Advanced Search
Volume 33 Issue 2
Mar.  2011
Turn off MathJax
Article Contents
Zhu You-Wen, Huang Liu-Sheng, Li Dong, Yang Wei. Privacy-preserving Text Information Hiding Detecting Algorithm[J]. Journal of Electronics & Information Technology, 2011, 33(2): 278-283. doi: 10.3724/SP.J.1146.2010.00375
Citation: Zhu You-Wen, Huang Liu-Sheng, Li Dong, Yang Wei. Privacy-preserving Text Information Hiding Detecting Algorithm[J]. Journal of Electronics & Information Technology, 2011, 33(2): 278-283. doi: 10.3724/SP.J.1146.2010.00375

Privacy-preserving Text Information Hiding Detecting Algorithm

doi: 10.3724/SP.J.1146.2010.00375
  • Received Date: 2010-04-16
  • Rev Recd Date: 2010-08-30
  • Publish Date: 2011-02-19
  • Text information hiding detecting algorithm aims at distinguishing between normal text and sgeto-text. How to perform securely collaborative text information detection remains unsettled. For this reason, a privacy- preserving text information hiding detecting algorithm is proposed based on homomorphic cryptosystem. The new detecting algorithm achieves securely two-party collaborative text information detecting, by which the party holding privately parameters of text information hiding detecting algorithm and the party holding a private text to detect can cooperatively distinguish between sgeto-text and normal text while no privacy is disclosed. It is shown the privacy-preserving algorithm is still secure while a couple of parties cooperate for many times. Communication overheads and computation complexity of the privacy-preserving algorithm areO(m2) where m is the number of words in the dictionary using by text detecting algorithm. Experimental result shows the algorithm is efficient.
  • loading
  • [1] Goldreich O. Foundations of Cryptography: Basic Applications[M]. Cambridge: Cambridge University Press, 2004, Chapter 7. [2] Sang Ying-peng, Shen Hong, and Tian Hui. Privacy- preserving tuple matching in distributed database[J].IEEE Transactions on Knowledge and Data Engineering.2009, 21(12):1767-1782 [3] Zhu You-wen, Huang Liu-sheng, and Yang Wei. Relation of PPAtMP and scalar product protocol and their applications[C]. The 15th IEEE Symposium on Computers and Communications, Riccione, Italy, 2010: 184-189. [4] 周水庚, 李丰, 陶宇飞, 等. 面向数据库应用的隐私保护研究综述[J]. 计算机学报, 2009, 32(5): 847-861. Zhou Shui-geng, Li Feng, and Tao Yu-fei, et al.. Privacy preservation in database application: a survey[J].Chinese Journal of Computers.2009, 32(5):847-861 [5] Kerschbaum F and Schaad A. Privacy-preserving social network analysis for criminal investigations[C]. Proceedings of the 7th ACM workshop on Privacy in the electronic society, ACM New York, NY, USA, 2008: 9-14. [6] Li Shun-dong and Dai Yi-qi. Secure two-party computational geometry[J], Journal of Computer Science and Technology, 2005, 20(2): 258-263. [7] Li Dong, Huang Liu-sheng, and Yang Wei, et al.. A practical solution for privacy-preserving approximate convex hulls problem[C]. International Conference on Communications and Mobile Computing, Kunming, China, Jan. 6-8, 2009: 539-544. [8] 陈志立, 黄刘生, 于振山, 等. 文本信息隐藏的统计检测算法[J]. 小型微型计算机系统, 2008, 29(12): 2199-2201. Chen Zhi-li, Huang Liu-sheng, and Y Zhen-shan et al.. Text information hiding detecting algorithm based on statistics[J]. Journal of Chinese Computer Systems, 2008, 29(12): 2199-2201. [9] 陈志立. 语言隐写术的分析与设计研究[D]. [博士论文], 中国科学技术大学, 2009. [10] Chen Zhi-li. Research on Analysis and Design of Linguistic Steganography[D]. [Ph.D. dissertation], University of Science and Technology of China, 2009. [11] Taskiran C, Topkara U, and Topkara M, et al.. Attacks on lexical natural language steganography systems[C]. SPIE International Conference on Security, Steganography and Watermarking of Multimedia Contents, San Jose, Canada, 2006: 97-105. [12] 周继君, 杨著, 等. 文本信息隐藏检测算法研究[J]. 通信学报, 2004, 25(12): 97-101. Zhou Ji-jun and Yang Zhu, et al.. Research on the detecting algorithm of text document information hiding[J]. Journal on Communications, 2004, 25(12): 97-101. [13] Chapman M, Davida G, and Rennhard M. A practical and effective approach to large-scale automated linguistic steganography[C]. The 4th International Conference on Information Security, Malaga, Spain, Oct. 1-3, 2001: 156-167. [14] Maher K. TEXTO. ftp://ftp.funet.fi/pub/crypt/ steganography/texto.tar.gz, 2007. [15] Manning C and Schutze H. Foundations of statistical natural language processing[M]. Cambridge: MITPress, London, 2005, Chapter 5. [16] P Paillier. Public key cryptosystems based on composite degree residuosity classes[C]. Advances in Cryptology- EUROCRYPT, Prague, Czech Republic, 1999: 223-238. [17] Goethals B, Laur S, and Lipmaa H, et al.. On private scalar product computation for privacy-preserving data mining[C]. The 7th Annual International Conference in Information Security and Cryptology, Seoul, Korea, Dec. 2-3, 2004: 104-120.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3449) PDF downloads(819) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return