Carrier-free text steganography method based on character features

A carrierless and text-free technology, applied in the field of information hiding, to avoid distortion and increase the effect of applicable scenarios

Active Publication Date: 2018-04-20
QINGDAO UNIV
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method not only solves the text distortion problems such as carrier modification and semantic abnormality in the existing text steganography methods, but also effectively avoids the problems that the carrier used for communication does not conform to the context or has poor readability, and has high concealment and readability. The advantages of strong scalability and high embedding rate are conducive to promoting the application and development of steganographic technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Carrier-free text steganography method based on character features
  • Carrier-free text steganography method based on character features

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Such as figure 1 As shown, this method is divided into two parts, the embedding process and the extraction process. The specific process is as follows:

[0029] 1. Embedding process, including the following steps:

[0030] 1) Select the character features and encode the character features. There are many selections of character features, such as the number of character strokes and structure. Here, taking the parity feature of the number of strokes of a character as an example, an even number of strokes represents "0", and an odd number of strokes represents "1".

[0031] 2) Grab Internet text and create a large data corpus of web text. Crawl webpages through web crawlers and other methods, parse out the text or obtain texts in other ways, and build a general web text corpus; you can also get topic-related texts based on hobbies, topics, etc., and build a special text corpus. The corpus should at least contain the content of the text itself and its corresponding URL ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a carrier-free text steganography method based on character features. Binary digits are expressed through the character features; secret information is processed into a binaryciphertext string and then is packaged and segmented; mapping between texts and binary ciphertext string segments is established by taking abundant webpage texts in a network big data environment as candidate carriers; corresponding texts are found for the secret information through the mapping relationship; and the texts or the corresponding URLs are sent, thereby finishing secret information interaction. After a receiving end receives the texts, the character features of a first text are analyzed to obtain head information; a binary ciphertext segmentation mode and length are determined; thefollow-up text character features are analyzed to obtain binary ciphertext segments; the segments are recombined to form the complete binary ciphertext string; and decoding or decryption is carried out to obtain the secret information. The method has the advantages of high stealthiness, high expandability and high embedded capacity, and the application and development of a steganography technology in various fields are facilitated.

Description

technical field [0001] The invention relates to the technical field of information hiding, in particular to a carrierless text steganography method based on network text big data. Background technique [0002] Information hiding aims to hide the existence of secret information, and can be applied in covert communication, digital watermarking and other fields. At present, there are text steganography methods, such as: text steganography method based on format transformation, text steganography method based on synonym replacement, text steganography method based on text generation, etc. These text steganography methods have their own advantages and disadvantages when they are applied. For example, the text steganography method based on format transformation mainly achieves the purpose of expressing secret information by changing the format attributes such as line spacing, word spacing, and color of the text file. Its disadvantage is that Formatting distorts the text, making i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06H04N19/70H04N19/96H04N19/467
CPCH04L9/0618H04L9/0861H04N19/467H04N19/70H04N19/96
Inventor 王开西高全胜
Owner QINGDAO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products