The Security of Arithmetic Compression Based Text Steganography Method

Security of a modern design of steganography on lossless compression is studied in this paper. Investigation of a set of methods presented here indicates that there are various approaches to establish a hidden and safe relationship with the minimum cost for text files. Although, steganography of information in text is one of the most difficult areas of steganography, many efforts were made in this regard. With regard to the spread of this category and existence of wide volume of approaches, this paper deals with comparison and evaluation of steganography security by a statistical compression method called arithmetic coding and other methods of text steganography. Moreover, this method is available for audio-visual and video files. In addition, stego key was placed in a format that it would not arouse any suspicions. It is notable that this new method of steganography or rewriting and syntactic and semantic review does not reveal the secret message and results in 82.88% improvement in security. DOI: http://dx.doi.org/10.11591/ijece.v3i6.4068

[1]  Esra Satir,et al.  A compression-based text steganography method , 2012, Journal of Systems and Software.

[2]  Carl Vogel,et al.  The syntax of concealment: reliable methods for plain text information hiding , 2007, Electronic Imaging.

[3]  Hakan Isik,et al.  A Huffman compression based text steganography method , 2012, Multimedia Tools and Applications.

[4]  Wen-Hsiang Tsai,et al.  A new approach to covert communication via PDF files , 2010, Signal Process..

[5]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[6]  Ingemar J. Cox,et al.  Information Transmission and Steganography , 2005, IWDW.

[7]  Neil A. Ernst,et al.  The Journal of Systems and Software , 2022 .

[8]  Hedieh Sajedi,et al.  Secure steganography based on embedding capacity , 2009, International Journal of Information Security.

[9]  Mark Chapman,et al.  Hiding the Hidden: A software system for concealing ciphertext as innocuous text , 1997, ICICS.

[10]  Andrei Fionov,et al.  Fast and Space-Efficient Adaptive Arithmetic Coding , 1999, IMACC.

[11]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[12]  Xingming Sun,et al.  Component-based digital watermarking of Chinese texts , 2004, InfoSecu '04.

[13]  Chin-Chen Chang,et al.  Emoticon-based text steganography in chat , 2009, 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA).

[14]  KokSheik Wong,et al.  UniSpaCh: A text-based data hiding method using Unicode space characters , 2012, J. Syst. Softw..

[15]  G. Blelloch Introduction to Data Compression * , 2022 .

[16]  Yongping Liu,et al.  MIMIC-PPT: Mimicking-based steganography for microsoft power Point document , 2008 .

[17]  Jorma Rissanen,et al.  Generalized Kraft Inequality and Arithmetic Coding , 1976, IBM J. Res. Dev..

[18]  David Salomon,et al.  Coding for Data and Computer Communications , 2005 .

[19]  Abdelrahman Desoky,et al.  Listega: list-based steganography methodology , 2009, International Journal of Information Security.