A Coverless Text Steganography by Encoding the Chinese Characters' Component Structures

A Coverless Text Steganography by Encoding the Chinese Characters' Component Structures

Kaixi Wang, Xiangmei Yu, Ziyi Zou
Copyright: © 2021 |Volume: 13 |Issue: 6 |Pages: 17
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781799867531|DOI: 10.4018/IJDCF.20211101.oa4
Cite Article Cite Article

MLA

Wang, Kaixi, et al. "A Coverless Text Steganography by Encoding the Chinese Characters' Component Structures." IJDCF vol.13, no.6 2021: pp.1-17. http://doi.org/10.4018/IJDCF.20211101.oa4

APA

Wang, K., Yu, X., & Zou, Z. (2021). A Coverless Text Steganography by Encoding the Chinese Characters' Component Structures. International Journal of Digital Crime and Forensics (IJDCF), 13(6), 1-17. http://doi.org/10.4018/IJDCF.20211101.oa4

Chicago

Wang, Kaixi, Xiangmei Yu, and Ziyi Zou. "A Coverless Text Steganography by Encoding the Chinese Characters' Component Structures," International Journal of Digital Crime and Forensics (IJDCF) 13, no.6: 1-17. http://doi.org/10.4018/IJDCF.20211101.oa4

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The current coverless text steganography methods have a low steganographic capacity, and yet some of them cannot assure a message can be concealed. How to achieve a high steganographic capacity has become the research hotspot in text steganography. This paper proposes a text coverless steganography method by encoding the Chinese characters’ component structures. Its main idea is that a binary bit string can be conveyed by the Chinese characters’ component structures. The positions of Chinese characters that carry a secret message will be expressed in two systems of the linear remainder equations, whose solutions will be secretly sent to the receiver to extract the secret message. In the method, a single Chinese character can express p bits. The analyses and statistics show that its capacity will be much higher when the same Chinese character is used more than once than existing methods, and it can conceal any message successfully. In addition, this method can also be employed in other languages.