Research and implementation of information hiding technology based on text carrier
Xiaoshu Wang
Chongqing College of Mobile Communication
DOI: https://doi.org/10.59429/pmcs.v7i1.9526
Keywords: Confidentiality; Converged Communication; Text carrier; Information hiding
Abstract
With the continuous development of the Internet and the expanding application of instant messaging systems, research on confidentiality has become increasingly vital. This paper focuses on text carrier-based information hiding technology applied in enterprise converged communication IM systems. It proposes five core algorithms for information hiding: encoding, synonym substitution, embedding, extraction, and decoding, designs an information hiding model, and implements the corresponding functionalities.
References
[1] Cao Weibing, Dai Guanzhong, Xia Yu, et al. Text-based Information Hiding Technology[J]. Computer Application Research, 2003, 20(10): 39-41.
[2] Chen Gouxi, Chen Junjie. Research on the Security of Multi-carrier Information Hiding[J]. Mini-Micro Computer Systems, 2011, 32(04): 644-646.
[3] X.G.Sui, H.Luo, A steganalysis method based on the distribution of space characters, Proc of 2006 International Conference on Communications Circuits and Systems, Guilin, China, 2006,54-56.
[4] R. Asleson, T. S. Nathaniel, Foundations of Ajax[M]. Apress, 2005.