Abstract
Text steganography is a kind of technique which can transmit secret information using text as carrier. Compared with other types of carriers such as image and video, the embedding rate and capacity of text steganography algorithm is generally lower due to its low redundancy. A text steganography algorithm using single Ci-Pai of song poetry as a template and the embedding rate of it reaches 16.1 %. This paper presents a new text steganography algorithm based on song poetry with a higher embedding rate 27.1 %. In our proposed scheme, by selecting and processing 2538 pieces of song poetry which from 145 pieces of different Ci-Pai, a system which includes the template, the large capacity of lexicon, the encoder and the decoder is constructed. According to users’ needs, the proposed scheme can generate arbitrary Ci-Pai to make the secret messages hidden in the song poetry which metrical patterns, rhyme words completely accord with the Ci-Pai. Additionally, we confirm our high embedding rate through theoretical analysis and extensive experiments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Moulin, P., O’Sullivan, J.A.: Information-theoretic analysis of information hiding. J. Inf. Theor. 49, 563–593 (2003)
Gupta S, Jain R.: An innovative method of Text Steganography In: Proceedings of the 2015 Third International Conference on Image Information Processing (ICIIP), pp. 60–64. IEEE (2015)
Kingslin, S., Kavitha, N.: Evaluative Approach towards Text Steganographic Techniques. Indian J. Sci. Technol. 8(1), 29 (2015)
Zhi-li, C., Liu-sheng, H., Zhen-shan, Y.: An information hiding algorithm based on double text segments. J. Electr. Inf. Technol. 31(11), 2725–2730 (2009)
Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75(4), 1947–1962 (2016)
Rana, M.S., Sangwan, B.S., Jangir, J.S.: Art of hiding: an introduction to steganography. J. Int. J. Eng. Comput. Sci. 1(1), 11–23 (2012)
Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2015)
Uddin, M.P., Saha, M., Ferdousi, S.J., et al.: Developing an efficient solution to information hiding through text steganography along with cryptography. In: Proceedings of the 2014 9th International Forum (IFOST) Strategic Technology, pp. 14–17. IEEE (2014)
Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (2015). DOI:10.1109/TPDS.2015.2506573
Shu-Feng, W., Liu-Sheng, H.: Research on information hiding. J. Degree Master. University of Science and Technology of China (2003)
Maher, K.: TEXTO (2008, unpublished). ftp://funet.fi/pub/crypt/steganography/texto.tar.gz
Chapman, M., Davida, G.: Hiding the hidden: a software system for concealing ciphertext as innocuous text. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 335–345. Springer, Heidelberg (1997)
Winstein, K.: Lexical steganography through adaptive modulation of the word choice hash (1998, unpublished). http://www.imsa.edu/~keithw/tlex
Yuling, L., Xingming, S., Can, G., et al.: An efficient linguistic steganography for Chinese text. In: Proceedings of Multimedia and Expo 2007 IEEE International Conference, pp. 2094–2097. IEEE (2007)
Zhenshan, Yu., Liusheng, H., Zhili, C., et al.: High embedding ratio text steganography by ci-poetry of the song dynasty. J. Inf. Process. 23(4), 55–62 (2009)
Acknowledgements
This work is partly supported by the Fundamental Research Funds for the Central Universities (NZ2015108), the fifth graduate student innovation experiment competition breeding project base of Nanjing University of Aeronautics and Astronautics, Natural Science Foundation of Jiangsu province (BK20150760), the China Postdoctoral Science Foundation funded project (2015M571752), Jiangsu province postdoctoral research funds (1402033C), and NSFC (61472470, 61370224).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Liu, Y., Wang, J., Wang, Z., Qu, Q., Yu, S. (2016). A Technique of High Embedding Rate Text Steganography Based on Whole Poetry of Song Dynasty. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10039. Springer, Cham. https://doi.org/10.1007/978-3-319-48671-0_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-48671-0_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48670-3
Online ISBN: 978-3-319-48671-0
eBook Packages: Computer ScienceComputer Science (R0)