WhiteSteg: a new scheme in information hiding using text steganography

Sending encrypted messages frequently will draw the attention of third parties, i.e. crackers and hackers, perhaps causing attempts to break and reveal the original messages. In this digital world, steganography is introduced to hide the existence of the communication by concealing a secret message inside another unsuspicious message. The hidden message maybe plaintext, or any data that can be represented as a stream of bits. Steganography is often being used together with cryptography and offers an acceptable amount of privacy and security over the communication channel. This paper presents an overview of text steganography and a brief history of steganography along with various existing techniques of text steganography. Highlighted are some of the problems inherent in text steganography as well as issues with existing solutions. A new approach, named WhiteSteg is proposed in information hiding using interword spacing and inter-paragraph spacing as a hybrid method to reduce the visible detection of the embedded messages. WhiteSteg offers dynamic generated cover-text with six options of maximum capacity according to the length of the secret message. Besides, the advantage of exploiting whitespaces in information hiding is discussed. This paper also analyzes the significant drawbacks of each existing method and how WhiteSteg could be recommended as a solution.

[1]  Richard Bergmair,et al.  Towards Linguistic Steganography: A Systematic Investigation of Approaches, Systems, and Issues , 2004 .

[2]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[3]  D. L. Parnas,et al.  On the criteria to be used in decomposing systems into modules , 1972, Software Pioneers.

[4]  Birgit Pfitzmann,et al.  Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals , 1996, Information Hiding.

[5]  Peter Wayner Disappearing cryptography - being and nothingness on the net , 1996 .

[6]  M. Shirali-Shahreza,et al.  Text Steganography in SMS , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[7]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[8]  Ross Anderson,et al.  Information hiding terminology , 1996 .

[9]  Marc Rennhard,et al.  A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography , 2001, ISC.

[10]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[11]  Peter Wayner Strong Theoretical Stegnography , 1995, Cryptologia.

[12]  L. O'Gorman,et al.  Marking text features of document images to deter illicit dissemination , 1994, Proceedings of the 12th IAPR International Conference on Pattern Recognition, Vol. 3 - Conference C: Signal Processing (Cat. No.94CH3440-5).

[13]  Klimis S. Ntalianis A short-message robust steganographic method for effective information recovery under transmission losses of cellular networks , 2005 .

[14]  Sabu M. Thampi Information Hiding Techniques: A Tutorial Review , 2008, ArXiv.

[15]  Bret Dunbar,et al.  A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .

[16]  M.H. Shirali-Shahreza,et al.  Text Steganography in chat , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.

[17]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[18]  Lawrence O'Gorman,et al.  Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.

[19]  Wang Shuozhong,et al.  Information Hiding in Text Using Typesetting Tools with Stego-Encoding , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

[20]  Steven H. Low,et al.  Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.

[21]  Mohammad Shirali Shahreza An improved method for steganography on mobile phone , 2005 .

[22]  Krista Bennett,et al.  LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .

[23]  Jiun-Jian Liaw,et al.  An improvement of robust and blind data hiding based on self reference in spatial domain , 2007 .

[24]  Mark Chapman,et al.  Hiding the Hidden: A software system for concealing ciphertext as innocuous text , 1997, ICICS.

[25]  Peter Wayner,et al.  Mimic Functions , 1992, Cryptologia.

[26]  Sushil Jajodia,et al.  Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[27]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[28]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.