{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T12:09:54Z","timestamp":1771502994698,"version":"3.50.1"},"reference-count":23,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"2019 Longyuan Youth Innovation and Entrepreneurship Talents (Team) Project","award":["(Gan Zu Tong Zi [2019]No.39) (No.23)"],"award-info":[{"award-number":["(Gan Zu Tong Zi [2019]No.39) (No.23)"]}]},{"DOI":"10.13039\/501100004775","name":"natural science foundation of gansu province","doi-asserted-by":"publisher","award":["1506RJZA057"],"award-info":[{"award-number":["1506RJZA057"]}],"id":[{"id":"10.13039\/501100004775","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"national basic research program of china","doi-asserted-by":"publisher","award":["2018YFB1003205"],"award-info":[{"award-number":["2018YFB1003205"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2020,3]]},"abstract":"<jats:p> Information-hiding technology has recently developed into an area of significant interest in the field of information security. As one of the primary carriers in steganography, it is difficult to hide information in texts because there is insufficient information redundancy. Traditional text steganography methods are generally not robust or secure. Based on the Markov chain model, a new text steganography approach is proposed that focuses on transition probability, one of the most important concepts of the Markov chain model. We created a state transition-binary sequence diagrams based on the aforementioned concepts and used them to guide the generation of new texts with embedded secret information. Compared to other related works, the proposed method exploits the use of the transition probability in the process of steganographic text generation. The associated developed algorithm also encrypts the serial number of the state transition-binary sequence diagram needed by the receiver to extract the information, which further enhances the security of the steganography information. Experiments were designed to evaluate the proposed model. The results revealed that the model had higher concealment and hidden capacity compared to previous methods. <\/jats:p>","DOI":"10.1177\/1550147720914257","type":"journal-article","created":{"date-parts":[[2020,3,23]],"date-time":"2020-03-23T11:08:42Z","timestamp":1584961722000},"page":"155014772091425","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":9,"title":["STBS-Stega: Coverless text steganography based on state transition-binary sequence"],"prefix":"10.1177","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4050-0937","authenticated-orcid":false,"given":"Ning","family":"Wu","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, Lanzhou University, Lanzhou, China"},{"name":"College of Computer and Artificial Intelligence, Lanzhou Institute of Technology, Lanzhou, China"}]},{"given":"Zhongliang","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Tsinghua University, Beijing, China"}]},{"given":"Yi","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Lanzhou University, Lanzhou, China"}]},{"given":"Lian","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Lanzhou University, Lanzhou, China"}]},{"given":"Poli","family":"Shang","sequence":"additional","affiliation":[{"name":"School of Electronic and Electrical Engineering, Lanzhou Petrochemical Polytechnic, Lanzhou, China"}]},{"given":"Weibo","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Lanzhou Institute of Technology, Lanzhou, China"}]},{"given":"Zhenru","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering, Lanzhou Institute of Technology, Lanzhou, China"}]}],"member":"179","published-online":{"date-parts":[[2020,3,23]]},"reference":[{"key":"bibr1-1550147720914257","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"bibr2-1550147720914257","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2108649"},{"key":"bibr3-1550147720914257","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2218599"},{"issue":"3","key":"bibr4-1550147720914257","first-page":"554","volume":"35","author":"Xiao B","year":"2008","journal-title":"J Xidian Univ"},{"key":"bibr5-1550147720914257","first-page":"99","volume-title":"Proceedings of the 5th ACM workshop on information hiding and multimedia security","author":"Luo Y"},{"key":"bibr6-1550147720914257","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871746"},{"key":"bibr7-1550147720914257","doi-asserted-by":"publisher","DOI":"10.1109\/32.328991"},{"key":"bibr8-1550147720914257","first-page":"1826","volume-title":"2017 international conference on advances in computing, communications and informatics (ICACCI)","author":"Bhat D"},{"key":"bibr9-1550147720914257","first-page":"63","volume-title":"Proceedings of the 2004 workshop on multimedia and security","author":"Sidorov M"},{"issue":"9","key":"bibr10-1550147720914257","first-page":"4568","volume":"10","author":"Luo Y","year":"2016","journal-title":"TIIS"},{"key":"bibr11-1550147720914257","volume-title":"Researches on information hiding technology","author":"Wu SF","year":"2003"},{"key":"bibr12-1550147720914257","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.5.7.785-792"},{"key":"bibr13-1550147720914257","first-page":"1306","volume-title":"Proceedings of the 2nd international conference on interaction sciences: information technology, culture and human","author":"Dai W"},{"key":"bibr14-1550147720914257","unstructured":"Hernan Moraldo H. An approach for text steganography based on Markov chains. arXiv preprint arXiv:1409.0915, 2014."},{"key":"bibr15-1550147720914257","doi-asserted-by":"publisher","DOI":"10.3103\/S0146411616080174"},{"issue":"12","key":"bibr16-1550147720914257","volume":"1","author":"Go A","year":"2009","journal-title":"CS224N Project Report, Stanford"},{"key":"bibr17-1550147720914257","volume-title":"Proceedings of the 49th annual meeting of the association for computational linguistics: human language technologies","author":"Maas AL"},{"key":"bibr19-1550147720914257","first-page":"540","volume-title":"2009 international conference on information technology and computer science","volume":"2","author":"Meng P"},{"key":"bibr20-1550147720914257","first-page":"264","volume-title":"2016 IEEE international conference on engineering and technology (ICETECH)","author":"Samanta S"},{"key":"bibr22-1550147720914257","doi-asserted-by":"publisher","DOI":"10.1117\/12.713357"},{"key":"bibr23-1550147720914257","first-page":"338","volume-title":"Proceedings of the 2006 ACM symposium on applied computing","author":"Stutsman R"},{"key":"bibr24-1550147720914257","first-page":"133","volume-title":"International conference on cloud computing and security","author":"Chen X"},{"key":"bibr25-1550147720914257","first-page":"39","volume-title":"International conference on cloud computing and security","author":"Zhou Z"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147720914257","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147720914257","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147720914257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,23]],"date-time":"2020-03-23T11:08:49Z","timestamp":1584961729000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147720914257"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["10.1177\/1550147720914257"],"URL":"https:\/\/doi.org\/10.1177\/1550147720914257","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3]]}}}