Text Steganographic Approaches: A Comparison

This paper presents three novel approaches of text steganography. The first approach uses the theme of missing letter puzzle where each character of message is hidden by missing one or more letters in a word of cover. The average Jaro score was found to be 0.95 indicating closer similarity between cover and stego file. The second approach hides a message in a wordlist where ASCII value of embedded character determines length and starting letter of a word. The third approach conceals a message, without degrading cover, by using start and end letter of words of the cover. For enhancing the security of secret message, the message is scrambled using one-time pad scheme before being concealed and cipher text is then concealed in cover. We also present an empirical comparison of the proposed approaches with some of the popular text steganographic approaches and show that our approaches outperform the existing approaches .

[1]  Suyoto,et al.  Information Hiding in CSS : A Secure Scheme Text-Steganography using Public Key Cryptosystem , 2012, ArXiv.

[2]  Lawrence O'Gorman,et al.  Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.

[3]  William Stallings,et al.  Cryptography and network security , 1998 .

[4]  M. Shirali-Shahreza,et al.  Text Steganography in SMS , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[5]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .

[6]  Mohammad Hassan Shirali-Shahreza,et al.  A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).

[7]  Ajay Jadhav,et al.  Steganography An Art of Hiding Data , 2009, ArXiv.

[8]  N. C. Debnath,et al.  Linguistic approach for text steganography through Indian text , 2010, 2010 2nd International Conference on Computer Technology and Development.

[9]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[10]  Wen-Hsiang Tsai,et al.  A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique , 2007, IEEE Transactions on Information Forensics and Security.

[11]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[12]  Lip Yee Por,et al.  WhiteSteg: a new scheme in information hiding using text steganography , 2008 .

[13]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[14]  Khairullah A Novel Text Steganography System in Cricket Match Scorecard , 2011 .

[15]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[16]  Mohammad Hassan Shirali-Shahreza,et al.  A New Synonym Text Steganography , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[17]  Sohil D. Pandya,et al.  Testing Various Similarity Metrics and their Permutations with Clustering Approach in Context Free Data Cleaning , 2009 .

[18]  Gautam Sanyal,et al.  Novel Text Steganography through Special Code Generation , 2011 .

[19]  Lip Yee Por,et al.  Information Hiding: A New Approach in Text Steganography , 2008 .

[20]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[21]  Krista Bennett,et al.  LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .

[22]  Adnan Abdul-Aziz Gutub,et al.  Improving security and capacity for Arabic text steganography using ‘Kashida’ extensions , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.

[23]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .