Skip to main content

A Technique of High Embedding Rate Text Steganography Based on Whole Poetry of Song Dynasty

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10039))

Included in the following conference series:

Abstract

Text steganography is a kind of technique which can transmit secret information using text as carrier. Compared with other types of carriers such as image and video, the embedding rate and capacity of text steganography algorithm is generally lower due to its low redundancy. A text steganography algorithm using single Ci-Pai of song poetry as a template and the embedding rate of it reaches 16.1 %. This paper presents a new text steganography algorithm based on song poetry with a higher embedding rate 27.1 %. In our proposed scheme, by selecting and processing 2538 pieces of song poetry which from 145 pieces of different Ci-Pai, a system which includes the template, the large capacity of lexicon, the encoder and the decoder is constructed. According to users’ needs, the proposed scheme can generate arbitrary Ci-Pai to make the secret messages hidden in the song poetry which metrical patterns, rhyme words completely accord with the Ci-Pai. Additionally, we confirm our high embedding rate through theoretical analysis and extensive experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Moulin, P., O’Sullivan, J.A.: Information-theoretic analysis of information hiding. J. Inf. Theor. 49, 563–593 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  2. Gupta S, Jain R.: An innovative method of Text Steganography In: Proceedings of the 2015 Third International Conference on Image Information Processing (ICIIP), pp. 60–64. IEEE (2015)

    Google Scholar 

  3. Kingslin, S., Kavitha, N.: Evaluative Approach towards Text Steganographic Techniques. Indian J. Sci. Technol. 8(1), 29 (2015)

    Google Scholar 

  4. Zhi-li, C., Liu-sheng, H., Zhen-shan, Y.: An information hiding algorithm based on double text segments. J. Electr. Inf. Technol. 31(11), 2725–2730 (2009)

    Google Scholar 

  5. Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75(4), 1947–1962 (2016)

    Article  Google Scholar 

  6. Rana, M.S., Sangwan, B.S., Jangir, J.S.: Art of hiding: an introduction to steganography. J. Int. J. Eng. Comput. Sci. 1(1), 11–23 (2012)

    Google Scholar 

  7. Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2015)

    Article  MathSciNet  Google Scholar 

  8. Uddin, M.P., Saha, M., Ferdousi, S.J., et al.: Developing an efficient solution to information hiding through text steganography along with cryptography. In: Proceedings of the 2014 9th International Forum (IFOST) Strategic Technology, pp. 14–17. IEEE (2014)

    Google Scholar 

  9. Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (2015). DOI:10.1109/TPDS.2015.2506573

    Google Scholar 

  10. Shu-Feng, W., Liu-Sheng, H.: Research on information hiding. J. Degree Master. University of Science and Technology of China (2003)

    Google Scholar 

  11. Maher, K.: TEXTO (2008, unpublished). ftp://funet.fi/pub/crypt/steganography/texto.tar.gz

  12. Chapman, M., Davida, G.: Hiding the hidden: a software system for concealing ciphertext as innocuous text. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 335–345. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  13. Winstein, K.: Lexical steganography through adaptive modulation of the word choice hash (1998, unpublished). http://www.imsa.edu/~keithw/tlex

  14. Yuling, L., Xingming, S., Can, G., et al.: An efficient linguistic steganography for Chinese text. In: Proceedings of Multimedia and Expo 2007 IEEE International Conference, pp. 2094–2097. IEEE (2007)

    Google Scholar 

  15. Zhenshan, Yu., Liusheng, H., Zhili, C., et al.: High embedding ratio text steganography by ci-poetry of the song dynasty. J. Inf. Process. 23(4), 55–62 (2009)

    Google Scholar 

Download references

Acknowledgements

This work is partly supported by the Fundamental Research Funds for the Central Universities (NZ2015108), the fifth graduate student innovation experiment competition breeding project base of Nanjing University of Aeronautics and Astronautics, Natural Science Foundation of Jiangsu province (BK20150760), the China Postdoctoral Science Foundation funded project (2015M571752), Jiangsu province postdoctoral research funds (1402033C), and NSFC (61472470, 61370224).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanchen Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Liu, Y., Wang, J., Wang, Z., Qu, Q., Yu, S. (2016). A Technique of High Embedding Rate Text Steganography Based on Whole Poetry of Song Dynasty. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10039. Springer, Cham. https://doi.org/10.1007/978-3-319-48671-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48671-0_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48670-3

  • Online ISBN: 978-3-319-48671-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics