Highly Imperceptible and Reversible Text Steganography Using Invisible Character based Codeword

Text steganography method can be applied for protecting privacy and authenticity of text-based documents. Text steganography is a challenging task as slight modification in text file can be identified. In general, imperceptibility of text steganography is very poor. Additionally, data hiding capacity of text steganography is very less. Current research works fail to solve both imperceptibility and capacity problems simultaneously. We propose a novel data compression based reversible text steganography scheme addressing both imperceptibility and capacity problems of text steganography. Our proposed method embeds secret message within text file as invisible character by following a set of embedding rules. We present experimental results that demonstrate higher imperceptibility and capacity of proposed method without increasing size of text file containing secret information. Most importantly, our proposed method successfully retrieves secret information and reconstructs original text file without any error.

[1]  Chin-Feng Lee,et al.  Lossless Text Steganography in Compression Coding , 2013, Recent Advances in Information Hiding and Applications.

[2]  Liu Jin'An,et al.  A Text Digital Watermarking for Chinese Word Document , 2008, 2008 International Symposium on Computer Science and Computational Technology.

[3]  David A. Huffman,et al.  A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.

[4]  Wen-Hsiang Tsai,et al.  A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique , 2007, IEEE Transactions on Information Forensics and Security.

[5]  Hakan Isik,et al.  A Huffman compression based text steganography method , 2012, Multimedia Tools and Applications.

[6]  Chao-Tung Yang,et al.  An Improvement to Data Service in Cloud Computing with Content Sensitive Transaction Analysis and Adaptation , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops.

[7]  N. B. Anuar,et al.  The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..

[8]  KokSheik Wong,et al.  UniSpaCh: A text-based data hiding method using Unicode space characters , 2012, J. Syst. Softw..

[9]  Abdelrahman Desoky,et al.  Listega: list-based steganography methodology , 2009, International Journal of Information Security.

[10]  Vijay H. Mankar,et al.  Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..

[11]  Ali Hamzeh,et al.  A novel steganalysis for TPVD steganographic method based on differences of pixel difference histogram , 2010, Multimedia Tools and Applications.

[12]  Nāgārjuna,et al.  A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding , 2014 .

[13]  Chin-Chen Chang,et al.  High-Capacity Reversible Data-Hiding for LZW Codes , 2010, 2010 Second International Conference on Computer Modeling and Simulation.

[14]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[15]  Ayman Ibaida,et al.  Resilient to shared spectrum noise scheme for protecting cognitive radio smart grid readings - BCH based steganographic approach , 2016, Ad Hoc Networks.

[16]  Chin-Chen Chang,et al.  A reversible data hiding scheme using complementary embedding strategy , 2010, Inf. Sci..

[17]  Joseph K. Liu,et al.  Toward efficient and privacy-preserving computing in big data era , 2014, IEEE Network.