Reference Hub9
A Big Data Text Coverless Information Hiding Based on Topic Distribution and TF-IDF

A Big Data Text Coverless Information Hiding Based on Topic Distribution and TF-IDF

Jiaohua Qin, Zhuo Zhou, Yun Tan, Xuyu Xiang, Zhibin He
Copyright: © 2021 |Volume: 13 |Issue: 4 |Pages: 17
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781799860372|DOI: 10.4018/IJDCF.20210701.oa4
Cite Article Cite Article

MLA

Qin, Jiaohua, et al. "A Big Data Text Coverless Information Hiding Based on Topic Distribution and TF-IDF." IJDCF vol.13, no.4 2021: pp.40-56. http://doi.org/10.4018/IJDCF.20210701.oa4

APA

Qin, J., Zhou, Z., Tan, Y., Xiang, X., & He, Z. (2021). A Big Data Text Coverless Information Hiding Based on Topic Distribution and TF-IDF. International Journal of Digital Crime and Forensics (IJDCF), 13(4), 40-56. http://doi.org/10.4018/IJDCF.20210701.oa4

Chicago

Qin, Jiaohua, et al. "A Big Data Text Coverless Information Hiding Based on Topic Distribution and TF-IDF," International Journal of Digital Crime and Forensics (IJDCF) 13, no.4: 40-56. http://doi.org/10.4018/IJDCF.20210701.oa4

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Coverless information hiding has become a hot topic in recent years. The existing steganalysis tools are invalidated due to coverless steganography without any modification to the carrier. However, for the text coverless has relatively low hiding capacity, this paper proposed a big data text coverless information hiding method based on LDA (latent Dirichlet allocation) topic distribution and keyword TF-IDF (term frequency-inverse document frequency). Firstly, the sender and receiver build codebook, including word segmentation, word frequency and TF-IDF features, LDA topic model clustering. The sender then shreds the secret information, converts it into keyword ID through the keywords-index table, and searches the text containing the secret information keywords. Secondly, the searched text is taken as the index tag according to the topic distribution and TF-IDF features. At the same time, random numbers are introduced to control the keyword order of secret information.