Topic-aware Neural Linguistic Steganography Based on Knowledge Graphs

The core challenge of steganography is always how to improve the hidden capacity and the concealment. Most current generation-based linguistic steganography methods only consider the probability distribution between text characters, and the emotion and topic of the generated steganographic text are uncontrollable. Especially for long texts, generating several sentences related to a topic and displaying overall coherence and discourse-relatedness can ensure better concealment. In this article, we address the problem of generating coherent multi-sentence texts for better concealment, and a topic-aware neural linguistic steganography method that can generate a steganographic paragraph with a specific topic is present. We achieve a topic-controllable steganographic long text generation by encoding the related entities and their relationships from Knowledge Graphs. Experimental results illustrate that the proposed method can guarantee both the quality of the generated steganographic text and its relevance to a specific topic. The proposed model can be widely used in covert communication, privacy protection, and many other areas of information security.

[1]  Mirella Lapata,et al.  Text Generation from Knowledge Graphs with Graph Transformers , 2019, NAACL.

[2]  Bin Deng,et al.  Text Steganography System Using Markov Chain Source Model and DES Algorithm , 2010, J. Softw..

[3]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[4]  N. Chotikakamthorn,et al.  Electronic document data hiding technique using inter-character space , 1998, IEEE. APCCAS 1998. 1998 IEEE Asia-Pacific Conference on Circuits and Systems. Microelectronics and Integrating Systems. Proceedings (Cat. No.98EX242).

[5]  Hang Li,et al.  “ Tony ” DNN Embedding for “ Tony ” Selective Read for “ Tony ” ( a ) Attention-based Encoder-Decoder ( RNNSearch ) ( c ) State Update s 4 SourceVocabulary Softmax Prob , 2016 .

[6]  Yongfeng Huang,et al.  A Fast and Efficient Text Steganalysis Method , 2019, IEEE Signal Processing Letters.

[7]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[8]  Alon Lavie,et al.  Meteor Universal: Language Specific Translation Evaluation for Any Target Language , 2014, WMT@ACL.

[9]  Yongfeng Huang,et al.  Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec , 2011, IEEE Transactions on Information Forensics and Security.

[10]  Khalil Sima'an,et al.  Graph Convolutional Encoders for Syntax-aware Neural Machine Translation , 2017, EMNLP.

[11]  Yongfeng Huang,et al.  Text Steganography Based on Ci-poetry Generation Using Markov Chain Model , 2016, KSII Trans. Internet Inf. Syst..

[12]  Ning Qian,et al.  On the momentum term in gradient descent learning algorithms , 1999, Neural Networks.

[13]  Dilip Kumar Yadav,et al.  A modified approach to data hiding in Microsoft Word documents by change-tracking technique , 2017, J. King Saud Univ. Comput. Inf. Sci..

[14]  Abdelrahman Desoky,et al.  Comprehensive linguistic steganography survey , 2010, Int. J. Inf. Comput. Secur..

[15]  Suvamoy Changder,et al.  A Novel Approach for Text Steganography: Generating Text Summary Using Reflection Symmetry☆ , 2013 .

[16]  Doug Downey,et al.  Construction of the Literature Graph in Semantic Scholar , 2018, NAACL.

[17]  Alexander M. Rush,et al.  Neural Linguistic Steganography , 2019, EMNLP.

[18]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[19]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[20]  Salim Roukos,et al.  Bleu: a Method for Automatic Evaluation of Machine Translation , 2002, ACL.

[21]  Katerina J. Argyraki,et al.  Generating Steganographic Text with LSTMs , 2017, ACL.

[22]  Jianjun Zhang,et al.  Coverless Text Information Hiding Method Using the Frequent Words Distance , 2017, ICCCS.

[23]  Alec Radford,et al.  Improving Language Understanding by Generative Pre-Training , 2018 .

[24]  A. N. Shniperov,et al.  A text steganography method based on Markov chains , 2016, Automatic Control and Computer Sciences.

[25]  Jun Shen,et al.  Coverless Text Information Hiding Method Based on the Word Rank Map , 2016, ICCCS.

[26]  Yongfeng Huang,et al.  Behavioral Security in Covert Communication Systems , 2019, IWDW.

[27]  Xingming Sun,et al.  Coverless Image Steganography Without Embedding , 2015, ICCCS.

[28]  Carl Vogel,et al.  The syntax of concealment: reliable methods for plain text information hiding , 2007, Electronic Imaging.

[29]  Yoshua Bengio,et al.  A Neural Probabilistic Language Model , 2003, J. Mach. Learn. Res..

[30]  Xingming Sun,et al.  Linguistic steganalysis using the features derived from synonym frequency , 2012, Multimedia Tools and Applications.

[31]  H. Hernan Moraldo,et al.  An Approach for Text Steganography Based on Markov Chains , 2014, ArXiv.

[32]  Yong-Feng Huang,et al.  RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks , 2019, IEEE Transactions on Information Forensics and Security.

[33]  Yongfeng Huang,et al.  A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding , 2017, SecureComm.

[34]  Ilya Sutskever,et al.  Language Models are Unsupervised Multitask Learners , 2019 .

[35]  Raphaël Couturier,et al.  STABYLO: steganography with adaptive, Bbs, and binary embedding at low cost , 2015, Ann. des Télécommunications.

[36]  Ilya Sutskever,et al.  Generating Long Sequences with Sparse Transformers , 2019, ArXiv.

[37]  Lukasz Kaiser,et al.  Attention is All you Need , 2017, NIPS.

[38]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[39]  Peng Liu,et al.  A Novel Linguistic Steganography Based on Synonym Run-Length Encoding , 2017, IEICE Trans. Inf. Syst..