A carrier-free text steganography method and a carrier-free text steganography device for a component histogram

A histogram, carrier-free technology, applied in the field of information security, can solve the problems of low success rate of hiding and small information hiding capacity, and achieve the effect of good effect, improved security, and reduced fine-grainedness

Active Publication Date: 2021-06-15
HUNAN UNIV OF FINANCE & ECONOMICS +1
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the problems of small information hiding capacity and low hiding success rate existing in carrierless information hiding, the present invention

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A carrier-free text steganography method and a carrier-free text steganography device for a component histogram
  • A carrier-free text steganography method and a carrier-free text steganography device for a component histogram
  • A carrier-free text steganography method and a carrier-free text steganography device for a component histogram

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0069] refer to Figure 1-5 The present invention discloses a method and device for text-less steganography of component histograms.

[0070] This section takes passing a secret message "fight tiger tonight" as an example to show the whole process of information hiding and restoration. The information hiding process is as follows:

[0071] (1) First, the sender converts each Chinese character of the secret message into a mathematical expression of Chinese characters:

[0072] ['today','night','fight','old','tiger']=>['116','102lr234','430lr6','338lu21','386lu13']

[0073] (2) Given a random selection threshold, for example, by randomly selecting 0.1 times the total number of texts in the text_table, through Algorithm 2, to obtain the histogram of the encrypted text and its components, assuming that the obtained encrypted text number is '71490'.

[0074] (3) Assume that the components and orders in the histogram of the encrypted text components have the following corresponde...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a carrier-free text steganography method and a carrier-free text steganography device for a component histogram. The carrier-free text steganography method comprises the following steps: 1, constructing a codebook of a text library; 2, preprocessing the secret information; 3, providing a hiding method based on random text selection; 4, performing information hiding; 5, constructing a secret index; and 6, extracting secret information. Compared with an existing text carrier-free information hiding technology, the invention has the advantages that all secret information can be hidden in one text at most, the hiding capacity is greatly improved, and the hiding success rate is increased by using a mixed index structure instead of a natural language processing method in the extraction process.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a method for hiding text without carrier information based on component histograms. Background technique [0002] The development of network and communication technology has greatly promoted the transformation of productivity and has become an indispensable pillar of social development. Affected by the openness of the Internet, the risks faced by data security are becoming increasingly complex, and the concealment and security of communication activities need to be strengthened urgently. [0003] Among them, the technical solution——Chen X, Sun H, et al.Coverless Information HidingMethod Based on the Chinese Mathematical Expression. Disclosed the basic theory of Chinese mathematical expressions, segmented secret information, and converted it into new keyword; redesign the positioning tag protocol to generate a combination of converted keywords and positioning tags, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F16/31
CPCG06F21/602G06F16/325
Inventor 黄华军曾笛陈芳
Owner HUNAN UNIV OF FINANCE & ECONOMICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products