Journal on Communications ›› 2019, Vol. 40 ›› Issue (9): 145-156.doi: 10.11959/j.issn.1000-436x.2019208
• Comprehensive Review • Previous Articles Next Articles
Guohua WU,Lichun GONG,Lifeng YUAN,Ye YAO()
Revised:
2019-08-30
Online:
2019-09-25
Published:
2019-09-28
Supported by:
CLC Number:
Guohua WU,Lichun GONG,Lifeng YUAN,Ye YAO. Review of information hiding on Chinese text[J]. Journal on Communications, 2019, 40(9): 145-156.
"
子类 | 文献 | 原理 | 嵌入能力 | 局限 | |
基于文本图像的算法 | Ding等[ | 微调单词间距,在文本行间表现的正弦曲线中编码水印 | 取决于对波的采样方式与文本行数 | 受噪声干扰很难精确提取,嵌入容量低,稳健性差 | |
普通文本应用 | Kim等[ | 文本图像行直方图的子图一致性特征 | 一行嵌入1 bit | 高强度噪声破坏隐藏信息,嵌入容量低,稳健性差 | |
赵星阳等[ | 调整二值文本图像字符阶梯边缘 | 一行嵌入1 bit | 受噪声干扰水印稳健性差 | ||
Behrooz等[ | 两端对齐文本的HL条件 | 一个HL嵌入4 bit | HL特征不稳定,适用长文本 | ||
亓文法等[ | 打印扫描比值不变量,翻转字符图像边界上的像素点 | 一个嵌入字符隐藏1 bit | 易受噪声干扰,字符切割严格有序 | ||
打印扫描应用 | Tan等[ | 调整字符图像的可旋转笔画 | 旋转一个笔画嵌入1 bit | 易受图像旋转,噪声攻击 | |
雷敏等[ | 相邻字符图像的相对高度 | 满足相对高度关系的2个字符嵌入1 bit | 相对高度的相邻汉字较为随机,无法抵抗OCR攻击 | ||
基于文本格式的算法 | 文本间距 | Low等[ | 基于字移编码、行移编码 | 调整的一个单词或一行嵌入1 bi | 仅用于非盲水印 |
杨洁等[ | 字移编码与行移动编码结合 | 调整的一个单词或一行嵌入1 bi | 降低隐蔽性提高嵌入容量 | ||
付兵等[ | 基于Unicode编码奇偶性与字符属性修改 | 每个字符嵌入1 bit | 严格按照初始位置提取,水印稳健性差 | ||
陆绿等[ | 基于Unicode编码奇偶性 | 每个字嵌入1 bit | 只适用于Unicode编码字符 | ||
张洪礼等[ | 基于词平台汉字编码 | 每个词嵌入2 bit | 编码资源冗余 | ||
刘豪等[ | 修改字符蓝色分量编码值 | 每个字嵌入1 bit | 隐蔽性低,嵌入容量低 | ||
Tang等[ | 基于字符颜色属性RGB的3个通道的最低位值 | 每个字嵌入3 bit | 隐蔽性较低 | ||
字符编码 | Liu等[ | 基于不可见ASCII字符替换 | 每个段落嵌入1 bit | 嵌入能力低 | |
崔光明等[ | 基于不可见ASCII字符替换 | 与文本中空格数量与约束函数选择相关 | 受限于字符的编码方式 | ||
张震宇等[ | 基于 Unicode 编码的不可见字符嵌入 | 每个句子嵌入2 bit | 受限于字符的编码方式 | ||
Stefano等[ | 基于Unicode编码同形字 | 同形字符嵌入1 bit | 稳健性较差 | ||
杨德明等[ | word文档中未使用属性隐藏信息 | 与其未使用属性空间大小相关 | 仅用于特定版本的word文档 | ||
文件格式 | Zhong等[ | pdf文档行末标识符不显示的特性 | 每行嵌入1 bit | 仅用于pdf文档 | |
Yang等[ | xml文档标记的排列组合 | 与其标签排列组合数相关 | 仅用于xml文档 | ||
基于文本内容的算法 | 赵敏之等[ | 增删句中助词“的”字 | 修改一个“的”字嵌入1 bit | 分析句子过程较复杂 | |
基于语法方法 | Meng等[ | 利用句式变换改变句长 | 修改一个句子长度嵌入1 bit | 计算复杂度高,嵌入率低 | |
Meng等[ | 计算句子熵提取零水印 | 零水印与阈值的设定有关 | 未考虑停用词的影响 | ||
Chiang等[ | 基于同义词替换 | 每替换一个同义词嵌入1 bit | 算法复杂,且无法抵抗同义词替换攻击 | ||
甘灿等[ | 筛选出适合替换中文同义词 | 取决于同义词编码位数 | 无法抵抗同义词替换攻击 | ||
姜传贤等[ | 筛选出中文文本主题句并用句内同义词替换 | 取决于主题句数量与同义词编码方式 | 无法抵抗同义词替换攻击 | ||
基于语义方法 | Chang等[ | 英文同义词筛选与顶点着色编码 | 取决于同义词编码方式 | 无法抵抗同义词替换攻击 | |
杨潇等[ | 基于矩阵编码的同义词替换 | 取决于矩阵编码效率 | 无法抵抗同义词替换攻击 | ||
Wu等[ | 基于LZW同义词替换 | 取决LZW效率 | 无法抵抗同义词替换攻击 | ||
Zhang等[ | 基于词阶图无载体信息隐藏 | 以词为嵌入单位,容量不受限 | 顺序提取,且通信过程开销较大 | ||
Sun等[ | 基于左右结构汉字偏旁拆分 | 每个左右结构汉字嵌入1 bit | 无法抵抗对左右结构汉字的添加、删除、替换攻击 | ||
Wang等[ | 将左右、上下结构汉字偏旁拆分结合可逆的方法 | 每个上下、左右结构汉字嵌入1 bit | 无法抵抗对上下、左右结构汉字的添加、删除、替换攻击 | ||
Fei等[ | 基于汉字多音字 | 相邻2个多音字间嵌入16 bit | 无法抵抗对多音字的添加、删除、替换攻击 | ||
基于汉语特征方法 | Zhu等[ | 基于汉字声韵母的零水印方法 | 取决于音数值阈值的选取 | 对文本内容的添加、删除、替换攻击水印的稳健性较弱 | |
Tang等[ | 以8笔画汉字定位嵌入点 | 每个8笔画汉字嵌入16 bit | 无法抵抗对8笔画汉字的添加、删除、替换攻击 | ||
Liu等[ | 基于汉字笔画数的零水印方法 | 取决于选取笔画数设定的阈值 | 无法抵抗对汉字的添加、删除、替换攻击 | ||
孙新梅等[ | 基于简体字与繁体字替换 | 取决于其算法选取的嵌入方式 | 无法抵抗对嵌入位置上汉字的添加、删除、替换攻击 |
[1] | 刘智涛 . 基于信息隐藏技术研究综述[J]. 工业仪表与自动化装置, 2015(3): 13-15. |
LIU Z T . Summary of the research based on information hiding technique[J]. Industrial Instrumentation & Automation, 2015(3): 13-15. | |
[2] | 陈威兵, 杨高波, 陈日超 ,等. 数字视频真实性和来源的被动取证[J]. 通信学报, 2011,32(6): 177-183. |
CHEN W B , YANG G B , CHEN R C ,et al. Digital video passive forensics for its authenticity and source[J]. Journal on Communications, 2011,32(6): 177-183. | |
[3] | 舒后, 杨潮, 何薇 . 基于文本内容的数字水印算法的设计与实现[J]. 计算机工程与设计, 2008,29(5): 1299-1302. |
SHU H , YANG C , HE W . Design and implementation of digital watermarking algorithm based on text[J]. Computer Engineering and Design, 2008,29(5): 1299-1302. | |
[4] | FENG B , WANG Z H , WANG D ,et al. A novel,reversible,Chinese text information hiding scheme based on lookalike traditional and simplified Chinese characters[J]. KSII Transactions on Internet & Information Systems, 2014,8(1): 269-281. |
[5] | KAMARUDDIN N S , KAMSIN A , POR L Y ,et al. A review of text watermarking:theory,methods and applications[J]. IEEE Access, 2018,6(1): 8011-8028. |
[6] | 林新建, 唐向宏, 王静 . 编码与同义词替换结合的可逆文本水印算法[J]. 中文信息学报, 2015,29(4): 151-158. |
LIN X J , TANG X H , WANG J . A reversible text watermarking algorithm based on coding and synonymy substitution[J]. Journal of Chinese Information Processing, 2015,29(4): 151-158. | |
[7] | 冯春晖, 徐正全, 郑兴辉 ,等. 数字可视媒体取证[J]. 通信学报, 2014,35(4): 155-165. |
FENG C H , XU Z Q , ZHENG X H ,et al. Digital visual media forensics[J]. Journal on Communications, 2014,35(4): 155-165. | |
[8] | JALIL Z , MIRZA A M , JABEEN H . Word length based zero-watermarking algorithm for tamper detection in text documents[C]// International Conference on Computer Engineering & Technology. IEEE, 2010: 378-382. |
[9] | 周继军, 杨著, 钮心忻 . 文本信息隐藏检测算法研究[J]. 通信学报, 2004,25(12): 97-101. |
ZHOU J J , YANG Z , NIU X X . Research on the detecting algorithm of text document information hiding[J]. Journal on Communications, 2004,25(12): 97-101. | |
[10] | MILAD T A , LI Q , HOU J . Modern text hiding,text steganalysis,and applications:a comparative analysis[J]. Entropy, 2019,21(4):355. |
[11] | 褚勇俊, 张云华 . 面向文本图像的地纹数字水印研究[J]. 工业控制计算机, 2013,26(3): 65-66. |
CHU Y J , ZHANG Y H . Study on document watermarking using block-patterns for text images[J]. Industrial Control Computer, 2013,26(3): 65-66. | |
[12] | DING H , HONG Y . Interword distance changes represented by sine waves for watermarking text images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2002,11(12): 1237-1245. |
[13] | KIM Y W , OH I S . Watermarking text document images using edge direction histograms[J]. Pattern Recognition Letters, 2004,25(11): 1243-1251. |
[14] | 赵星阳, 孙继银, 李琳琳 ,等. 基于字符阶梯边沿调整的文本水印算法[J]. 计算机应用, 2008,28(12): 3175-3178. |
ZHAO X Y , SUN J Y , LI L L ,et al. Watermarking of text images using character step edge adjustment[J]. Computer Application, 2008,28(12): 3175-3178. | |
[15] | BEHROOZ K , BEHNAM K , BAHMAN K ,et al. A new method for pdf steganography in justified texts[J]. Journal of Information Security and Applications, 2019,(45): 61-70. |
[16] | 亓文法, 李晓龙, 杨斌 ,等. 用于信息追踪的文本水印算法[J]. 通信学报, 2008,29(10): 183-190. |
QI W F , LI X L , YANG B ,et al. Document watermarking scheme for information tracking[J]. Journal on Communications, 2008,29(10): 183-190. | |
[17] | TAN L N , SUN X , SUN G . Print-scan resilient text image watermarking based on stroke direction modulation for Chinese document authentication[J]. Radio engineering, 2012,21(1): 170-181. |
[18] | 雷敏, 杨榆, 胡若翔 . 基于中文汉字复杂度的抗打印扫描文本水印算法[J]. 北京邮电大学学报, 2015,38(s1): 58-62. |
LEI M , YANG Y , HU R X . A print resilient watermark scheme based on character complexity[J]. Journal of Beijing University of Posts and Telecommunications, 2015,38(s1): 58-62. | |
[19] | LOW S H , MAXEMCHUK N F , BRASSIL J T ,et al. Document marking and identification using both line and word shifting[C]// Infocom 95 Fourteenth Joint Conference of the IEEE Computer &Communications Societies Bringing Information to People. IEEE, 1995: 853-860. |
[20] | 杨洁, 张敏瑞 . 基于行移和字移编码的二值文本数字水印技术[J]. 西安邮电学院学报, 2006,11(3): 101-105. |
YANG J , ZHANG M R . Document marking technique based on both line and word shifting[J]. Journal of Xi'an University of Posts and Telecommunications, 2006,11(3): 101-105. | |
[21] | 付兵 . 基于字符 Unicode 编码奇偶性的文本信息隐藏算法研究[J]. 福建电脑, 2008,24(12):66. |
FU B . Research on text information hiding algorithms based on Unicode coding parity[J]. Fujian Computer, 2008,24(12):66. | |
[22] | 陆绿, 方勇 . 基于字符 Unicode 奇偶性的数字水印设计与实现[J]. 计算机技术与发展, 2010,20(8): 176-179. |
LU L , FANG Y . Design and implementation of digital watermark based on parity of Unicode[J]. Computer Technology & Development, 2010,20(8): 176-179. | |
[23] | 张洪礼, 刘丹, 温学谦 ,等. 基于词平台汉字编码的文本信息隐藏算法[J]. 计算机工程, 2010,36(7): 150-152. |
ZHANG H L , LIU D , WEN X Q ,et al. Text information hiding algorithm based on Chinese characters coding in words platform[J]. Computer Engineering, 2010,36(7): 150-152. | |
[24] | 刘豪, 孙星明, 刘晋飚 . 基于字体颜色的文本数字水印算法[J]. 计算机工程, 2005,31(15): 129-131. |
LIU H , SUN X M , LIU J B . Color-based watermarking algorithm for text documents[J]. Computer Engineering, 2005,31(15): 129-131. | |
[25] | TANG X , CHEN M . Design and implementation of information hiding system based on RGB[C]// International Conference on Consumer Electronics. IEEE, 2013: 217-220. |
[26] | LIU F , LUO P , MA Z ,et al. Security secret information hiding based on hash function and invisible ASCII characters replacement[C]// Trustcom/bigdatase/ispa. IEEE, 2016: 1963-1969. |
[27] | 崔光明, 洪星, 袁翔 . 基于不可见字符替换的信息隐藏方法研究[J]. 计算机应用与软件, 2016,33(4): 277-280. |
CUI G M , HONG X , YUAN X ,et al. Research on information hiding based on invisible characters replacement[J]. Computer Applications& Software, 2016,33(4): 277-280. | |
[28] | 张震宇, 李千目, 戚湧 . 基于不可见字符的文本水印设计[J]. 南京理工大学学报(自然科学版), 2017,41(4): 405-411. |
ZHANG Z Y , LI Q M , QI Y . Text watermarking design based on invisible characters[J]. Journal of Nanjing University of Science and Technology, 2017,41(4): 405-411. | |
[29] | STEFANO G R , FLAVIO B , DANILO M . Content-preserving text watermarking through Unicode homoglyph substitution[C]// .International Database Engineering & Applications Symposium. ACM, 2016: 97-104. |
[30] | 杨德明, 郭盛 . 基于 Word 文档的数据隐藏方法[J]. 计算机应用与软件, 2015,32(5): 314-318. |
YANG D M , GUO S . Data hiding method based on word document[J]. Computer Applications and Software, 2015,32(5): 314-318. | |
[31] | ZHONG Z Y , GUO Y H , XU G A . Digital watermarking algorithm based on structure of PDF document[J]. Journal of Computer Applications, 2012,32(10): 2776-2778. |
[32] | YANG J , . Algorithm of XML document information hiding based on equal element[C]// International Conference on Computer Science &Information Technology. IEEE, 2010: 250-253. |
[33] | 赵敏之, 孙星明, 向华政 . 基于虚词变换的自然语言信息隐藏算法研究[J]. 计算机工程与应用, 2006,42(3): 158-160. |
ZHAO M Z , SUN X M , XIANG H Z . Research on the Chinese text steganography based on the modification of the empty word[J]. Computer Engineering and Application, 2006,42(3): 158-160. | |
[34] | MENG Y J , GUO X P , ZHANG W ,et al. Text watermarking algorithm based on sentence length[J]. Computer Engineering and Applications, 2007,43(32): 52-54. |
[35] | MENG Y J , GUO T , GUO Z H . Chinese text zero-watermark based on sentence’s entropy[C]// International Conference on Multimedia Technology. 2010: 1-4. |
[36] | 徐迎晖, 杨榆, 钮心忻 . 基于语义的文本隐藏方法[J]. 计算机系统应用, 2006,15(6): 91-94. |
XU Y H , YANG Y , NIU X X . Text steganography based on sementic[J]. Application of Computer System, 2006,15(6): 91-94. | |
[37] | CHIANG Y L , CHANG L P , HSIEH W T ,et al. Natural language watermarking using semantic substitution for Chinese text[C]// Digital Watermarking,Second International Workshop. DBLP, 2003: 192-140. |
[38] | 甘灿, 孙星明, 刘玉玲 . 一种改进的基于同义词替换的中文文本信息隐藏方法[J]. 东南大学学报(自然科学版), 2007,37(s1): 137-140. |
GAN C , SUN X M , LIU Y L . Improved steganographic algorithm based on synonymy substitution for Chinese text[J]. Journal of Southeast University (Natural Science Edition), 2007,37(s1): 137-140. | |
[39] | 姜传贤, 陈孝威, 李智 . 基于文本重要内容的稳健水印算法[J]. 自动化学报, 2010,36(9): 1250-1256. |
JIANG C X , CHEN X W , LI Z . Robust text watermarking based on significant components[J]. Acta Automatica Sinica, 2010,36(9): 1250-1256. | |
[40] | CHANG C Y , CLARK S . Practical linguistic steganography using contextual synonym substitution and vertex color coding[C]// The 2010 Conference on Empirical Methods in Natural Language Processing. ACM, 2010: 1194-1203. |
[41] | 杨潇, 李峰, 向凌云 . 基于矩阵编码的同义词替换隐写算法[J]. 小型微型计算机系统, 2015,36(6): 1296-1300. |
YANG X , LI F , XIANG L Y . Synonym substitution-based steganographic algorithm with matrix coding[J]. Journal of Chinese Mini-Micro Computer Systems, 2015,36(6): 1296-1300. | |
[42] | WU W S , XIANG L Y , WANG W . A synonym substitution-based steganography using LZW compression algorithm[J]. Revista De La Facultad De Ingenieria, 2017,32(1): 763-770. |
[43] | ZHANG J J , WANG L C , LIN H J . Coverless text information hiding method based on the rank map[J]. Journal of Internet Technology, 2017,18(2): 127-434. |
[44] | SUN X M , LUO G , HUANG H J . Component-based digital watermarking of Chinese texts[C]// International Conference on Information Security. ACM, 2004: 76-81. |
[45] | WANG Z H , CHANG C C , LIN C C ,et al. A reversible information hiding scheme using left-right and up-down Chinese character representation[J]. Journal of Systems and Software, 2009,82(8): 1362-1369. |
[46] | FEI W B , TANG X H . A Chinese text watermark algorithm based on polyphone[C]// Cross Strait Quad-regional Radio Science & Wireless Technology Conference. IEEE, 2011: 1215-1218. |
[47] | ZHU P , XIANG G , SONG W ,et al. A text zero-watermarking algorithm based on Chinese phonetic alphabets[J]. Wuhan University Journal of Natural Sciences, 2016,21(4): 277-282. |
[48] | TANG X H , WANG L N . Text watermarking algorithm based on the stroke of Chinese characters[C]// International Conference on Multimedia Technology. IEEE, 2011: 794-796. |
[49] | LIU J , PAN J S . Text zero-watermark based on using strokes of Chinese characters[J]. Computer Engineering & Applications, 2013,49(9): 99-101. |
[50] | 孙新梅, 孟朋, 黄刘生 . 基于字体的中文信息隐藏算法[J]. 计算机工程与设计, 2013,34(9): 3063-3067. |
SUN X M , MENG P , HUANG L S . Chinese text steganography based on character forms[J]. Computer Engineering & Design, 2013,34(9): 3063-3067. | |
[51] | TAN L N , HU K , ZHOU X M ,et al. Print-scan invariant text image watermarking for hardcopy document authentication[J]. Multimedia Tools and Applications, 2018(10): 1-23. |
[52] | KHADIJA G , HASSAN D , RACHID H ,et al. A zero-bit Fourier image watermarking for print-cam process[J]. Multimedia Tools and Applications, 2019,78(2): 2621-2638. |
[53] | YANG Z L , GUO X Q , CHEN Z M ,et al. RNN-Stega:linguistic steganography based on recurrent neural networks[J]. IEEE Transactions on Information Forensics and Security, 2019,14(5): 1280-1259. |
[54] | XIAO C , ZHANG C , ZHENG X X . Fontcode:Embeding information in text documents using glyph perturbation[J]. ACM Transactions on Graphics, 2018,37(2):15. |
[55] | FANG H , ZHANG W M , ZHOU H ,et al. Screen-shooting resilient watermarking[J]. IEEE Transactions on Information Forensics and Security, 2019,14(6): 1403-1418. |
[1] | Yuling LIU, Cuilin WANG, Zhangjie FU. Generative text steganography method based on emotional expression in semantic space [J]. Journal on Communications, 2023, 44(4): 176-186. |
[2] | Dongyan HUANG, Kun LI. Research on multi-address time-based blockchain covert communication method [J]. Journal on Communications, 2023, 44(2): 148-159. |
[3] | Chao XIA, Yaqi LIU, Qingxiao GUAN, Xin JIN, Yanshuo ZHANG, Shengwei XU. Steganalysis of JPEG images using non-linear residuals [J]. Journal on Communications, 2023, 44(1): 142-152. |
[4] | Hui LI, Jiali JIN, Shuyu JIN, Weijiao MA. Text steganography method based on automatic selection coding and dynamic word selection strategy [J]. Journal on Communications, 2022, 43(9): 240-253. |
[5] | Wei SHE, Xinpeng RONG, Wei LIU, Zhao TIAN. Generative blockchain-based covert communication model based on Markov chain [J]. Journal on Communications, 2022, 43(10): 121-132. |
[6] | Zhili ZHOU, Meimin WANG, Gaobo YANG, Jianyu ZHU, Xingming SUN. Generative steganography method based on auto-generation of contours [J]. Journal on Communications, 2021, 42(9): 144-154. |
[7] | Zhen ZHANG, Jiaming NI, Ye YAO, Lichun GONG, Yujuan WANG, Guohua WU. Text coverless information hiding method based on synonyms expansion and label delivery mechanism [J]. Journal on Communications, 2021, 42(9): 173-183. |
[8] | Shuai REN,Zhen WANG,Dongxu SU,Tao ZHANG,Dejun MU. Information hiding algorithm based on mapping and structure data of 3D model [J]. Journal on Communications, 2019, 40(5): 211-222. |
[9] | Feng XU,Jia-nan LI,Jian-guo SUN. Research of composite safety protection for digital maps [J]. Journal on Communications, 2016, 37(2): 174-179. |
[10] | Ming-zhu LAI,Li-guo ZHANG,Wei-miao FENG,Yuan-yuan WANG,Yong WANG,Shou-zheng LI. Study on authority watermark of the electronic chart based on the semantics characteristics [J]. Journal on Communications, 2016, 37(11): 137-145. |
[11] | Li-quan CHEN,Miao LU,Ai-qun HU,Xiao-yan SUN. Improved information hiding algorithm based on twice positioning in coding channel [J]. Journal on Communications, 2013, 34(12): 120-130. |
[12] | Jia-yong CHEN,Jiu-fen LIU,Yue-fei ZHU,Wei-ming ZHANG. Cryptographic secrecy of steganographic matrix encoding [J]. Journal on Communications, 2012, 33(6): 174-179. |
[13] | Jian-guo SUN,Guo-yin ZHANG,Jun-peng WU,Ai-hong YAO. Performance verification of the digital watermarking for vector map based on SPA [J]. Journal on Communications, 2010, 31(9A): 239-244. |
[14] | Qiu-yu ZHANG,Yi-bo HUANG,Lan-jun ZHENG. Audio steganography algorithm using PCM quantization coding in the DWT domain [J]. Journal on Communications, 2010, 31(9A): 245-250. |
[15] | Ming CHEN,Ru ZHANG,Fan-fan LIU,Jia WU,Xin-xin NIU. Steganalysis of LSB matching based on regional correlation [J]. Journal on Communications, 2010, 31(3): 1-11. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|