CN102169535A - Text steganographic method based on keyword replacement - Google Patents
Text steganographic method based on keyword replacement Download PDFInfo
- Publication number
- CN102169535A CN102169535A CN2011100943030A CN201110094303A CN102169535A CN 102169535 A CN102169535 A CN 102169535A CN 2011100943030 A CN2011100943030 A CN 2011100943030A CN 201110094303 A CN201110094303 A CN 201110094303A CN 102169535 A CN102169535 A CN 102169535A
- Authority
- CN
- China
- Prior art keywords
- keyword
- text
- key
- keywords
- replacement
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Document Processing Apparatus (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a text steganographic method based on keyword replacement, in which important keywords can be replaced by the keywords desired by a sender through the replacement of two different forms of keywords so as to achieve the aim of freewill misleading. During the steganography, the keywords can be selected at will; keys are generated according to the relationship between the keywords before and after the replacement; and the original text can be extracted by a receiver according to a main key. The replaced keywords are determined by the sender, so that the replaced keywords have good pertinence and a better misleading effect and are difficult to show slips. In the opinion of a listener (opponent) that intercepts a disguised text, the sent disguised file is the original text as the text is meaningful, the file is generally meaningless after being encrypted, and the other steganographic methods such as steganography in video and audio files need multimedia files; and the receiver does not know that the original text undergoes steganography treatment and has a misleading function, and furthermore, the meaning of the disguised text is opposite to the meaning of the original text.
Description
Technical field
The invention belongs to information security field, relate to a kind of text secret writing method of replacing based on keyword.
Background technology
Steganography (secret writing art, Steganography) is a skill and a science about Information hiding, so-called Information hiding (informationhiding) refer to do not allow except that the expection the recipient anyone know the transmission incident of information or the content of information.Modern technique of secret writting mainly is to rely in the jumbo files such as image, audio frequency, video to hide Info.Also has a kind of special Information Hiding Techniques, it is the subliminal channel (subliminal channel) that nineteen eighty-three Simmons proposes, the subliminal channel of narrow sense mainly adopts digital signature to wait and realizes the message concealment, but subliminal channel can be closed, and utilizes under the threshold of digital signature transmission message back toward very short.As seen, present Information Hiding Techniques or needs rely on big file as carrier, or can only transmit very short message, camouflage text (carrier, covertext) sharp concealed text (stegotext is called original text here) is compared greatly a lot, and channel utilization is not high.Send jumbo files such as picture audio frequency, video in case be under an embargo, do not allow to carry out under the situation of digital signature, the concealment of classified information just can't realize, and the sharp subliminal channel problem of Information hiding often at be monitored because of the background violated and so on, supervision goes into can forbid fully any behavior that may hide message.We had also once designed a kind of text secret writing method that adopts stream cipher to control sub-key, but, though the camouflage text that obtains has misleading, but owing to be the key sequence that stream cipher produces, the camouflage text produces according to key sequence, can not arbitrarily remove to be provided with the camouflage text, the present invention has designed a kind of secret writing method that can mislead the other side arbitrarily.
Summary of the invention
It is big that the present invention is intended to overcome existing secret writing method amount of redundancy, depends on the shortcoming of image, speech data, provides a kind of text is carried out the method for secret writing, and can have the function of misleading.Different with encryption, the camouflage text of secret writing directly transmits, and the other side can think it is expressly, so can directly go to mislead the other side.
For possessing the misleading function, in the present invention, to have designed and adopted similar gestalt choosing to express the mode of topic secret writing, it needs a keyword database, in database, keyword similar, close, opposite or that can substitute is placed in the identical group.In the time of secret writing, open file, read the content of text, in the time of secret writing keyword is replaced to having the keyword of same nature, this keyword is close with former keyword sense, opposite or have substituting.In the time of secret writing, the secret writing system shows the keyword in all same group in this group, secret writing then can be selected, keyword in the text is replaced with in order the keyword of oneself selecting, and generate a key according to the position difference of replacing, can correctly reduce when being convenient to extract former text.Because the keyword in the text is all replaced with similar, close and opposite keyword, thereby the camouflage text has the misleading effect.
Keyword database is a basic database, in design, must forbid a keyword for the unique reversibility that guarantees secret writing and extraction and appear in two groups of keywords.Because if keyword has relation of inclusion,, also there are the Chinese people to benefit the nation altogether such as China is arranged in the keyword database.In addition, if a keyword appears in two groups of keywords of database, then encrypt sharp problem of deciphering the result that also ambiguity can be run into and can't obtain determining.For fear of ambiguity, there is not relation of inclusion between the keyword mutually in addition, coincidence can not be arranged.
When replacing, the replacement of some keyword be fix, carry out automatically, some keyword then is to come the selection of oneself following one's bent by the sender.Such misleading better effects if.
In each group keyword, have whether an attribute representative is the replacement of fixing: 1) if fixing replacement has only two speech in the group of so fixedly replacement, certainly general such replacement is a pair of antonym.2) if revocable replacement, in database, each keyword all has a numbering in this group, and from 0,1, until n-l, wherein n is the keyword number in this group.In the time of secret writing, keyword in all these groups is all shown, allow the sender select keyword wherein to replace, the relation that the system log (SYSLOG) keyword is replaced, and produce a key with this, key k=a-b mod (n), wherein a is the keyword in the original text, b is the numbering of the selected keyword of replacing.Can recover original text according to corresponding relation when can guarantee to extract original text like this.Key for fixing replacement, directly extracts the keyword of original text just at revocable replacement according to fixing corresponding relation.After secret writing is finished, will generate the sequence of a key k according to the sequence of keyword in the original text, time standby this sequence of deciphering is decrypted, and calculates a=b+k mod (n) one by one, just can determine the keyword in the original text.Maximum number max{n} according to keyword in each group in the database calculates [log2max{n}]+1, promptly can draw the least number of bits that key k coding needs, and wherein [] expression rounds.
Because secret writing itself is the form expressly that disguises oneself as, the adversary does not also know to have passed through secret writing, so the part that keyword database need to be keep secret, particularly those fixing keywords are replaced.Secret writing is different from encryption, encryption is to allow the other side know the existence of ciphering process, secret writing then should not, and the camouflage text should be one normal, significant text or image and so on, can play the effect of misleading like this, the present invention adopts keyword to replace, and the sender selects keyword to make the text of camouflage have meaning.
Because this secret writing method is just replaced content of text, therefore, secret writing for document needs first opening document, such as opening word or txt document earlier, read the content of text of the inside, again content of text is pretended to replace, the text after will replacing is at last preserved, and the process of extracting secret information then is an opposite process.
Embodiment
Illustrate below:
Suppose will carry out secret writing to a .txt text now, the content of its text is " be Monday today ".In the keyword database of system, " today ", one group of corresponding keyword was " tomorrow ", " day after tomorrow ", and replacing attribute is that on-fixed is replaced; One group of keyword of "Yes" correspondence is " not being ", and replacing attribute is fixing the replacement.
In the database in all groups maximum one group of keyword 15 keywords are arranged, can draw key k only needs 4 bits, the k that therefore sets each keyword correspondence is 4 bits.
In the time of secret writing, open text with notepad, reading of content earlier.Then one by one in text search whether keyword arranged, carry out corresponding replacement according to the attribute of keyword.Today is owing to be keyword, and is on-fixed, so, today, tomorrow, the day after tomorrow are all shown, and their corresponding codes are respectively 0,1,2, the sender selects and expresses, and selects the day after tomorrow such as the sender, then k=0-2mod (3)=1, we get 0001 as key, and it is write in top 4 bits of total key,, continue to write in order backward if there is keyword the back.Then text is continued to scan in order and search for, find that "Yes" is a keyword, and for fixing replacement, so directly "Yes" is replaced with " not being ".Obtain pretending text " be not Monday the day after tomorrow ", deposit text in txt file, as the camouflage text, total key is 0001.
When extracting original text, open text, read " be not Monday the day after tomorrow ", search in text, be keyword the day after tomorrow, so read top 4 bits in total key, 0001, be numbered 2, a=2+1 mod (3)=0 in the day after tomorrow this group in database, be numbered 0 keyword, i.e. today so get.Then searching " not being " is keyword, according to attribute, directly it is reduced to and is.Therefore, can obtain original text and be " be Monday today ", deposit it in txt file, promptly obtain source document.
Claims (3)
1. text secret writing method of replacing based on keyword, it is characterized in that it being secret writing at text, with File Open, read text, carry out certain keyword and replace since the speech of replacing may be close in meaning with original speech, opposite and similar, the text after the replacement still has meaning, and may with original be close in meaning, opposite, make it to have the function of random misleading.
2. text secret writing method of replacing based on keyword as claimed in claim 1 is characterized in that directly a keyword being replaced with the keyword of stipulating in the database when fixing replacement, need not to generate key, extracts original text and need not to utilize key.
3. text secret writing method of replacing as claimed in claim 1 based on keyword, it is characterized in that when carrying out the on-fixed replacement, the sender can directly select oneself to want to be used to mislead prison hearer's keyword, corresponding relation according to keyword and original keyword, generate sub-key, reduce keyword in the original text according to the sub-key of correspondence when extracting original text, the corresponding relation of key is the corresponding sub-key according to sequencing intercepting regular length in total key of keyword.This sender selects the method for keyword can obviously improve the specific aim of misleading, reaches good misleading effect.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100943030A CN102169535A (en) | 2011-04-11 | 2011-04-11 | Text steganographic method based on keyword replacement |
CN201110301759.XA CN102360413B (en) | 2011-04-11 | 2011-09-27 | Steganographic method with misguiding function of controllable secret key sequence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100943030A CN102169535A (en) | 2011-04-11 | 2011-04-11 | Text steganographic method based on keyword replacement |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102169535A true CN102169535A (en) | 2011-08-31 |
Family
ID=44490693
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011100943030A Pending CN102169535A (en) | 2011-04-11 | 2011-04-11 | Text steganographic method based on keyword replacement |
CN201110301759.XA Active CN102360413B (en) | 2011-04-11 | 2011-09-27 | Steganographic method with misguiding function of controllable secret key sequence |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110301759.XA Active CN102360413B (en) | 2011-04-11 | 2011-09-27 | Steganographic method with misguiding function of controllable secret key sequence |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN102169535A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102360413A (en) * | 2011-04-11 | 2012-02-22 | 桂林电子科技大学 | Steganographic method with misguiding function of controllable secret key sequence |
CN102412963A (en) * | 2011-12-30 | 2012-04-11 | 桂林电子科技大学 | Random sequence based encryption method with misleading function |
CN102447558A (en) * | 2011-11-22 | 2012-05-09 | 王勇 | Encryption method using random sequence on-demand and having misleading function |
CN103927164A (en) * | 2014-03-10 | 2014-07-16 | 珠海市君天电子科技有限公司 | Method and system for confusing scripts |
WO2016127517A1 (en) * | 2015-02-13 | 2016-08-18 | 中兴通讯股份有限公司 | Method, device, and system for passphrase communication |
CN106570405A (en) * | 2016-11-04 | 2017-04-19 | 北京百度网讯科技有限公司 | Method and apparatus for performing encryption/decryption on text in input method |
CN109598143A (en) * | 2018-12-06 | 2019-04-09 | 叶云龙 | A kind of the Internet chat method for secret protection, device, equipment and storage medium |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013179304A2 (en) * | 2012-05-28 | 2013-12-05 | Sri Venkat Bhaskar Krishna Mangipudi | A computer implemented system and method for concealing confidential information |
CN105871542A (en) * | 2016-03-25 | 2016-08-17 | 贵州大学 | Encryption and decryption method of ciphertext |
CN106228502B (en) * | 2016-07-15 | 2018-01-23 | 北华航天工业学院 | The digital watermark embedding and extracting method of satellite remote-sensing image tiff file |
CN109767516B (en) * | 2018-12-14 | 2021-06-11 | 汉海信息技术(上海)有限公司 | Log setting and printing method, setting and printing apparatus, and log system |
CN111027080B (en) * | 2019-11-26 | 2021-11-19 | 中国人民解放军战略支援部队信息工程大学 | Information hiding method and system based on OOXML composite document source file data area position arrangement sequence |
CN113572765B (en) * | 2021-07-23 | 2023-04-14 | 桂林电子科技大学 | Lightweight identity authentication key negotiation method for resource-limited terminal |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4346326B2 (en) * | 2003-02-27 | 2009-10-21 | 富士通株式会社 | Security system, information management system, encryption support system, and computer program |
JP5471065B2 (en) * | 2009-06-24 | 2014-04-16 | 富士ゼロックス株式会社 | Document information generation apparatus, document registration system, and program |
CN102169535A (en) * | 2011-04-11 | 2011-08-31 | 桂林电子科技大学 | Text steganographic method based on keyword replacement |
-
2011
- 2011-04-11 CN CN2011100943030A patent/CN102169535A/en active Pending
- 2011-09-27 CN CN201110301759.XA patent/CN102360413B/en active Active
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102360413A (en) * | 2011-04-11 | 2012-02-22 | 桂林电子科技大学 | Steganographic method with misguiding function of controllable secret key sequence |
CN102360413B (en) * | 2011-04-11 | 2014-04-16 | 桂林电子科技大学 | Steganographic method with misguiding function of controllable secret key sequence |
CN102447558A (en) * | 2011-11-22 | 2012-05-09 | 王勇 | Encryption method using random sequence on-demand and having misleading function |
CN102447558B (en) * | 2011-11-22 | 2014-05-28 | 桂林电子科技大学 | Encryption method using random sequence on-demand and having misleading function |
CN102412963A (en) * | 2011-12-30 | 2012-04-11 | 桂林电子科技大学 | Random sequence based encryption method with misleading function |
CN102412963B (en) * | 2011-12-30 | 2014-06-18 | 桂林电子科技大学 | Random sequence based encryption method with misleading function |
CN103927164A (en) * | 2014-03-10 | 2014-07-16 | 珠海市君天电子科技有限公司 | Method and system for confusing scripts |
CN103927164B (en) * | 2014-03-10 | 2017-06-06 | 珠海市君天电子科技有限公司 | A kind of script obscures method and system |
WO2016127517A1 (en) * | 2015-02-13 | 2016-08-18 | 中兴通讯股份有限公司 | Method, device, and system for passphrase communication |
CN105992179A (en) * | 2015-02-13 | 2016-10-05 | 中兴通讯股份有限公司 | Secret-language communication method, apparatus and system |
CN106570405A (en) * | 2016-11-04 | 2017-04-19 | 北京百度网讯科技有限公司 | Method and apparatus for performing encryption/decryption on text in input method |
CN106570405B (en) * | 2016-11-04 | 2020-10-27 | 北京百度网讯科技有限公司 | Method and device for encrypting/decrypting characters in input method |
CN109598143A (en) * | 2018-12-06 | 2019-04-09 | 叶云龙 | A kind of the Internet chat method for secret protection, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN102360413B (en) | 2014-04-16 |
CN102360413A (en) | 2012-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102169535A (en) | Text steganographic method based on keyword replacement | |
Zhang | Commutative reversible data hiding and encryption | |
CN106254074A (en) | A kind of such poems of the Song Dynasty carrier Text information hiding technology based on Hybrid Encryption | |
CN108683491B (en) | Information hiding method based on encryption and natural language generation | |
CN113206737A (en) | Voice communication encryption method, decryption method and device | |
Rajput et al. | An efficient audio steganography technique to hide text in audio | |
CN102447558B (en) | Encryption method using random sequence on-demand and having misleading function | |
Ditta et al. | Information hiding: Arabic text steganography by using Unicode characters to hide secret data | |
CN109547663A (en) | A kind of improvement LSB image latent writing method of combining cipher | |
CN115801315A (en) | Data transmission method and device, electronic equipment and storage medium | |
Patil et al. | Review of an improved audio steganographic technique over LSB through random based approach | |
Thomas et al. | Advanced cryptographic steganography using multimedia files | |
Kadam et al. | Separable reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique | |
Rana et al. | Dual layer randomization in audio steganography using random byte position encoding | |
CN111988639B (en) | Video encryption and decryption method based on cryptographic algorithm and reversible steganography | |
Ramya et al. | Steganography based data hiding for security applications | |
Patel et al. | Steganography over video file by hiding video in another video file, random byte hiding and LSB technique | |
CN103138913A (en) | Optical fiber web encryption communication system based on time hidden signal channel | |
Suresh et al. | Separable reversible data hiding using Rc4 algorithm | |
Kadhim | A new audio steganography system based on auto-key generator | |
Ghosh et al. | A double layered additive space sequenced Audio Steganography Technique for mobile network | |
TW201811064A (en) | User unit for watermarking digital content, method for transmitting and for watermarking content and method for detecting at least one watermark | |
Satar et al. | Secure image steganography using encryption algorithm | |
Xiang et al. | A characteristic-preserving steganographic method based on revision identifiers | |
Dandekar et al. | Improved secret information hiding using SHA-256 and invisible ASCII character replacement technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20110831 |