Steganography in text by using MS word symbols

The massive amount of data transfer over internet raises different challenges such as channel types, transmission time and data security. In this paper, we present a novel secure algorithm to hide the data inside document files, where four symbols are used to embed the data inside the carrier file. The main process depends on a key to produce a symbol table and match the data to be hidden with the representative symbols. This method can be extended to any language and does not change the file format. In addition, the capacity ratio of the presented algorithm is high compared to other algorithms.

[1]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[2]  Merrill Warkentin,et al.  Steganography and Steganalysis , 2006 .

[3]  Elizabeth Chang,et al.  Visibly Invisible: Ciphertext as a Steganographic Carrier , 2004 .

[4]  Krista Bennett,et al.  LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .

[5]  Ronak Karimi,et al.  An introduction to steganography methods - TI Journals , 2012 .

[6]  J. Krenn,et al.  Steganography and Steganalysis , 2006 .

[7]  William A. Arbaugh,et al.  Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..

[8]  Bret Dunbar,et al.  A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .

[9]  M. Shirali-Shahreza,et al.  Steganography in TeX documents , 2008, 2008 3rd International Conference on Intelligent System and Knowledge Engineering.

[10]  Dr.K. Ashok Babu,et al.  A New Approach to Telugu Text Steganography by Shifting Inherent Vowel Signs , 2010 .

[11]  David Shulman,et al.  Classical Telugu poetry : an anthology , 2002 .

[12]  Gu Xuemai,et al.  Chinese Language Steganography using the Arabic Diacritics as a Covered Media , 2010 .

[13]  Joshua Silman,et al.  Steganography and Steganalysis: An Overview , 2001 .

[14]  Ramineni Siva Ram Prasad,et al.  A new approach to Telugu text steganography , 2011, 2011 IEEE Symposium on Wireless Technology and Applications (ISWTA).

[15]  M. Shirali-Shahreza Pseudo-space Persian/Arabic text steganography , 2008, 2008 IEEE Symposium on Computers and Communications.

[16]  M.H. Shirali-Shahreza,et al.  Text Steganography in chat , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.

[17]  Mohammad Hassan Shirali-Shahreza,et al.  A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).

[18]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[19]  Karim Abed-Meraim,et al.  A view on latest audio steganography techniques , 2011, 2011 International Conference on Innovations in Information Technology.