A Survey on Text Based Steganography

In a modern era of Information Technology, illicit copying and illegal distribution accompany the adoption of widespread electronic distribution of copyrighted material. This is the main reason why people think about how to protect their work and how to prevent such unlawful activities. For this purpose various methods including cryptography, steganography, coding and so on have been used. Steganography is the bestsuited technique that allow user to hide a message in another message (cover media). Most of steganography research uses cover media as pictures, video clips and sounds. However, text steganography is not normally preferred due to the difficulty in finding redundant bits in text document. To embed information inside a document its characteristics should be altered. These characteristics can be either the text format or characteristics of the character. But the problem is that if slight change has been done to the document then it will become visible to the third party or attacker. The key to this problem is that to alter the document in such a way that it is simply not visible to the human eye yet it is possible to decode it with computer. For this purpose various methods of text-based steganography have been purposed like line shifting, word shifting, feature coding, white space manipulation etc. In this paper, we present an overview of the steganography, with a particular focus on textbased steganography in details.

[1]  Ajay Jadhav,et al.  Steganography An Art of Hiding Data , 2009, ArXiv.

[2]  Hameedullah Kazi,et al.  EVALUATION OF STEGANOGRAPHY FOR URDU /ARABIC TEXT. , 2008 .

[3]  Mahendra Kumar,et al.  Steganography and Steganalysis of JPEG Images , 2011 .

[4]  Liu Yuling,et al.  An Efficient Linguistic Steganography for Chinese Text , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[5]  Kyung-Ae Moon,et al.  A text watermarking algorithm based on word classification and inter-word space statistics , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..

[6]  Steganography Steganography,et al.  An Analysis of Steganographic Techniques , 1998 .

[7]  Krista Bennett,et al.  LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .

[8]  Merrill Warkentin,et al.  Steganography and Steganalysis , 2006 .

[9]  Mohammad Hassan Shirali-Shahreza,et al.  A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).

[10]  Daigo Misaki,et al.  A feature calibration method for watermarking of document images , 1999, Proceedings of the Fifth International Conference on Document Analysis and Recognition. ICDAR '99 (Cat. No.PR00318).

[11]  Lawrence O'Gorman,et al.  Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.

[12]  M. Shirali-Shahreza,et al.  Text Steganography by Changing Words Spelling , 2008, 2008 10th International Conference on Advanced Communication Technology.

[13]  Hong Yan,et al.  Interword distance changes represented by sine waves for watermarking text images , 2001, IEEE Trans. Circuits Syst. Video Technol..

[14]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[15]  Kefa Rabah,et al.  Steganography-The Art of Hiding Data , 2004 .