文本信息隐藏和隐藏信息检测研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
信息隐藏技术是信息安全领域的一个重要研究热点,可广泛地用于隐蔽通信、机密信息的存储与传输、数字媒体的版权保护等。但信息隐藏技术也可能被恶意滥用,对国家、社会、个人造成不可估量的损失,因此需要研究隐藏信息检测技术来拦截和破坏利用信息隐藏技术秘密传递的非法信息。另外,研究隐藏信息检测技术可以促进信息隐藏技术的发展,为信息隐藏系统的安全提供衡量标准。因此,研究信息隐藏技术和隐藏信息检测技术对维护信息安全具有十分重要的意义。
     文本信息隐藏技术以文本数据为载体,利用文本数据在格式、结构和语言等方面的冗余,将秘密信息隐藏到文本数据中。文本隐藏信息检测技术则是文本信息隐藏技术的对抗技术,以检测文本数据中隐藏信息存在性为目的。本文一方面深入研究常见的格式层、词汇层、句子层文本信息隐藏技术的原理,提出相应的检测算法。另一方面,从提高嵌入效率和特征保持两方面设计更安全的文本信息隐藏算法,以提高抵抗信息隐藏检测攻击的能力。其主要研究成果如下:
     (1)针对基于字符格式的文本信息隐藏方法,提出了三类统计特征来设计检测算法。基于字符格式的信息隐藏方法会引起相邻字符的格式属性值的跳变,字符游程长度的改变,以及语义相关字符的格式属性的异常变化,从而提取了三类统计特征,然后以支持向量机为分类器对基于字符格式修改的隐写文档和正常文档进行分类。实验结果表明基于这三类统计特征的检测方法在检测可靠性和通用性上各有优势,检测精度高。
     (2)针对基于同义词替换的信息隐藏方法,提出了一种基于同义词词频统计特征的检测算法。对同义词组中的同义词,按其在大规模语料库中的词频大小进行排序,定义同义词所在位置和同义词组的大小为同义词的属性对。由于同义词的替换将引起高频属性对数量降低而低频属性对数量的增加,理论分析了属性对分布概率在嵌入前后的改变量与嵌入率的关系,提出了基于属性对相对概率差的特征向量来检测基于同义词替换的隐藏信息。同时,进一步理论分析了信息隐藏算法中同义词编码方法对检测特征的影响。实验结果表明,该算法与已有检测算法相比具有更好的检测性能。
     (3)针对基于句法变换的信息隐藏方法,提出了一种基于语义等价句法结构统计特征的检测算法。句法变换会导致可相互转换的不同句法结构分布概率的改变,根据该变化情况建立了高阶统计模型,然后理论分析了句法变换引起的句法结构高阶统计特征分布的改变,推导了统计特征的选择。实验结果表明,针对不同体裁和嵌入率的隐写文本,该算法都能提供较高的检测精度。
     (4)为了提高文本信息隐藏算法的嵌入效率,提出了一种q元分组码校验矩阵的构建算法,用于设计根据秘密信息长度和隐藏容量自适应选择分组码的文本信息隐藏算法。该嵌入算法与一般的矩阵嵌入方法相比能在低嵌入率时获得更高的嵌入效率。实验结果表明,构建的校验矩阵能使隐藏方法具有接近于理论上限的较高嵌入效率。针对噪声附加的文本信息隐藏算法,设计了扩展的分组编码方法。该方法通过建立分组中权重小的载体数据向量与秘密信息向量的编码关系,以使嵌入效率达到基于分组码嵌入时的理论上限。实验结果表明,扩展分组编码方法的使用,大大降低了基于噪声附加的隐写文本被检测到的可能性。
     (5)为了保持文本统计特性不变,提出了一种基于选择题的安全文本信息隐藏方法。以Cachin信息隐藏安全性理论模型为指导,选择具有独立同分布特征的特殊文本载体选择题来设计隐藏算法。该算法利用选择题之间和选择题内部选项之间的无序性对选择题和内部选项顺序进行编码,然后根据秘密信息从题库中选取选择题组成隐写文本,并通过改变选项顺序以嵌入更多的秘密信息。实验结果表明,该算法隐蔽性好,嵌入比特率较高,并能抵抗统计分析攻击。
Information hiding is an important research hotspot in the field of information security, which has been widely used for covert communication, storage and transmission of confidential information, copyright protection of digital media, etc. However, information hiding techniques may also be abused to transmit illegal or malicious information, which could lead to incalculable losses for the nation, society, and the people. Therefore, it is necessary to study the techniques for detecting hidden information to prevent and destroy the illegally transmitted secret information. In addition, detection of hidden information, also called steganalysis, can promote the development of information hiding and provide criteria for measuring the security of an information hiding system. Therefore, research on information hiding and steganalysis is meaningful and significant for maintaining information security.
     Text steganography takes text data as the carrier and embeds secret information by making the use of the information redundancies in the format, storage structure and linguistic characteristics. As an opponent to text steganography, text steganalysis aims to detect the existence of the hidden information in the text. In this thesis, we concentrate on steganalysis for the common text information hiding methods on format, vocabulary, sentence level. On the other hand, more secure text steganographic algorithms are proposed by improving the embedding efficiency and preserving statistical characteristics to enhance the resistance ability for steganalysis attacks. The main contributions of the thesis are presented as follows:
     (1) For the information hiding method based on character format, three types of statistical features are proposed to design steganalysis algorithms. Considering that character-format-based steganography would cause variations between format attribute values of adjacent characters, changes of the character-run length, and abnormal changes of the format attributes of characters with semantic dependency, three types of statistical features are extracted, which are taken as the inputs of the support vector machine for classifying the cover and stego documents. Experimental results show that these three types of statistical features have different advantages on the detection reliability and generality, and can provide high detection accuracy.
     (2) A text steganalysis method using the features derived from synonym frequency is proposed to detect synonym substitution-based steganography. First, the attribute pair is introduced and expressed as an ordered pair to represent the position of a word in a frequency-descending ordered synonym set and the number of its synonyms. As a result of the synonym substitutions, the amount of high frequency attribute pairs may be reduced while the amount of low frequency attribute pairs would be increased. By theoretically analyzing the relationship between the changes of the probability distributions of attribute pairs and embedding rate, a feature vector based on the difference of the relative probabilities of different attribute pairs is utilized to detect the secret information. Moreover, the impact caused by synonym coding strategies is theoretically analyzed. Experimental results demonstrate that the proposed method has high detection probability, and achieves better detection performance than existing methods.
     (3) A steganalysis method using statistical features from the differences among semantically equivalent syntactic structures is proposed to detect the presence of secret information embedded by syntactic-transformation-based steganography. The syntactic transformations caused the difference of the occurrence frequency among different semantically equivalent syntactic structures vary between the cover texts and stego texts. According to the transition matrix caused by syntactic transformation, a higher-order statistical model is built. Consequently, some statistical features are deduced from the variations of syntactic structures'higher-order statistics after syntactic transformation. The experimental results show that the proposed method provides high detection accuracy for various embedding rates and texts of different genres.
     (4) In order to improve the embedding efficiency of text steganography, an algorithm of constructing the parity check matrix for the q-ary linear code is proposed for text steganography. The text steganography adapts the used q-ary linear code according to the length of secret information and embedding capacity. Compared with the general matrix embedding, the proposed algorithm can achieves a higher embedding efficiency when the embedding rate is low. The experimental results show that the constructed check matrix can lead the embedding efficiency of steganography close to the theoretical upper bound. Moreover, an extended block coding is proposed to be used in text steganography based on additional noise. The method encodes the secret information vector as the cover data vector with smaller weight, leading to the embedding efficiency achieving to the theoretical upper bound of the embedding method with linear codes. Experimental results show that using the extended block coding, the probability of distinguishing the additional-noise-based stego texts from cover texts is greatly reduced.
     (5) In order to preserve the statistical characteristics of the cover texts, a multiple choice question (MCQ) based secure steganography is presented. With the guidance of Cachin's information theoretic model for steganography, the special text-multiple choice questions with independent identically distributed features is chosen to conceal information. The proposed method encodes each MCQ and its options utilizing the randomness of different MCQs and the option order. A series of MCQs from a MCQ bank are automatically selected by secret information to generate a stego text, and their options are then reordered to embed more information. Experimental results show that the proposed algorithm has excellent imperceptibility, considerably high embedding bit rate and high resistance of steganalysis attacks.
引文
[1]第28次中国互联网络发展状况统计报告:http://tech.sina.com.cn/z/CNNIC28/index.shtml.2011-09-29
    [2]Bergmair R. A Comprehensive Bibliography of Linguistic Steganography. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents IX. San Jose, USA,2007, 6505:65050W-1-65050W-6
    [3]Thampi S M. Information Hiding Techniques:A Tutorial Review. ACM Computing Research Repository,2008, (2):3746
    [4]Ffencode for DOS. http://www.burks.de/stegano/ffencode.html.2007-11-13
    [5]WbStego4.2. http://www.8ung.at/wbailer/wbstego/pr_4ixopen.htm.2007-11-13
    [6]Mazzoft. ByteShelter I-Filthy Rich Text. http://www.mazzoft.com/Downloads_3.htm.2006-12-20
    [7]Kwan M. Snow.http://www.darkside.com.au/snow/index.html.2007-11-13
    [8]Crypto123. http://www.kellysoftware.com/software/Crypto123.asp.2007-11-13
    [9]Chapman M, Davida G. Plausible deniability using automated linguistic steganography. In:Proceedings of Infrastructure Security 2002. Bristol, UK,2002, 276-287
    [10]OfficeXMLsteg. http://www.irongeek.com/i.php?page=security/ms-office-stego-code.2010-5-13
    [11]Keith W. Tyrannosaurus Lex. http://alumni.imsa.edu/%7Ekeithw/tlex/.2007-11-13
    [12]Katzenbeisser S, and Petitcolas F A P编.吴秋新,钮心忻,杨义先等译.信息隐藏技术——隐写术与数字水印.北京:人民邮电出版社,2001
    [13]Aeneas Tacticus. How to Survive Under Siege/Aineias the Tactician, Oxford, England:Clarendom Press,1990,84-90,183-193
    [14]Tirkel A Z, Rankin G A, Van Schyndel R M, et al. Electronic Watermark. In: Proceedings of DICTA-93:Digital Image Computing:Techniques and Applications. Sydney, Australia,1993,666-672
    [15]Maxemchuk N F. Electronic Document Distribution. AT&T Technical Journal, 1994,73-80
    [16]Low S H, Maxemchuk N F, Brassil J T, et al. Document Marking and Identification Using Both Line and Word Shifting. In:Proceedings of Infoncom'95. Boston, MA.1995,853-860
    [17]Brassil J T, Low S H, Maxemchuk N F, et al. Electronic Marking and Identification Techniques to Discourage Document Copying. IEEE Journal on Sel. Areas in Commun.,1995,13(8):1495-1504
    [18]Low S H, Maxemchuk N F, Lapone A M. Document Identification for Copyright Protection Using Centroid Detection. IEEE Trans Communications,1998,46(3): 372-383
    [19]Low S H, Maxemchuk N F. Performance Comparison of Two Text Marking Methods. IEEE Journal Selected Areas of Communications,1998,16(4):561-572
    [20]Brassil J T, Low S H, Maxemchuk N F. Copyright Protection for the Electronic Distribution of Text Documents. In:Proceedings of the IEEE. 1999,87(7):1181-1196
    [21]Huang D, Yan H. Inter Word Distance Changes Represented by Sine Waves for Watermarking Text Images. IEEE Trans. Circuits and Systems,2001,11(12): 1237-1245
    [22]Choo H G, Kim W Y. Data Hiding Capacity Improvement For Text Watermarking Using Space Coding Method. In:The Second International Workshop on Digital Watermarking, Seoul, Korea,2003,593-599
    [23]Adnan M A, Osama M A. Watermarking Electronic Text Documents Containing Justified Paragraphs and Irregular Line Spacing. In:Proceedings of the SPIE. 2004,685-695
    [24]Kim Y W, Moon K A, Oh I S. A Text Watermarking Algorithm Based on Word Classification And Interword Space Statistics. In:Seventh International Conference on Document Analysis and Recognition,2003,775-779
    [25]Chotikakamthorn N. Document Image Data Hiding Technique Using Character Spacing Width Sequence Coding. In:1999 International Conference on Image Processing, Kobe, Japan,1999,2:250-254
    [26]Yang H, and Kot A C. Text Document Authentication By Integrating Inter Character and Word Spaces Watermarking. In:Proceedings of IEEE international conference on multimedia and expo, Taipei, China,2004,2:955-958
    [27]张静,张春田.用于PDF文档认证的数字水印算法.天津大学学报.2003,36(2):215-219
    [28]Por L Y, Ang T F, and Delina B. WhiteSteg:A new Scheme in Information Hiding Using Text Steganography. WSEAS Transactions on Computers,2008,7(6): 35-745
    [29]Lee I S, Tsai W H. Secret Communication Through Web Pages Using Special Space Codes in HTML Files. In:International Journal of Applied Science and Engineering,2008.6(2):141-149
    [30]Bender W, Gruhl D, Morimoto N, et al. Techniques for Data Hiding. IBM Systems Journal,1996,35(3,4):313-336
    [31]白剑,杨榆,徐迎晖等.基于文本的信息隐藏算法.计算机系统应用,2005(4):32-35
    [32]Takizawa O, Makino K, Matsumoto T, et al. Method of Hiding Information in Agglutinative Language Documents Using Adjustment to New Line Positions. In: 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Melbourne, Australia,2005,1039-1048
    [33]Takizawa O, Matsumoto T, Nakagawa H, et al. Information Hiding on Digital Documents by Adjustment of New-Line Positions. Journal of the National Institute of Information and Communications Technology,2005,52(1-2):153-170
    [34]Steganos. www.steganos.com/.2007-11-13
    [35]袁树雄,孙星明.英文文本多重数字水印算法设计与实现.计算机工程,2006,32(15):146-148,154
    [36]刘豪,孙星明,刘晋飚.基于字体颜色的文本数字水印算法.计算机工程,2005,31(15):129-131
    [37]欧浪,孙星明,刘玉玲.基于字符亮度的自适应文本信息隐藏算法.计算机应用研究,2007,24(5):130-132
    [38]刘玉玲,孙星明.通过改变文字大小在Word文档中加载数字水印的设计与实现.计算机工程与应用,2005,41(12):110-112
    [39]李兵兵,王衍波,徐敏等.一种Word 2007中可无源检测的信息隐藏方法.计算机技术与发展.2010,20(5):154-157.
    [40]Zhou X M, Wang S C, Zhou N, et al. An erasable watermarking scheme for exact authentication of Chinese Word documents. In:The 3rd International Congress on Image and Signal Processing, Yantai, China,2010,1156-1160.
    [41]陈芳,王冰.基于文本字体的信息隐藏算法.计算机技术与发展,2006,16(1):20-22
    [42]Zhang Y, Qin H, Kong T. A Novel Robust Text Watermarking for Word Document. In:Proceedings of 2010 3rd International Congress on Image and Signal Processing, Yantai, China.2010,38-42
    [43]Khairullah M. A Novel Text Steganography System Using Font Color of the Invisible Characters in Microsoft Word Documents. In:2009 International Conference on Computer and Electrical Engineering, Dubai, United arab emirates, 2009,482-484.
    [44]Liu T Y, and Tsai W H. Robust Watermarking in Slides of Presentations by Blank Space Coloring:A New Approach. Transactions on Data Hiding and Multimedia Security IV. Lecture Notes in Computer Science,2009,5510:49-64.
    [45]Liu T Y, Tsai W H.A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique. IEEE Transactions on Information Forensics and Security,2007,2(1):24-30
    [46]Gupta A, Barr D K, Sharma D. Mitigating the Degenerations in Microsoft Word Documents:An improved Steganographic Method. In:2009 2nd International Conference on Computer, Control and Communication, Karachi, Pakistan,2009, 1-6
    [47]Liu Y, Sun X, Liu Y, et al. MIMIC-PPT:Mimicking-based Steganography for Microsoft Powerpoint Document. Information Technology Journal.2008, 7(4):654-660.
    [48]Yang W C, Chen L H. A Novel Steganography Method via Various Animation Effects in PowerPoint Files. In:Proceedings of the Seventh International Conference on Machine Learning and Cybernetics, Kunming,2008,3102-3107.
    [49]Zhang H R, Huang L S, Ye Y, et al. A new Steganography Method via Combination in PowerPoint files.2010 International Conference on Computer Application and System Modeling, Shanxi, China,2010, V262-V266.
    [50]Yang B, Sun X, Xiang L, et al. Steganography in Ms Excel document Using Text-rotation Technique. Information Technology Journal.2011,10(4):889-893.
    [51]Gary C, David D D. Experiments in Hiding Data inside the File Structure of Common Office Documents:A Stegonography Application. In:Proceedings of the Int Symposium on Information and Communication Technologies. Las Vegas, USA,2004,146-151
    [52]Castiglione A, Santis A D, Soriente C. Taking Advantages of a Disadvantage: Digital Forensics and Steganography using Document Metadata. The Journal of Systems and Software,2007 (80):750-764
    [53]Liu Y, Sun X, Liu Y, et al. File-Update based Steganography for Microsoft PowerPoint Files. In:Proceedings of 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China,2008, 11-15
    [54]李兵兵,王衍波,徐敏.一种基于叠相术的Word2007信息隐藏方法.第九届全国信息隐藏暨多媒体信息安全学术大会.成都,2010,8-12
    [55]李兵兵,王衍波PowerPoint 2007中基于添加表格样式记录的信息隐藏方法.军事通信技术.2010.03
    [56]李兵兵,王衍波,徐敏,周杰.一种Word 2007中可无源检测的信息隐藏方法.计算机技术与发展.2010,20(5):154-157
    [57]Park B, Parka J, Lee S. Data Concealment and Detection in Microsoft Office 2007 files. Digital Investigation,2009,5(3-4):104-114
    [58]Raffay M A. Data Hiding and Detection in Office Open XML Documents. Dissertation. University of Ontario Institute of Technology, Canada,2011,104
    [59]Castiglione A, Alessio B D, Santis A D, et al. New Steganographic Techniques for the OOXML File Format. In:IFIP International Federation for Information Processing, ARES 2011,2011, LNCS 6908,344-358
    [60]徐敏,王衍波,李涛.Word2007文档信息隐藏的新方法[J].计算机研究与发展,2009,46(增刊):112-116.
    [61]Tiwari R K, Sahoo G. A Novel Methodology for Data Hiding in PDF Files. Information Security Journal:A Global Perspective.2011,20(1):45-57
    [62]Zhong S P, Cheng X Q, Chen T R. Data Hiding in a kind of PDF Texts for Secret Communication. International Journal of Network Security,2007,4 (1):17-26.
    [63]钟尚平,陈铁睿.基于PDF文档作为掩体的信息隐写方法.计算机工程,2006,32(03):161-163
    [64]刘友继,孙星明,罗纲.一种新的基于PDF文档结构的信息隐藏算法.计算机工程.2006,32(17):230-231.
    [65]Liu X T, Zhang Q, Tang C J, et al. A Steganographic Algorithm for Hiding Data in PDF Files Based on Equivalent Transformation. In:International Symposiums on Information Processing, Moscow, Russia,2008,417-421.
    [66]Lee I S and Tsai W H, A new Approach to Covert Communication via PDF files. Signal Processing,2010,90(2):557-565.
    [67]Li B, Li W, Chen Y Y, et al. HTML Integrity Authentication based on Fragile Digital Watermarking. In:IEEE International Conference on Granular Computing, 2009.322-325
    [68]Shahreza M S. A New Method for Steganography in HTML Files. In:Proceedings of IETA 2005, Springer,2006,247-251
    [69]Zhao Q J, Lu H T. A PCA-based Watermarking Scheme for Tamper-proof of Web pages. Pattern Recognition,2005,38(8):1321-1323.
    [70]Liu X Y, Lu H T. Fragile Watermarking Schemes for Tamperproof Web Pages. Advances in Neural Networks,2008, Lecture Notes in Computer Science, Springer, 2008,5264:552-559
    [71]孙星明,黄华军,王保卫等.一种基于等价标记的网页信息隐藏算法.计算机研究与发展,2007,44(5):756-760.
    [72]Yang Y J, Yang Y M. An Efficient Webpage Information Hiding Method based on Tag Attributes. In:2010 Seventh International Conference on Fuzzy Systems and Knowledge Discovery,2010,1181-1184.
    [73]Sun G. An Algorithm of Webpage Information Hiding Based on Class Selectors. In: 2010 Third International Symposium on Intelligent Information Technology and Security Informatics,2010,691-694.
    [74]Lee C F, Chen H L. Data Concealment Scheme for HTML Documents Based on Color Code. In:2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing,2009,632-635
    [75]Desoky. Comprehensive linguistic steganography survey. In:International Journal of Information and Computer Security.2010,4(2):164-197
    [76]Wayner P. Mimic Functions. Cryptologia,1992, XVI:3-.192-213
    [77]Wayner P. Disappearing Cryptography:Information Hiding:Steganography & Watermarking (third edition). San Francisco:Morgan Kaufmann,2008
    [78]Wayner P. Mimicry Applet, www.wayner.org/texts/mimic/.2008-10-20
    [79]Chapman M, Davida G. Hiding the Hidden:A Software System for Concealing Ciphertext as Innocuous Text. In:Proceedings of Int Conf on Information and Communication Security. Beijing,1997, LNCS 1334:335-345
    [80]Chapman M, Davida G, Rennhard M. A Practical and Effective Approach to Larege-Scale Automated Linguistic Steganography. In:Proceedings of the Information Security Conference,2001,156-165
    [81]Chapman M, Davida G. Plausible Deniability Using Automated Linguistic Steganography. In:Proceedings of Int Conf Infrastructure Security.2002, LNCS 2437:276-287
    [82]Chapman M, Davida G. Nicetext. www.nicetext.com/.2008-10-20
    [83]EI-Kwae E A, Cheng L. HIT:A New Approach for Hiding Multimedia Information in Text. In:Proceedings of Security and Watermarking of Multimedia Contents IV. San Jose, CA,2002, SPIE 4675:132-140
    [84]Simova M, Pollett C, Stamp M. Stealthy Ciphertext. In:Proceedings of the 2005 International Conference on Internet Computing, Athens, GA, United states,2005, 380-386.
    [85]Munoz A, Gallardo J C, Alvarez I A. Improving N-Gram linguistic steganography based on templates. In:Proceedings of the 2010 International Conference on Security and Cryptography, Athens, Greece,2010,1-4.
    [86]Dai W, Yu Y, Dai Y, et al. Text Steganography System Using Markov Chain Source Model and DES Algorithm. Journal of Software,2010,5(7):785-792.
    [87]Sams Big Play Maker, www.scramdisk.clara.net/play/playmaker.html.2008-10-20
    [88]Desoky A. Nostega:a Novel Noiseless Steganography Paradigm. Journal of Digital Forensic Practice,2008,2(3):132-139.
    [89]Desoky A. Listega:List-based Steganography Methodology. International Journal of Information Security, Springer,2009,8(4):247-261.
    [90]舒后,杨潮,何薇等.基于文本内容的数字水印算法的设计与实现.计算机工程与设计,2008,29(5):1299-1302
    [91]肖湘蓉,孙星明.基于内容的英文文本数字水印算法设计与实现.计算机工程,2005,31(22):29-31
    [92]Topkara M, Topkara U, Atallah M J. Information Hiding through Errors:A Confusing Approach. In:Proceedings of the SPIE Int Conf on Security, Steganography, and Watermarking of Multimedia Contents. San Jose,2007, 6505V.
    [93]Sirali-Shahreza M, Shirali-Shahreza M H. Text Steganography in SMS. In:2007 International Conference on Convergence Information Technology,2007, 2260-2265.
    [94]Rafat K F. Enhanced Text Steganography in SMS. In:2009 2nd International Conference on Computer, Control and Communication, Karachi,2009,1-6.
    [95]Kankanhalli M S, Hau K F. Watermarking of Electronic Text Documents. Electronic Commerce Research,2002,2(1-2):169-187
    [96]Compris. TextHide. www.texthide.com/.2008-10-20
    [97]Keith W. Lexical Steganography Through Adaptive Modulation of the Word Choice Hash, www.imsa.edu/-keithw/tlex
    [98]Bolshakov I A. A Method of Linguistic Steganography Based on Collocationally-Verified Synonymy. In:Proceedings of Int Information Hiding Workshop. Toronto,2004, LNCS 3200:180-191
    [99]Chiang Y L, Chang L P, Hsieh W T, et al. Natural Language Watermarking Using Semantic Substitution for Chinese Text. In:2nd Int. Workshop Digital Watermarking,2003, LNCS,2939:129-140.
    [100]Bergmair R. Natural Language Steganography and an AI-Complete Security Primitive. The 21st Chaos Communication Congress in Berlin,2004.
    [101]Muhammad H Z, Rahman S M S A A, Shakil A. Synonym Based Malay Linguistic Text Steganography. Innovative Technologies in Intelligent Systems and Industrial Applications,2009,423-427
    [102]Munoz A, Carracedo J, Alvarez I A. Measuring the Security of Linguistic Steganography in Spanish based on Synonymous Paraphrasing with WSD. In: 2010 IEEE 10th International Conference on Computer and Information Technology, Bradford,2010,965-970
    [103]Bolshakov I A, Gelbukh A. Synonymous Paraphrasing Using WordNet and Internet. In:Proceedings of NLDB.2004, LNCS,3136:312-323
    [104]甘灿,孙星明,刘玉玲等.一种改进的基于同义词替换的中文文本信息隐藏方法.东南大学学报:自然科学版,2007,37(A01):137-140
    [105]Topkara U, Topkara M, Atallah M J. The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions. In:Proceedings of ACM Multimedia and Security Workshop. Geneva,2006,164-174
    [106]Zheng X L, Huang L S, Chen Z L, et al. Hiding Information by Context-Based Synonym Substitution. In:Proceedings of the 8th International Workshop on Digital Watermarking. Guildford, UK.2009,162-169.
    [107]Liu Y L, Sun X M, Gan C, et al. An Efficient Linguistic Steganography for Chinese text. In:Proc. of the 2007 IEEE Int. Conf. on Multimedia and Expo,2007, 2094-2097
    [108]He L, Lin J, Li T, Fang D. An Anti-attack Watermarking Based on Synonym Substitution for Chinese Text. In:2009 Fifth International Conference on Information Assurance and Security, Xi'an, China,2009,356-359.
    [109]赵敏之,孙星明,向华政.基于虚词变换的自然语言信息隐藏算法研究.计算机工程与应用,2006,42(3):158-160
    [110]赵敏之,孙星明,向华政.基于不完整语义理解的文本数字水印算法研究.计算机应用研究,2006,23(6):118-120
    [111]Khan F R. Enhanced Text Steganography by Changing Word's Spelling. In: Proceedings of the 6th International Conference on Frontiers of Information Technology, Abbottabad, Pakistan,2009
    [112]Shirali-Shahreza M, Shirali-Shahreza M. A New Synonym Text Steganography. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing,2008,1524-1526.
    [113]Sun X, Meng P, Ye Y, et al. Steganography in Chinese text. In:2010 International Conference on Computer Application and System Modeling, Taiyuan, China,2010, 8:V8651-V8654.
    [114]Atallah M J, Raskin V, Crogan M, et al. Natural Language Watermarking:Design, Analysis, and a Proof-of-Concept Implementation. In:Proceedings of the 4th Information Hiding Workshop. Pittsburgh,2001,193-208
    [115]Topkara M, Topkara U, Atallah M J. Words Are Not Enough:Sentence Level Natural Language Watermarking. In:Proceedings of ACM Workshop on Content Protection and Security. Santa Barbara,2006,37-46
    [116]Topkara M, Riccardi G, Tur D H, et al. Natural language watermarking: Challenges in Building a Practical System. In:Proceedings of SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents,2006, 106-117
    [117]Murphy B, Vogel C. The Syntax of Concealment:Reliable Methods for Plain Text Information Hiding. In:Proceedings of the SPIE Int Conf on Security, Steganography, and Watermarking of Multimedia Contents. San Jose CA,2007, 6505:65050Y.1-65050Y.12.
    [118]Murphy B, Vogel C. Statistically Constrained Shallow Text Marking:Techniques, Evaluation Paradigm, and Results. In:Proceedings of the SPIE Int Conf on Security, Steganography, and Watermarking of Multimedia Contents. San Jose CA, 2007,6505:65050Z.1-65050Z.9
    [119]Meral H M, Sankur B, Ozsoy S. Watermarking Tools for Turkish Texts. In: Proceedings of the 14th IEEE Conf on Signal Processing and Communications Applications.2006,1-4
    [120]Meral H M, Sankur B, Ozsoy S. Syntactic Tools for Natural Language Watermarking. In:Proceedings of the SPIE Int Conf on Security, Steganography, and Watermarking of Multimedia Contents. San Jose,2007, 6505:65050X-1-65050X-12
    [121]Meral H M, Sankur B, Ozsoy A S, et al. Natural Language Watermarking via Morphosyntactic Alterations. Comput. Speech Lang.,2009,23:107-125.
    [122]Liu Y, Sun X, and Wu Y. A natural language watermarking based on Chinese syntax. Advances in Natural Computation, Lecture Notes in Computer Science, 2005,3612:958-961
    [123]Wang H, Sun X, Liu Y, and Liu Y. Natural Language Watermarking Using Chinese Syntactic Transformations. Information Technology Journal,2008,7(6):904-910.
    [124]Kim M Y, Natural Language Watermarking for Korean Using Adverbial Displacement. In:International Conference on Multimedia and Ubiquitous Engineering,2008,576-581
    [125]Kim M Y, Zaiane O R, and Goebel R. Natural Language Watermarking based on Syntactic Displacement and Morphological Division. In:2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, Seoul, Korea,2010, 164-169
    [126]Gaurav G, Josef P, Wang H X. An Attack-localizing Watermarking Scheme for Natural Language Documents. In:Proceedings of ASIACCS'06. Taiwan,2006, 157-165
    [127]戴祖旭,洪帆,崔国华等.基于词性标记串统计特性的文本数字水印算法.通信学报,2007,28(4):108-113
    [128]Dai Z X, Hong F. Watermarking Text Documents Based on Entropy of Part of Speech String. Journal of Information and Computational Science,2007,4(1): 21-25
    [129]Nirenburg S, Raskin V. Ontology Semantics. Cambridge:MIT Press,2003
    [130]Atallah M J, Raskin V, Hempelmann C, et al. Natural Language Watermarking and Tamperproofing. In:Proceedings of the 5th Information Hiding Workshop. Noordwijkerhout,2002,196-212
    [131]Vybornova O, Macq B. A Method of Text Watermarking using Presuppositions. In: Proceedings of the SPIE Int Conf Security, Steganography, and Watermarking of Multimedia Contents. San Jose,2007,1-10
    [132]Vybornova O, Macq B. Natural Language Watermarking and Robust Hashing based on Presuppositional Analysis. In:Proceedings of the 2007 IEEE Int Conf on Information Reuse and Integration. Las Vegas,2007,177-182
    [133]Chang C Y, and Clark S, Linguistic Steganography Using Automatically Generated Paraphrases. In:The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, Los Angeles, California, 2010,591-599
    [134]Kermanidis K L, and Magkos E. Empirical paraphrasing of Modern Greek text in two phases:An application to steganography. In:10th International Conference Computational Linguistics and Intelligent text Processing, Mexico City, Mexico: Springer Verlag,2009,535-546.
    [135]Kermanidis K L. Hiding Secret Information by Automatically Paraphrasing Modern Greek text with Minimal Resources, In:International Conference on Tools with Artificial Intelligence, Arras, France,2010,379-380.
    [136]Jin C, Zhang D, and Pan M. Chinese Text Information Hiding based on Paraphrasing Technology. In:2010 International Conference of Information Science and Management Engineering, Xi'an, China,2010,39-42.
    [137]Grothoff C, Grothoff K, Alkhutova L, et al. Translation-Based Steganography. In: Proc of Information Hiding Workshop. Barcelona,2005,213-233
    [138]Grothoff C, Grothoff K, Stutsman R, et al.,2009. Translation-based steganography. Journal of Computer Security,17(3):269-303.
    [139]Stutsman R, Atallab M, Grothoff C, et al. Lost in just the Translation. In: Proceedings of the 21st Annual ACM Symposium on Applied Computing, Association for Computing Machinery, Dijon, France,2006,338-345.
    [140]Meng P, Shi Y Q, Huang L, et al. LinL:Lost in n-best List. In:13th International Conference on Information Hiding, Prague, Czech Republic,2011, LNCS 6958, 329-341
    [141]Sui X G, and Luo H. A steganalysis Method based on the Distribution of Space Characters, In:2006 International Conference on Communications, Circuits and Systems, Guilin, China,2006,54-56.
    [142]罗纲,孙星明,刘玉玲.基于噪声检测的文本隐藏信息检测算法研究.湖南大学学报(自然科学版),2005,32(6.增刊):181-184.
    [143]Kwon H, Kim Y, Lee S, et al. A Tool for the Detection of Hidden Data in Microsoft Compound Document File Format. In:2008 International Conference on Information Science and Security,2008,141-146
    [144]Li L, Huang L, Zhao X, et al. A statistical attack on a kind of Word-shift text-steganography, In:2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China,2008, 1503-1507.
    [145]Zhong S P, Fang X, and Liao X W. Steganalysis Against Equivalent Transformation Based Steganographic Algorithm for PDF Files. In:Proceedings of the 2009 International Symposium on Information Processing, Huangshan, China,2009,075-078.
    [146]Huang H J, Sun X M, Sun G, et al. Detection of Hidden Information in Tags of Webpage Based on Tag-Mismatch. In:Third International Conference on International Information Hiding and Multimedia Signal Processing,2007, 1:257-260,
    [147]Huang H J, Zhong, S H, Sun X M. Steganalysis of Information Hidden in Webpage Based on Higher-order Statistics. In:2008 International Symposium on Electronic Commerce and Security,2008,957-960.
    [148]Huang H J, Sun X M, Li Z S, et al. Detection of Hidden Information in Webpage. In:Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007,317-321
    [149]Huang J W, Sun X M, Huang H J, et al. Detection of Hidden Information in Webpages Based on Randomness. In:The Third International Symposium on Information Assurance and Security,2007,447-452.
    [150]周继军,杨著,钮心忻等.文本信息隐藏检测算法研究[J].通信学报,2004,25(12):97-101.
    [151]Sui X G, Luo H, and Zhu Z L. A Steganalysis Method Based on the Distribution of First Letters of Words. In:The 2006 International on Intelligent Information Hiding and Multimedia signal processing, California, USA,2006,369-372.
    [152]Sui X G, Luo H, and Zhu Z L. A Steganalysis Method based on the Distribution of Characters. In:2006 8th International Conference on Signal Processing, Guilin, China,2007,2599-2602.
    [153]金烨,眭新光.新的文本隐写分析方法.计算机工程,2008,34(21):159-160,168
    [154]眭新光,沈蕾,燕继坤等.基于AdaBoost的文本隐写分析.通信学报,2007,28(12):136-140,146
    [155]眭新光,罗慧,朱中梁.基于支持向量机的文本隐写分析.计算机工程,2009,35(6):188-191
    [156]吴明巧,金士尧.针对文本隐写工具Stego的隐写分析方法.计算机工程,2006,32(23),10-12.
    [157]Chen Z L, Huang L S, Yu Z S, et al. A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words. In:The Third International Conference on Availability, Reliability and Security, Barcelona, Spain,2008,558-563.
    [158]Chen Z L, Huang L S, Yu Z S, et al. Effective Linguistic Steganography Detection. In:IEEE 8th International Conference on Computer and Information Technology Workshops,2008,224-229
    [159]陈志立,黄刘生,余振山等.文本信息隐藏的统计检测算法.小型微型计算机系统,2008,29(12):2199-2201
    [160]Chen Z L, Huang L S, Yu Z S, et al. Linguistic Steganography Detection Using Statistical Characteristics. In:Information Hiding 2008, LNCS5284,2008, 224-235.
    [161]Meng P, Huang L, Chen Z, et al. Linguistic Steganography Detection based on Perplexity. In:2008 International Conference on MultiMedia and Information Technology, China,2008,217-220.
    [162]Meng P, Huang L, Yang W, et al. Linguistic Steganography Detection Algorithm using Statistical Language Model. In:2009 International Conference on Information Technology and Computer Science, Kiev, Ukraine,2009,540-543.
    [163]罗纲,孙星明.基于文本剩余度的文本隐藏信息检测方法研究.通信学报,2009,30(6):19-25.
    [164]Yang H, and X. Cao. Linguistic Steganalysis based on Meta Features and Immune Mechanism. Chinese Journal of Electronics,2010,19(4):661-666.
    [165]曾莱蓓,孙星明,向凌云等.基于虚词变换的文本隐藏信息检测方法研究.计算机研究与发展,2009,46(Suppl.):177-181.
    [166]Zhao X, Huang L, Li L, et al. Steganalysis on Character Substitution Using Support Vector Machine. In:2nd International Workshop on Knowledge Discovery and Data Mining, Moscow, Russia,2009,84-88.
    [167]Taskiran C M, Topkara U, Topkara M, et al. Attacks on Lexical Natural Language Steganography Systems. In:Proceedings of the SPIE, Security, Steganography and Watermarking of Multimedia Contents VIII, San Jose, USA,2006,97-105.
    [168]罗纲,孙星明,向凌云等.针对同义词替换信息隐藏的检测方法研究.计算机研究与发展,2008,45(10):1696-1703.
    [169]Yu Z, Huang L, Chen Z, et al. Detection of Synonym-Substitution Modified Articles Using Context Information. In:Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, Hainan, China, 2008,134-139.
    [170]Yu Z, Huang L, Chen Z, et al. Steganalysis of Synonym-Substitution Based Natural Language Watermarking, International Journal of Multimedia and Ubiquitous Engineering,2009,4(2):21-34
    [171]Meng P, Huang L, Yang W, et al. Attacks on Translation based Steganography. In: 2009 IEEE Youth Conference on Information, Computing and Telecommunication, Beijing, China,2009:227-230
    [172]孟朋,黄刘生,陈志立,杨威,杨明.基于翻译的信息隐藏分析检测.电子学报.2010,38(8):1748-1752
    [173]Meng P, Huang L, Chen Z, et al. STBS:A Statistical Algorithm for Steganalysis of Translation-based Steganography. In:12th International Workshop on Information Hiding, Lecture Notes in Computer Science, Springer,2010,6387:208-220.
    [174]Chen Z, Huang L, Meng P, et al. Blind Linguistic Steganalysis against Translation based Steganography. In:Proceedings of the 9th international conference on Digital watermarking, Lecture Notes in Computer Science, Springer,2011, 6526:251-265.
    [175]S. G. J., The Prisoners'Problem and the Subliminal Channel. In:Proceedings of the CRYPTO'83,1984,51-67
    [176]刘粉林,刘九芬,罗向阳.数字图像隐写分析.机械工业出版社,2010.1-10
    [177]Cachin C. An Information Theoretic Model for Steganography. Inform. Computer.2004,192(1):41-56.
    [178]PPT-InfoConceal:http://www.hackits.de/forum/thread.php?threadid=1279&sid=. 2008-6-12
    [179]PPT-Stego:http://www.networksecuritytech.com/viewtopic.php?t=6527.2008-6-12
    [180]WordNet. A Lexical Database for English. Princeton University. http://Wordnet.princeton.edu/Wordnet/.2010-6-12
    [181]Miller G A, Beckwith R, Fellbaum C, et al. Introduction to WordNet:An On-line Lexical Database. International Journal of Lexicography.1990,3(4):235-244
    [182]ICTCLAS汉语分词系统http://ictclas.org/index.html.2008-6-12
    [183]Zhang H P, Liu T, Ma J S, et al. Chinese Word Segmentation with Multiple Postprocessors in HIT-IRLab. In:Proceedings of SIGHAN'05.2005,172-175
    [184]Marneffe M, MacCartney B, and Manning C D. Generating Typed Dependency Parses from Phrase Structure Parses. In Proceedings of the 5th International Conference on Language Resources and Evaluation (LREC-2006),2006.
    [185]Vapnik V. The Nature of Statistical Learning Theory. Spring Verlag,1995
    [186]Cortes C, and Vapnik V. Support Vector Networks. Machine Learning,1995, 20:273-297
    [187]Microsoft. Microsoft Word 97 Binary File Format. http://www.opennet.ru/docs/formats/wWord8.html.2008-6-12
    [188]Chang C C, Lin C J. LIBSVM:A Library for Support Vector Machines, http://www.csie.ntu.edu.tw/~cjlin/libsvm
    [189]Leech G, Rayson P, Wilson A. Word Frequencies in Written and Spoken English: based on the British National Corpus, http://ucrel.lancs.ac.uk/bncfreq/.2007-6-12
    [190]Gough P B. Grammatical Transformations and Speed of Understanding. Journal of Verbal Learning and Verbal Behavior,1965,4(2):107-111
    [191]Tarone E, Dwyer S, Gillette S, et al. On the Use of the Passive and Active Voice in Astrophysics Journal Papers:With Extensions to other Languages and other Fields. English for Specific Purposes,1998,17(1):113-132,
    [192]Zhang W, Li S. A Coding Problem in Steganography. Designs, Codes and Cryptography.2008,46(1):67-81.
    [193]Fridrich J, Lisonek P, Soukal D. On Steganographic Embedding Efficiency. In:8th International Workshop on Information Hiding, IH 2006, Alexandria, VA, USA. Lecture Notes in Computer Science.2006,4437:282-296.
    [194]Crandall R. Some notes on steganography. Posted on steganography mailing list, http://os.inf.tu-dresden.de/westfeld/crandall.pdf,2007-6-12
    [195]Westfeld A. F5-A Steganographic Algorithm. In:4th International Workshop on Information Hiding. Lecture Notes in Computer Science,2001,2137:289-302,.
    [196]Fridrich J, Goljan M, Lisonvek P, et al. Writing on wet paper. IEEE Transactions on Signal Processing.2005,53:3923-3935.
    [197]Galand F, Kabatiansky G. Steganography via Covering Codes. In:IEEE International Symposium on Information Theory. Yokohama, Japan,2003,192.
    [198]Kim Y, Duric Z, and Richards D. Modified Matrix Encoding Technique for Minimal Distortion Steganography. In:IH 2006, LNCS,2007,4437:314-327.
    [199]Dijk M, and Willems F. Embedding Information in Grayscale Images. In: Proceedings of the 22nd Symposium on Information and Theory in the Benelux, The Netherlands,2001,147-154.
    [200]Galand F, Kabatiansky G. Information Hiding by Coverings. In:Proceedings of the IEEE Information Theory Workshop 2003,151-154
    [201]Bierbrauer J, Fridrich J. Constructing Good Covering Codes for Applications in Steganography. Transactions on Data Hiding and Multimedia Security Ⅲ. Lecture Notes in Computer Science,2008,4920:1-22
    [202]Schonfeld D, Winkler A. Embedding with Syndrome Coding based on BCH Codes. In:Proceedings of ACM the 8th workshop on Multimedia and Security,2006, 214-223.
    [203]Munuera C. Steganography and Error-correcting Codes. Signal Processing,2007, 87:1528-1533.
    [204]Liu C Q, Ping X J, Zhang T, et al. A Research on Steganography Method Based on Error-Correcting Codes. In:International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Pasadena, CA, USA,2006,377-380
    [205]Fridrich J, Soukal D. Matrix Embedding for Large Payloads. IEEE Transactions on Information Security and Forensics,2006,1(3):390-394
    [206]Chen C, Wang S Z, and Zhang X P. Information Hiding in Text Using Typesetting Tools with Stego-Encoding. In:Proceedings of the First International Conference on Innovative Computing, Information and Control,2006,1:459-462.
    [207]Chang C C, Wu C C, and Lin I C. A Data Hiding Method for Text Documents using Multiple-base Encoding. In:2009 International Conference on High Performance Networking, Computing and Communication Systems and 2009 International Conference on Theoretical and Mathematical Foundations of Computer Science, Sanya, China,2009,101-109.
    [208]Lin I C, and Hsu P K. A Data Hiding Scheme on Word Documents Using Multiple-base Notation System. In:Proceedings 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany,2010,31-33.
    [209]余振山,黄刘生,陈志立等.用宋词实现高嵌入率文本信息隐藏.中文信息学报,2009,23(4):55-62

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700