CN102169535A - Text steganographic method based on keyword replacement - Google Patents

Text steganographic method based on keyword replacement Download PDF

Info

Publication number
CN102169535A
CN102169535A CN2011100943030A CN201110094303A CN102169535A CN 102169535 A CN102169535 A CN 102169535A CN 2011100943030 A CN2011100943030 A CN 2011100943030A CN 201110094303 A CN201110094303 A CN 201110094303A CN 102169535 A CN102169535 A CN 102169535A
Authority
CN
China
Prior art keywords
keyword
text
key
keywords
replacement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011100943030A
Other languages
Chinese (zh)
Inventor
王勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guilin University of Electronic Technology
Original Assignee
Guilin University of Electronic Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guilin University of Electronic Technology filed Critical Guilin University of Electronic Technology
Priority to CN2011100943030A priority Critical patent/CN102169535A/en
Publication of CN102169535A publication Critical patent/CN102169535A/en
Priority to CN201110301759.XA priority patent/CN102360413B/en
Pending legal-status Critical Current

Links

Landscapes

  • Document Processing Apparatus (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a text steganographic method based on keyword replacement, in which important keywords can be replaced by the keywords desired by a sender through the replacement of two different forms of keywords so as to achieve the aim of freewill misleading. During the steganography, the keywords can be selected at will; keys are generated according to the relationship between the keywords before and after the replacement; and the original text can be extracted by a receiver according to a main key. The replaced keywords are determined by the sender, so that the replaced keywords have good pertinence and a better misleading effect and are difficult to show slips. In the opinion of a listener (opponent) that intercepts a disguised text, the sent disguised file is the original text as the text is meaningful, the file is generally meaningless after being encrypted, and the other steganographic methods such as steganography in video and audio files need multimedia files; and the receiver does not know that the original text undergoes steganography treatment and has a misleading function, and furthermore, the meaning of the disguised text is opposite to the meaning of the original text.

Description

A kind of text secret writing method of replacing based on keyword
Technical field
The invention belongs to information security field, relate to a kind of text secret writing method of replacing based on keyword.
Background technology
Steganography (secret writing art, Steganography) is a skill and a science about Information hiding, so-called Information hiding (informationhiding) refer to do not allow except that the expection the recipient anyone know the transmission incident of information or the content of information.Modern technique of secret writting mainly is to rely in the jumbo files such as image, audio frequency, video to hide Info.Also has a kind of special Information Hiding Techniques, it is the subliminal channel (subliminal channel) that nineteen eighty-three Simmons proposes, the subliminal channel of narrow sense mainly adopts digital signature to wait and realizes the message concealment, but subliminal channel can be closed, and utilizes under the threshold of digital signature transmission message back toward very short.As seen, present Information Hiding Techniques or needs rely on big file as carrier, or can only transmit very short message, camouflage text (carrier, covertext) sharp concealed text (stegotext is called original text here) is compared greatly a lot, and channel utilization is not high.Send jumbo files such as picture audio frequency, video in case be under an embargo, do not allow to carry out under the situation of digital signature, the concealment of classified information just can't realize, and the sharp subliminal channel problem of Information hiding often at be monitored because of the background violated and so on, supervision goes into can forbid fully any behavior that may hide message.We had also once designed a kind of text secret writing method that adopts stream cipher to control sub-key, but, though the camouflage text that obtains has misleading, but owing to be the key sequence that stream cipher produces, the camouflage text produces according to key sequence, can not arbitrarily remove to be provided with the camouflage text, the present invention has designed a kind of secret writing method that can mislead the other side arbitrarily.
Summary of the invention
It is big that the present invention is intended to overcome existing secret writing method amount of redundancy, depends on the shortcoming of image, speech data, provides a kind of text is carried out the method for secret writing, and can have the function of misleading.Different with encryption, the camouflage text of secret writing directly transmits, and the other side can think it is expressly, so can directly go to mislead the other side.
For possessing the misleading function, in the present invention, to have designed and adopted similar gestalt choosing to express the mode of topic secret writing, it needs a keyword database, in database, keyword similar, close, opposite or that can substitute is placed in the identical group.In the time of secret writing, open file, read the content of text, in the time of secret writing keyword is replaced to having the keyword of same nature, this keyword is close with former keyword sense, opposite or have substituting.In the time of secret writing, the secret writing system shows the keyword in all same group in this group, secret writing then can be selected, keyword in the text is replaced with in order the keyword of oneself selecting, and generate a key according to the position difference of replacing, can correctly reduce when being convenient to extract former text.Because the keyword in the text is all replaced with similar, close and opposite keyword, thereby the camouflage text has the misleading effect.
Keyword database is a basic database, in design, must forbid a keyword for the unique reversibility that guarantees secret writing and extraction and appear in two groups of keywords.Because if keyword has relation of inclusion,, also there are the Chinese people to benefit the nation altogether such as China is arranged in the keyword database.In addition, if a keyword appears in two groups of keywords of database, then encrypt sharp problem of deciphering the result that also ambiguity can be run into and can't obtain determining.For fear of ambiguity, there is not relation of inclusion between the keyword mutually in addition, coincidence can not be arranged.
When replacing, the replacement of some keyword be fix, carry out automatically, some keyword then is to come the selection of oneself following one's bent by the sender.Such misleading better effects if.
In each group keyword, have whether an attribute representative is the replacement of fixing: 1) if fixing replacement has only two speech in the group of so fixedly replacement, certainly general such replacement is a pair of antonym.2) if revocable replacement, in database, each keyword all has a numbering in this group, and from 0,1, until n-l, wherein n is the keyword number in this group.In the time of secret writing, keyword in all these groups is all shown, allow the sender select keyword wherein to replace, the relation that the system log (SYSLOG) keyword is replaced, and produce a key with this, key k=a-b mod (n), wherein a is the keyword in the original text, b is the numbering of the selected keyword of replacing.Can recover original text according to corresponding relation when can guarantee to extract original text like this.Key for fixing replacement, directly extracts the keyword of original text just at revocable replacement according to fixing corresponding relation.After secret writing is finished, will generate the sequence of a key k according to the sequence of keyword in the original text, time standby this sequence of deciphering is decrypted, and calculates a=b+k mod (n) one by one, just can determine the keyword in the original text.Maximum number max{n} according to keyword in each group in the database calculates [log2max{n}]+1, promptly can draw the least number of bits that key k coding needs, and wherein [] expression rounds.
Because secret writing itself is the form expressly that disguises oneself as, the adversary does not also know to have passed through secret writing, so the part that keyword database need to be keep secret, particularly those fixing keywords are replaced.Secret writing is different from encryption, encryption is to allow the other side know the existence of ciphering process, secret writing then should not, and the camouflage text should be one normal, significant text or image and so on, can play the effect of misleading like this, the present invention adopts keyword to replace, and the sender selects keyword to make the text of camouflage have meaning.
Because this secret writing method is just replaced content of text, therefore, secret writing for document needs first opening document, such as opening word or txt document earlier, read the content of text of the inside, again content of text is pretended to replace, the text after will replacing is at last preserved, and the process of extracting secret information then is an opposite process.
Embodiment
Illustrate below:
Suppose will carry out secret writing to a .txt text now, the content of its text is " be Monday today ".In the keyword database of system, " today ", one group of corresponding keyword was " tomorrow ", " day after tomorrow ", and replacing attribute is that on-fixed is replaced; One group of keyword of "Yes" correspondence is " not being ", and replacing attribute is fixing the replacement.
In the database in all groups maximum one group of keyword 15 keywords are arranged, can draw key k only needs 4 bits, the k that therefore sets each keyword correspondence is 4 bits.
In the time of secret writing, open text with notepad, reading of content earlier.Then one by one in text search whether keyword arranged, carry out corresponding replacement according to the attribute of keyword.Today is owing to be keyword, and is on-fixed, so, today, tomorrow, the day after tomorrow are all shown, and their corresponding codes are respectively 0,1,2, the sender selects and expresses, and selects the day after tomorrow such as the sender, then k=0-2mod (3)=1, we get 0001 as key, and it is write in top 4 bits of total key,, continue to write in order backward if there is keyword the back.Then text is continued to scan in order and search for, find that "Yes" is a keyword, and for fixing replacement, so directly "Yes" is replaced with " not being ".Obtain pretending text " be not Monday the day after tomorrow ", deposit text in txt file, as the camouflage text, total key is 0001.
When extracting original text, open text, read " be not Monday the day after tomorrow ", search in text, be keyword the day after tomorrow, so read top 4 bits in total key, 0001, be numbered 2, a=2+1 mod (3)=0 in the day after tomorrow this group in database, be numbered 0 keyword, i.e. today so get.Then searching " not being " is keyword, according to attribute, directly it is reduced to and is.Therefore, can obtain original text and be " be Monday today ", deposit it in txt file, promptly obtain source document.

Claims (3)

1. text secret writing method of replacing based on keyword, it is characterized in that it being secret writing at text, with File Open, read text, carry out certain keyword and replace since the speech of replacing may be close in meaning with original speech, opposite and similar, the text after the replacement still has meaning, and may with original be close in meaning, opposite, make it to have the function of random misleading.
2. text secret writing method of replacing based on keyword as claimed in claim 1 is characterized in that directly a keyword being replaced with the keyword of stipulating in the database when fixing replacement, need not to generate key, extracts original text and need not to utilize key.
3. text secret writing method of replacing as claimed in claim 1 based on keyword, it is characterized in that when carrying out the on-fixed replacement, the sender can directly select oneself to want to be used to mislead prison hearer's keyword, corresponding relation according to keyword and original keyword, generate sub-key, reduce keyword in the original text according to the sub-key of correspondence when extracting original text, the corresponding relation of key is the corresponding sub-key according to sequencing intercepting regular length in total key of keyword.This sender selects the method for keyword can obviously improve the specific aim of misleading, reaches good misleading effect.
CN2011100943030A 2011-04-11 2011-04-11 Text steganographic method based on keyword replacement Pending CN102169535A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2011100943030A CN102169535A (en) 2011-04-11 2011-04-11 Text steganographic method based on keyword replacement
CN201110301759.XA CN102360413B (en) 2011-04-11 2011-09-27 Steganographic method with misguiding function of controllable secret key sequence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100943030A CN102169535A (en) 2011-04-11 2011-04-11 Text steganographic method based on keyword replacement

Publications (1)

Publication Number Publication Date
CN102169535A true CN102169535A (en) 2011-08-31

Family

ID=44490693

Family Applications (2)

Application Number Title Priority Date Filing Date
CN2011100943030A Pending CN102169535A (en) 2011-04-11 2011-04-11 Text steganographic method based on keyword replacement
CN201110301759.XA Active CN102360413B (en) 2011-04-11 2011-09-27 Steganographic method with misguiding function of controllable secret key sequence

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201110301759.XA Active CN102360413B (en) 2011-04-11 2011-09-27 Steganographic method with misguiding function of controllable secret key sequence

Country Status (1)

Country Link
CN (2) CN102169535A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102360413A (en) * 2011-04-11 2012-02-22 桂林电子科技大学 Steganographic method with misguiding function of controllable secret key sequence
CN102412963A (en) * 2011-12-30 2012-04-11 桂林电子科技大学 Random sequence based encryption method with misleading function
CN102447558A (en) * 2011-11-22 2012-05-09 王勇 Encryption method using random sequence on-demand and having misleading function
CN103927164A (en) * 2014-03-10 2014-07-16 珠海市君天电子科技有限公司 Method and system for confusing scripts
WO2016127517A1 (en) * 2015-02-13 2016-08-18 中兴通讯股份有限公司 Method, device, and system for passphrase communication
CN106570405A (en) * 2016-11-04 2017-04-19 北京百度网讯科技有限公司 Method and apparatus for performing encryption/decryption on text in input method
CN109598143A (en) * 2018-12-06 2019-04-09 叶云龙 A kind of the Internet chat method for secret protection, device, equipment and storage medium

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013179304A2 (en) * 2012-05-28 2013-12-05 Sri Venkat Bhaskar Krishna Mangipudi A computer implemented system and method for concealing confidential information
CN105871542A (en) * 2016-03-25 2016-08-17 贵州大学 Encryption and decryption method of ciphertext
CN106228502B (en) * 2016-07-15 2018-01-23 北华航天工业学院 The digital watermark embedding and extracting method of satellite remote-sensing image tiff file
CN109767516B (en) * 2018-12-14 2021-06-11 汉海信息技术(上海)有限公司 Log setting and printing method, setting and printing apparatus, and log system
CN111027080B (en) * 2019-11-26 2021-11-19 中国人民解放军战略支援部队信息工程大学 Information hiding method and system based on OOXML composite document source file data area position arrangement sequence
CN113572765B (en) * 2021-07-23 2023-04-14 桂林电子科技大学 Lightweight identity authentication key negotiation method for resource-limited terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4346326B2 (en) * 2003-02-27 2009-10-21 富士通株式会社 Security system, information management system, encryption support system, and computer program
JP5471065B2 (en) * 2009-06-24 2014-04-16 富士ゼロックス株式会社 Document information generation apparatus, document registration system, and program
CN102169535A (en) * 2011-04-11 2011-08-31 桂林电子科技大学 Text steganographic method based on keyword replacement

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102360413A (en) * 2011-04-11 2012-02-22 桂林电子科技大学 Steganographic method with misguiding function of controllable secret key sequence
CN102360413B (en) * 2011-04-11 2014-04-16 桂林电子科技大学 Steganographic method with misguiding function of controllable secret key sequence
CN102447558A (en) * 2011-11-22 2012-05-09 王勇 Encryption method using random sequence on-demand and having misleading function
CN102447558B (en) * 2011-11-22 2014-05-28 桂林电子科技大学 Encryption method using random sequence on-demand and having misleading function
CN102412963A (en) * 2011-12-30 2012-04-11 桂林电子科技大学 Random sequence based encryption method with misleading function
CN102412963B (en) * 2011-12-30 2014-06-18 桂林电子科技大学 Random sequence based encryption method with misleading function
CN103927164A (en) * 2014-03-10 2014-07-16 珠海市君天电子科技有限公司 Method and system for confusing scripts
CN103927164B (en) * 2014-03-10 2017-06-06 珠海市君天电子科技有限公司 A kind of script obscures method and system
WO2016127517A1 (en) * 2015-02-13 2016-08-18 中兴通讯股份有限公司 Method, device, and system for passphrase communication
CN105992179A (en) * 2015-02-13 2016-10-05 中兴通讯股份有限公司 Secret-language communication method, apparatus and system
CN106570405A (en) * 2016-11-04 2017-04-19 北京百度网讯科技有限公司 Method and apparatus for performing encryption/decryption on text in input method
CN106570405B (en) * 2016-11-04 2020-10-27 北京百度网讯科技有限公司 Method and device for encrypting/decrypting characters in input method
CN109598143A (en) * 2018-12-06 2019-04-09 叶云龙 A kind of the Internet chat method for secret protection, device, equipment and storage medium

Also Published As

Publication number Publication date
CN102360413B (en) 2014-04-16
CN102360413A (en) 2012-02-22

Similar Documents

Publication Publication Date Title
CN102169535A (en) Text steganographic method based on keyword replacement
Zhang Commutative reversible data hiding and encryption
CN106254074A (en) A kind of such poems of the Song Dynasty carrier Text information hiding technology based on Hybrid Encryption
CN108683491B (en) Information hiding method based on encryption and natural language generation
CN113206737A (en) Voice communication encryption method, decryption method and device
Rajput et al. An efficient audio steganography technique to hide text in audio
CN102447558B (en) Encryption method using random sequence on-demand and having misleading function
Ditta et al. Information hiding: Arabic text steganography by using Unicode characters to hide secret data
CN109547663A (en) A kind of improvement LSB image latent writing method of combining cipher
CN115801315A (en) Data transmission method and device, electronic equipment and storage medium
Patil et al. Review of an improved audio steganographic technique over LSB through random based approach
Thomas et al. Advanced cryptographic steganography using multimedia files
Kadam et al. Separable reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique
Rana et al. Dual layer randomization in audio steganography using random byte position encoding
CN111988639B (en) Video encryption and decryption method based on cryptographic algorithm and reversible steganography
Ramya et al. Steganography based data hiding for security applications
Patel et al. Steganography over video file by hiding video in another video file, random byte hiding and LSB technique
CN103138913A (en) Optical fiber web encryption communication system based on time hidden signal channel
Suresh et al. Separable reversible data hiding using Rc4 algorithm
Kadhim A new audio steganography system based on auto-key generator
Ghosh et al. A double layered additive space sequenced Audio Steganography Technique for mobile network
TW201811064A (en) User unit for watermarking digital content, method for transmitting and for watermarking content and method for detecting at least one watermark
Satar et al. Secure image steganography using encryption algorithm
Xiang et al. A characteristic-preserving steganographic method based on revision identifiers
Dandekar et al. Improved secret information hiding using SHA-256 and invisible ASCII character replacement technology

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20110831