Journal on Communications ›› 2022, Vol. 43 ›› Issue (9): 240-253.doi: 10.11959/j.issn.1000-436x.2022179
• Correspondences • Previous Articles
Hui LI1, Jiali JIN1, Shuyu JIN2, Weijiao MA3
Revised:
2022-06-29
Online:
2022-09-25
Published:
2022-09-01
CLC Number:
Hui LI, Jiali JIN, Shuyu JIN, Weijiao MA. Text steganography method based on automatic selection coding and dynamic word selection strategy[J]. Journal on Communications, 2022, 43(9): 240-253.
"
源语句 | hthreshold | 隐写译文 |
they know their business better than anyone else. | 0.1 | Sie kennen ihre Gesch?fte besser als jeder andere. |
0.5 | Sie kennen ihr Gesch?ft besser als jeder andere. | |
0.9 | Sie kennen ihre Gesch?ft besser als alle andere. | |
I've realised my wrongdoing. | 0.1 | ich habe mein Fehlverhalten erkannt. |
0.5 | ich habe mein Fehlverhalten erkannt. | |
0.9 | ich habe meine Fehl dass erkannt. | |
share with us your thoughts in the comments below. | 0.1 | Teilen Sie uns Ihre Meinung in den Kommentaren unten. |
0.5 | Teilen Sie uns Ihre Meinung in den folgenden Kommenten. | |
0.9 | Teilen Sie uns Ihre Gedanken in den folgendenaren unten. | |
for the time being, the house is no longer habitable. | 0.1 | das Haus ist vorerst nicht mehr bewohnbar. |
0.5 | im Haus ist vorerst nicht mehr bewohnbar. | |
0.9 | dasl?ufig ist das Haus nicht mehr bewohnbar. |
"
hthreshold | BS | bpw | Sacrebleu | ER | ||||||||
FVLC | VLC | FLC | FVLC | VLC | FLC | FVLC | VLC | FLC | ||||
0.1 | 1.00 | 1.00 | 1.00 | 27.33 | 25.15 | 25.06 | 1.67% | 1.70% | 1.69% | |||
0.3 | 1.00 | 1.00 | 1.00 | 25.10 | 22.71 | 22.63 | 2.06% | 2.07% | 2.06% | |||
0.5 | 2 | 1.00 | 1.00 | 1.00 | 22.78 | 20.26 | 20.19 | 2.38% | 2.39% | 2.39% | ||
0.7 | 1.00 | 1.00 | 1.00 | 20.35 | 17.75 | 17.73 | 2.66% | 2.67% | 2.66% | |||
0.9 | 1.00 | 1.00 | 1.00 | 17.89 | 15.42 | 15.30 | 2.87% | 2.87% | 2.87% | |||
0.1 | 1.62 | 1.44 | 2.00 | 26.77 | 24.67 | 24.16 | 1.76% | 1.78% | 1.83% | |||
0.3 | 1.74 | 1.58 | 2.00 | 23.86 | 21.39 | 20.65 | 2.57% | 2.60% | 2.65% | |||
0.5 | 4 | 1.81 | 1.68 | 2.00 | 20.47 | 18.02 | 17.12 | 3.56% | 3.54% | 3.70% | ||
0.7 | 1.84 | 1.74 | 2.00 | 16.93 | 14.94 | 13.50 | 4.50% | 4.42% | 4.73% | |||
0.9 | 1.87 | 1.80 | 2.00 | 13.71 | 11.99 | 10.02 | 5.26% | 5.11% | 5.55% | |||
0.1 | 2.21 | 1.90 | 3.00 | 26.78 | 24.18 | 23.68 | 1.54% | 1.64% | 1.49% | |||
0.3 | 2.47 | 2.18 | 3.00 | 23.65 | 20.53 | 19.93 | 2.56% | 2.72% | 2.55% | |||
0.5 | 8 | 2.61 | 2.39 | 3.00 | 19.60 | 16.78 | 16.10 | 4.22% | 4.36% | 4.26% | ||
0.7 | 2.71 | 2.52 | 3.00 | 15.53 | 13.39 | 11.77 | 6.06% | 6.04% | 6.24% | |||
0.9 | 2.74 | 2.60 | 3.00 | 11.62 | 10.09 | 7.71 | 7.54% | 7.32% | 7.98% | |||
0.1 | 2.60 | 2.19 | 4.00 | 26.63 | 24.01 | 23.21 | 1.23% | 1.39% | 1.09% | |||
0.3 | 3.11 | 2.69 | 4.00 | 23.54 | 20.41 | 19.70 | 2.35% | 2.56% | 2.27% | |||
0.5 | 16 | 3.40 | 3.07 | 4.00 | 19.95 | 16.70 | 16.08 | 4.35% | 4.66% | 4.43% | ||
0.7 | 3.55 | 3.27 | 4.00 | 15.53 | 13.15 | 11.81 | 7.03% | 7.13% | 7.24% | |||
0.9 | 3.62 | 3.39 | 4.00 | 10.62 | 9.17 | 7.03 | 9.56% | 9.33% | 10.12% | |||
0.1 | 2.86 | 2.40 | 5.00 | 26.62 | 23.65 | 22.42 | 1.01% | 1.21% | 0.85% | |||
0.3 | 3.66 | 3.11 | 5.00 | 23.58 | 20.44 | 19.39 | 2.06% | 2.32% | 2.04% | |||
0.5 | 32 | 4.17 | 3.70 | 5.00 | 19.86 | 17.03 | 15.77 | 4.34% | 4.65% | 4.51% | ||
0.7 | 4.39 | 4.02 | 5.00 | 15.83 | 13.35 | 11.91 | 7.54% | 7.74% | 8.01% | |||
0.9 | 4.46 | 4.17 | 5.00 | 10.53 | 8.93 | 7.14 | 11.19% | 11.00% | 11.99% |
[1] | LI F Y , YU Z L , QIN C . GAN-based spatial image steganography with cross feedback mechanism[J]. Signal Processing, 2022,190:108341. |
[2] | 姚远志, 王锋, 严文博 ,等. 基于二维码和可逆可视水印的图像隐私保护方案[J]. 通信学报, 2019,40(11): 65-75. |
YAO Y Z , WANG F , YAN W B ,et al. Image privacy preservation scheme based on QR code and reversible visible watermarking[J]. Journal on Communications, 2019,40(11): 65-75. | |
[3] | EL-SHAHED R A , AL-BERRY M N , EBEID H M ,et al. Multi-resolution video steganography technique based on stationary wavelet transform (SWT) and singular value decomposition (SVD)[C]// International Conference on Innovative Computing and Communications. Berlin:Springer, 2022: 157-169. |
[4] | PATEL R , LAD K , PATEL M . FFT-based robust video steganography over non-dynamic region in compressed domain[M]. Berlin: Springer, 2022. |
[5] | 牛盼盼, 杨思宇, 王丽 ,等. 基于稳健特征点的平稳小波域数字水印算法[J]. 通信学报, 2019,40(11): 187-198. |
NIU P P , YANG S Y , WANG L ,et al. Digital watermarking algorithm in SWT domain based on robust local feature[J]. Journal on Communications, 2019,40(11): 187-198. | |
[6] | YING K Y , WANG R D , LIN Y Z ,et al. Adaptive audio steganography based on improved syndrome-trellis codes[J]. IEEE Access, 2021,9: 11705-11715. |
[7] | YANG Z L , GUO X Q , CHEN Z M ,et al. RNN-stega:linguistic steganography based on recurrent neural networks[J]. IEEE Transactions on Information Forensics and Security, 2018,14(5): 1280-1295. |
[8] | ZIEGLER Z M , DENG Y T , RUSH A M . Neural linguistic steganography[J]. arXiv Preprint,arXiv:1909.01496, 2019. |
[9] | ROY S , MANASMITA M . A novel approach to format based text steganography[C]// Proceedings of the 2011 International Conference on Communication,Computing & Security. New York:ACM Press, 2011: 511-516. |
[10] | TANG X , CHEN M S . Design and implementation of information hiding system based on RGB[C]// Proceedings of the 3rd International Conference on Consumer Electronics,Communications and Networks. Piscataway:IEEE Press, 2013: 217-220. |
[11] | XIANG L Y , WANG X H , YANG C F ,et al. A novel linguistic steganography based on synonym run-length encoding[J]. IEICE Transactions on Information and Systems, 2017,100(2): 313-322. |
[12] | MERAL H M , SANKUR B , ?ZSOY A S , ,et al. Natural language watermarking via morphosyntactic alterations[J]. Computer Speech &Language, 2009,23(1): 107-125. |
[13] | SHNIPEROV A N , NIKITINA K A . A text steganography method based on Markov chains[J]. Automatic Control and Computer Sciences, 2016,50(8): 802-808. |
[14] | LUO Y B , HUANG Y F , LI F F ,et al. Text steganography based on ci-poetry generation using Markov chain model[J]. KSII Transactions on Internet and Information Systems (TIIS), 2016,10(9): 4568-4584. |
[15] | YANG Z L , JIN S Y , HUANG Y F ,et al. Automatically generate steganographic text based on Markov model and huffman coding[J]. arXiv Preprint arXiv:1811.04720, 2018. |
[16] | FANG T , JAGGI M , ARGYRAKI K . Generating steganographic text with LSTMs[J]. arXiv Preprint,arXiv:1705.10742, 2017. |
[17] | LUO Y B , HUANG Y F . Text steganography with high embedding rate:using recurrent neural networks to generate Chinese classic poetry[C]// Proceedings of the 5th ACM Workshop On Information Hiding and Multimedia Security. New York:ACM Press, 2017: 99-104. |
[18] | TONG Y J , LIU Y L , WANG J ,et al. Text steganography on RNN-generated lyrics[J]. Mathematical Biosciences and Engineering, 2019,16(5): 5451-5463. |
[19] | YANG Z L , GONG B T , LI Y M ,et al. Graph-Stega:semantic controllable steganographic text generation guided by knowledge graph[J]. arXiv Preprint,arXiv:2006.08339, 2020. |
[20] | YANG Z L , ZHANG P Y , JIANG M Y ,et al. RITS:real-time interactive text steganography based on automatic dialogue model[C]// International Conference on Cloud Computing and Security. Berlin:Springer, 2018: 253-264. |
[21] | WAYNER P . Mimic functions[J]. Cryptologia, 1992,16(3): 193-214. |
[22] | CHAPMAN M , DAVIDA G . Hiding the hidden:a software system for concealing ciphertext as innocuous text[C]// International Conference on Information and Communications Security. Berlin:Springer, 1997: 335-345. |
[23] | BENGIO Y , DUCHARME R , VINCENT P ,et al. A neural probabilistic language model[J]. Journal of machine learning research, 2003,3: 1137-1155. |
[24] | YANG Z L , HUANG Y F , ZHANG Y J . TS-CSW:text steganalysis and hidden capacity estimation based on convolutional sliding windows[J]. Multimedia Tools and Applications, 2020,79(25): 18293-18316. |
[25] | LI H , JIN S Y . Text steganalysis based on capsule network with dynamic routing[J]. IETE Technical Review, 2021,38(1): 72-81. |
[26] | GROTHOFF C , GROTHOFF K , ALKHUTOVA L ,et al. Translation-based steganography[C]// International Workshop on Information Hiding. Berlin:Springer, 2005: 219-233. |
[27] | STUTSMAN R , GROTHOFF C , ATALLAH M ,et al. Lost in just the translation[C]// Proceedings of the 2006 ACM Symposium on Applied Computing. New York:ACM Press, 2006: 338-345. |
[28] | MENG P , SHI Y Q , HUANG L S ,et al. LinL:lost in n-best list[C]// International Workshop on Information Hiding. Berlin:Springer, 2011: 329-341. |
[29] | WANG R , UTIYAMA M , FINCH A ,et al. Sentence selection and weighting for neural machine translation domain adaptation[J]. IEEE/ACM Transactions on Audio,Speech,and Language Processing, 2018,26(10): 1727-1741. |
[30] | GAIN B , HAQUE R , EKBAL A . Not all contexts are important:the impact of effective context in conversational neural machine translation[C]// Proceedings of International Joint Conference on Neural Networks. Piscataway:IEEE Press, 2021: 1-8. |
[31] | VASWANI A , SHAZEER N , PARMAR N ,et al. Attention is all you need[C]// Advances in Neural Information Processing Systems. Massachusetts:MIT Press, 2017: 5998-6008. |
[32] | BRITZ D , GOLDIE A , LUONG M T ,et al. Massive exploration of neural machine translation architectures[J]. arXiv Preprint,arXiv:1703.03906, 2017. |
[33] | PAPINENI K , ROUKOS S , WARD T ,et al. BLEU:a method for automatic evaluation of machine translation[C]// Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics. Stroudsburg:ACL Press, 2002: 311-318. |
[34] | POST M . A call for clarity in reporting BLEU scores[J]. arXiv Preprint,arXiv:1804.08771, 2018. |
[35] | 尉爽生, 杨忠良, 江旻宇 ,等. 基于神经机器翻译的文本隐写方法[J]. 应用科学学报, 2020,38(6): 976-985. |
YU S S , YANG Z L , JIANG M Y ,et al. Text steganography based on neural machine translation[J]. Journal of Applied Sciences, 2020,38(6): 976-985. | |
[36] | MURPHY B , VOGEL C . The syntax of concealment:reliable methods for plain text information hiding[C]// Security,Steganography,and Watermarking of Multimedia Contents IX. Bellingham:SPIE Press, 2007: 351-362. |
[37] | TOPKARA M , TOPKARA U , ATALLAH M J . Information hiding through errors:a confusing approach[C]// Security,Steganography,and Watermarking of Multimedia Contents IX. Bellingham:SPIE Press, 2007: 321-332. |
[38] | CHEN X Y , SUN H Y , TOBE Y ,et al. Coverless information hiding method based on the Chinese mathematical expression[C]// International Conference on Cloud Computing and Security. Berlin:Springer, 2015: 133-143. |
[39] | ZHOU Z L , MU Y , ZHAO N S ,et al. Coverless information hiding method based on multi-keywords[C]// International Conference on Cloud Computing and Security. Berlin:Springer, 2016: 39-47. |
[40] | WU N , YANG Z L , YANG Y ,et al. STBS-Stega:coverless text steganography based on state transition-binary sequence[J]. International Journal of Distributed Sensor Networks,2020:doi.org/10.1177/155014 7720914257. |
[1] | Yuling LIU, Cuilin WANG, Zhangjie FU. Generative text steganography method based on emotional expression in semantic space [J]. Journal on Communications, 2023, 44(4): 176-186. |
[2] | Dongyan HUANG, Kun LI. Research on multi-address time-based blockchain covert communication method [J]. Journal on Communications, 2023, 44(2): 148-159. |
[3] | Chao XIA, Yaqi LIU, Qingxiao GUAN, Xin JIN, Yanshuo ZHANG, Shengwei XU. Steganalysis of JPEG images using non-linear residuals [J]. Journal on Communications, 2023, 44(1): 142-152. |
[4] | Wei SHE, Xinpeng RONG, Wei LIU, Zhao TIAN. Generative blockchain-based covert communication model based on Markov chain [J]. Journal on Communications, 2022, 43(10): 121-132. |
[5] | Zhili ZHOU, Meimin WANG, Gaobo YANG, Jianyu ZHU, Xingming SUN. Generative steganography method based on auto-generation of contours [J]. Journal on Communications, 2021, 42(9): 144-154. |
[6] | Zhen ZHANG, Jiaming NI, Ye YAO, Lichun GONG, Yujuan WANG, Guohua WU. Text coverless information hiding method based on synonyms expansion and label delivery mechanism [J]. Journal on Communications, 2021, 42(9): 173-183. |
[7] | Guohua WU,Lichun GONG,Lifeng YUAN,Ye YAO. Review of information hiding on Chinese text [J]. Journal on Communications, 2019, 40(9): 145-156. |
[8] | Shuai REN,Zhen WANG,Dongxu SU,Tao ZHANG,Dejun MU. Information hiding algorithm based on mapping and structure data of 3D model [J]. Journal on Communications, 2019, 40(5): 211-222. |
[9] | Feng XU,Jia-nan LI,Jian-guo SUN. Research of composite safety protection for digital maps [J]. Journal on Communications, 2016, 37(2): 174-179. |
[10] | Ming-zhu LAI,Li-guo ZHANG,Wei-miao FENG,Yuan-yuan WANG,Yong WANG,Shou-zheng LI. Study on authority watermark of the electronic chart based on the semantics characteristics [J]. Journal on Communications, 2016, 37(11): 137-145. |
[11] | Li-quan CHEN,Miao LU,Ai-qun HU,Xiao-yan SUN. Improved information hiding algorithm based on twice positioning in coding channel [J]. Journal on Communications, 2013, 34(12): 120-130. |
[12] | Jia-yong CHEN,Jiu-fen LIU,Yue-fei ZHU,Wei-ming ZHANG. Cryptographic secrecy of steganographic matrix encoding [J]. Journal on Communications, 2012, 33(6): 174-179. |
[13] | Jian-guo SUN,Guo-yin ZHANG,Jun-peng WU,Ai-hong YAO. Performance verification of the digital watermarking for vector map based on SPA [J]. Journal on Communications, 2010, 31(9A): 239-244. |
[14] | Qiu-yu ZHANG,Yi-bo HUANG,Lan-jun ZHENG. Audio steganography algorithm using PCM quantization coding in the DWT domain [J]. Journal on Communications, 2010, 31(9A): 245-250. |
[15] | Ming CHEN,Ru ZHANG,Fan-fan LIU,Jia WU,Xin-xin NIU. Steganalysis of LSB matching based on regional correlation [J]. Journal on Communications, 2010, 31(3): 1-11. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|