IJCNIS Vol. 10, No. 7, 8 Jul. 2018
Cover page and Table of Contents: PDF (size: 378KB)
Full Text (PDF, 378KB), PP.52-58
Views: 0 Downloads: 0
Coverless Information Hiding, Data Security, Steganography, Steganalysis, Digital Content
Information plays a pre-eminent role in people's routine lives. It provides people with facts about abundant topics of interest. Information can be represented by a variety of communicative media such as text, video, audio, and image, out of which text is the most common medium for representing the information. In the digital era, the information can easily be imitated, exchanged and distributed from one place to another in an instant. Thus, it is incredibly essential to hide the confidential information so that it couldn’t be accessed by unauthorized means. The traditional information hiding techniques require a designated carrier to hide the secret information, which ultimately introduces some modifications in the carrier. As a result, it is quite hard for the existing traditional methods to escape from the steganalysis. In contrast to conventional information hiding techniques, the term ‘coverless information hiding’ has been coined by the researchers lately, which doesn’t require a designated carrier to conceal the secret information. Hence, the technique of coverless information hiding can efficiently resist the attacks of steganalysis. This paper presents a state-of-the-art survey of coverless text information hiding by discussing the current scope of the aforementioned technique comprehensively. The existing coverless text information hiding methods are compared and contrasted by various vital aspects such as embedding capacity, algorithm efficiency, ability to resist steganalysis, and methods’ theoretical and real-world significance. Moreover, some future aspects of coverless text information hiding are highlighted at the end.
Shahbaz Ali, "A State-of-the-Art Survey of Coverless Text Information Hiding", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.7, pp.52-58, 2018. DOI:10.5815/ijcnis.2018.07.06
[1]Deb, S.: Information Technology, Its Impact on Society and Its Future. Adv. Commun. 4, 25-29 (2014).
[2]Maggiolini, P.: Information Technology Benefits: A Framework. In: Carugati, A., Rossignoli, C. (eds.) Emerging Themes in Information Systems and Organization Studies, pp. 281-292. Physica-Verlag HD, Heidelberg (2011).
[3]Hura, G.S.: The Internet: global information superhighway for the future. Comput. Commun. 20, 1412-1430 (1998).
[4]Kim, W., Jeong, O., Kim, C., So, J.: The dark side of the Internet: Attacks, costs and response. Inf. Syst. 36, 675-705 (2011).
[5]Ali, S.: Steganography and Digital Watermarking as Promising Approaches to Information Hiding: A State-Of-The-Art Review. Int. J. Res. Appl. Sci. & Eng. Technol. 5, 313-318 (2017).
[6]Maxemchuk, N.F., Liu, T.Y., Tsai, W.H.: Electronic document distribution. AT&T Technol. J. 73, 73-80 (1994).
[7]Huang, D., Yan, H.: Inter word distance changes represented by sine waves for watermarking text images. IEEE Transactions Circuits Syst. 11, 1237-1245 (2001).
[8]Por, L.Y., Ang, T.F., Delina, B.: WhiteSteg: a new Scheme in information hiding using text steganography. WSEAS Transactions Comput. 7, 735-745 (2008).
[9]Huang, Y.F., Tang, S., Yuan, J.: Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec. IEEE Transactions Inf. Forensics & Secur. 6, 296-306 (2011).
[10]Bodo, Y., Laurent, N., Laurent, C., Dugelay, J.L.: Video Waterscrambling: Towards a Video Protection Scheme Based on the Disturbance of Motion Vectors. EURASIP J. Adv. Signal Process. 14, 2224-2237 (2004).
[11]Nematollahi, M.A., Vorakulpipat, C., Rosales, H.G.: Digital Watermarking: Techniques and Trends. Springer, Singapore (2017).
[12]Chen, X., Sun, H., Tobe, Y., Zhou, Z., Sun, X.: Coverless Information Hiding Method Based on the Chinese Mathematical Expression. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) Cloud Computing and Security, ICCCS 2015, Nanjing, August 2015. Lecture Notes in Computer Science, vol. 9483, pp. 133-143. Springer, Cham (2015).
[13]Zhou, Z., Mu, Y., Zhao, N., Wu, Q.M.J., Yang, C-N.: Coverless Information Hiding Method Based on Multi-keywords. In: Sun, X., Liu, A., Chao, H.C., Bertino, E. (eds.) Cloud Computing and Security, ICCCS 2016, Nanjing, July 2016. Lecture Notes in Computer Science, vol. 10039, pp. 39-47. Springer, Cham (2016).
[14]Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) Cloud Computing and Security, ICCCS 2015, Nanjing, August 2015. Lecture Notes in Computer Science, vol. 9483, pp. 123-132. Springer, Cham (2015).
[15]Zhou, Z., Cao, Y., Sun, X.: Coverless information hiding based on bag-of-words model of image. J. Appl. Sci. 2016; 34: 527-536 (2016).
[16]Yuan, C., Xia, Z., Sun, X.: Coverless image steganography based on SIFT and BOF. J. Internet Technol. 18, 435-442 (2017).
[17]Zhang, J., Huang, H., Wang, L., Lin, H., Gao, D.: Coverless Text Information Hiding Method Using the Frequent Words Hash. Int. J. Netw. Secur. 19, 1016-1023 (2017).
[18]Miller, M.: Acrostic Poems ... and some prose. Seattle, WA, USA: CreateSpace Independent Publishing Platform, (2011).
[19]Ali, S., Shao, L.: Digital Text Watermarking and its Application to the Sindhi Language. Int. J. Res. Appl. Sci. & Eng. Technol. 5, 944-949 (2017).
[20]Sun, X.M., Chen, H.W., Yang, L.H., Tang, Y.Y.: Mathematical representation of a Chinese character and its applications. Int. J. Pattern Recognit. & Artif. Intell. 16, 735-747 (2002).
[21]Zhang, J., Shen, J., Wang, L., Lin, H.: Coverless text information hiding method based on the word rank map. In: Sun, X., Liu, A., Chao, H.C., Bertino, E. (eds.) Cloud Computing and Security, ICCCS 2016, Nanjing, July 2016. Lecture Notes in Computer Science, vol. 10039, pp. 145-155. Springer, Cham (2016).
[22]Chen, X., Chen, S., Wu, Y.: Coverless information hiding method based on the Chinese character encoding. J. Internet Technol. 18, 91-98 (2017).
[23]Liu, C., Luo, G., Tian, Z.: Coverless Information Hiding Technology Research Based on News Aggregation. In: Sun, X., Chao, H.C., You, X., Bertino, E. (eds.) Cloud Computing and Security, ICCCS 2017, Nanjing, June 2017. Lecture Notes in Computer Science, vol. 10602, pp. 153-163. Springer, Cham (2017).