Atallah,V.Raskin,M.Crogan,et al.Natural Language Watermarking:Design,Analysis,and a Proof-of-Concept Implementation[C]//Information Hiding,4th International Workshop.Pittsburgh,PA,USA:2001:185-200.
  • 8M.Atallah,V.Raskin,C.Hempelmann,et al.Natural Language Watermarking and Tamperproofing[C]//Information Hiding,4th International Workshop.Noordwijkerhout,The Netherlands:2002:196-212.
  • 9张宇,刘挺,陈毅恒,赵世奇,李生.自然语言文本水印[J].中文信息学报,2005,19(1):56-62. 被引量:51
  • 10K.Winstein.Lexical steganography through adaptive modulation of the word choice hash[R].http://alumni.imsa.edu/~keithw/tlex/lsteg.ps.

二级参考文献9

  • 1Katzenbeisser, S. C. Principles of Steganogtaphy. In: S. Katzenbeisser and F. A. P. Petitcolas(eds. ) ,Information Hiding[ C ]. Techniques for Steganography and Digital Watermarking. Boston: Artech, 2000,17- 41.
  • 2Brassil, J., N. F. Maxemchuk, and L. O' Gonnan. Electronic Marking and Identification Technique to Discourage Document Copying[C] .Proceedings of INFOCOM '94,1994,1278- 1287.
  • 3Maxemchuk, N. F. 1994. Electronic Document Distribution[ J ]. AT&T Technical Journal, September/October, 73 - 80.
  • 4Low, S. H., N. F. Maxemchuk, and A. M. Lapnoe. Document Identification for Copyright Protection Using Centroid Detection[J]. IEEE Transactions on Communication, 1998,46(3) ,372 - 383.
  • 5Atallah, M. J., C. J. McDonough, V. Raskin, and S. Nirenburg. Natural Language Processing for Information Assurance and Security:An Overview and Implementations [ C ]. In: M. Shaeffer ( ed. ), NSPW' 00: Proceedings of Workshop on New Paradigms in Information Security, Cork, Ireland, September 2000. New York: ACM Press, 51 - 65.
  • 6Mikhail J., Atallah, Samuel S., Wagstaff, Jr.. Watermarking with Quadratic Residues[C]. Working Paper,Department of Computer Science, Purdue University, 1996.
  • 7Mikhail J. Atallah, Victor Raskin, Mchael Crogan, Christian Hempelimann, Flofian Kerschbaum, Dina Mohamed and Sanket Naik. Natural Language Watetmarking:Design,Analysis, and a Proof-of- Concept Implementation[C]. Informarion Hiding 2001 : 185 - 199.
  • 8Mikhail J. Atallah, Craig J. Mcdonough, Victor Raskin. Natural Language for Information Assurance and Security:An Overview and Implementation[C] .Published in: M. Schaefer( ed. ) ,Proceedings. New Security Paradigm Workshop.September 18th-22nd,Ballycotton, Cork Ireland.New York:ACM Press,2000, pp.51-65.
  • 9Nirenburg, S., and V. Raskin 2003. Ontological Semantics. Camhridge[ M ], MA: MIT Press (forthcoming). Prepublication draft, http://crl.nmsu. edu/Staff. Pages/Technical/sergei/book/index - book. html.

共引文献50

同被引文献130

引证文献17

二级引证文献53

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部