A reversible information hiding scheme using left-right and up-down chinese character representation

Techniques for text data hiding are different from image data hiding, video data hiding and audio data hiding. To break through the difficulty of text data hiding, Sun, Lou and Huang proposed a novel Chinese text data hiding scheme called the L-R scheme. In the L-R scheme, Sun et al. embedded secrets into Chinese characters that can be divided into left and right components. This paper describes how our proposed scheme extends the component concept to incorporate the up and down components of Chinese characters rather than the left and right components only, to significantly enhance hiding capacity. In addition, this paper adds a reversible function to Sun et al.'s L-R scheme to make it possible for receivers to obtain the original cover text and use it repeatedly for later transmission of secrets after the initial hidden secrets have been extracted. Finally, the extended scheme simplifies the extracting procedure and efficiently reduces the memory required on the receiver side during the secret extracting phase by using a new comparison method. Experimental results confirm the improved functions offered by the proposed scheme.

[1]  Mark Chapman,et al.  Hiding the Hidden: A software system for concealing ciphertext as innocuous text , 1997, ICICS.

[2]  Jeng-Shyang Pan,et al.  Robust image watermarking based on multiple description vector quantisation , 2004 .

[3]  LIHUA YANG,et al.  Mathematical Representation of a Chinese Character and its Applications , 2002, Int. J. Pattern Recognit. Artif. Intell..

[4]  Carl Vogel,et al.  The syntax of concealment: reliable methods for plain text information hiding , 2007, Electronic Imaging.

[5]  Benoit M. Macq,et al.  Natural Language Watermarking and Robust Hashing Based on Presuppositional Analysis , 2007, 2007 IEEE International Conference on Information Reuse and Integration.

[6]  Wen-Tai Hsieh,et al.  Natural Language Watermarking Using Semantic Substitution for Chinese Text , 2003, IWDW.

[7]  Jeng-Shyang Pan,et al.  Reversible Data Hiding Using the Companding Technique and Improved DE Method , 2008 .

[8]  Jeng-Shyang Pan,et al.  Robust VQ-based digital watermarking for memoryless binary symmetric channel , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[9]  Mikhail J. Atallah,et al.  Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation , 2001, Information Hiding.

[10]  Xingming Sun,et al.  Component-based digital watermarking of Chinese texts , 2004, InfoSecu '04.

[11]  Yao Zhao,et al.  Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs , 2008, IEEE Signal Processing Letters.

[12]  Alasdair McAndrew Data Encryption Standard (DES) for Sage , 2009 .