An Efficient Dual Text Steganographic Approach: Hiding Data in a List of Words

  • Monika AgarwalEmail author
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 131)


In this paper, we present a novel approach in text steganography using a list of words to hide the secret message. The approach uses the ASCII value of characters and conceals secret message without altering the cover file. The hash value of a message is computed and appended at the end of the message. To provide security, both the message and the appended hash value are encrypted using the proposed encipher algorithm and then the resulting cipher text is embedded inside a cover file using the proposed hide algorithm. After embedding, the stego file, which consists of a list of words, is sent to the receiver. At the receiver side, message authentication and integrity can be verified by applying the same hash function to the deciphered message. The security of the approach is equivalent to the most secure one time pad cryptosystem. We also present an empirical comparison of the proposed approach with some of the existing approaches and show that our approach outperforms the existing approaches.


Cryptography Information hiding Steganography  Text steganography 


  1. 1.
    Changder S, Ghosh D, Debnath NC (2010) Linguistic approach for text steganography through Indian text. In: 2010 2nd international conference on computer technology and development, pp 318–322Google Scholar
  2. 2.
    Anderson RJ, Petitcolas FAP (1998) On the limits of steganography. IEEE J Sel Areas Commun 16(4):474–481CrossRefGoogle Scholar
  3. 3.
    Por LY, Delina B (2008) Information hiding—a new approach in text steganography. In: 7th WSEAS international conference on applied computer and applied computational science. Hangzhou China, pp 689–695Google Scholar
  4. 4.
    Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding—a survey. In: Proc IEEE 87(7):1062–1078Google Scholar
  5. 5.
    Por LY, Ang TF, Delina B (2008) WhiteSteg-a new scheme in information hiding using text steganography. WSEAS Trans Comput 7(6):735–745Google Scholar
  6. 6.
    Rabah K (2004) Steganography-the art of hiding data. Inf Technol J 3(3):245–269MathSciNetCrossRefGoogle Scholar
  7. 7.
    Benett K (2004) Linguistic steganography-survey, analysis and robustness concerns for hiding information in text. CERIAS technical report 2004-13Google Scholar
  8. 8.
    Banerjee I, Bhattacharyya S, Sanyal G (2011) Novel text steganography through special code generation. In: International conference on systemics, cybernetics and informatics, pp 298–303Google Scholar
  9. 9.
    Bhattacharyya S, Banerjee I, Sanyal G (2010) A novel approach of secure text based steganography model using word mapping method. Int J Comput Inf Eng 4(2):96–103Google Scholar
  10. 10.
    Shahreza MHS, Shahreza MS (2008) A new dynonym text steganography. In: International conference on intelligent information hiding and multimedia signal processing, pp 1524–1526Google Scholar
  11. 11.
    Shahreza MHS, Shahreza MS (2006) A new approach to persian/arabic text steganography. In: 5th IEEE/ACIS international conference on computer and information science and 1st IEEE/ACIS international workshop on component-based software engineering, software architecture and reuse, pp 310–315Google Scholar
  12. 12.
    Brassil JT, Low SH, Maxemchuk NF, O’Gorman L (1995) Document marking and identification using both line and word shifting. In: Proceedings of INFOCOM ’95 proceedings of the fourteenth annual joint conference of the IEEE computer and communication societies, pp 853–860Google Scholar
  13. 13.
    Cummins J, Diskin P, Lau S, Parlett R (2004) Steganography and digital watermarking. School of Computer Science, pp 1–24Google Scholar
  14. 14.
    Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 3(3 &4):313–336CrossRefGoogle Scholar
  15. 15.
    Shahreza MS, Shahreza MHS (2007) Text steganography in SMS. In: 2007 international conference on convergence information technology, pp 2260–2265Google Scholar
  16. 16.
    Brassil JT, Low S, Maxemchuk NF, O’Gorman L (1995) Electronic marking and identification techniques to discourage document copying. IEEE J Sel Areas Commun 1(8):1495–1504CrossRefGoogle Scholar
  17. 17.
    Liu T-Y, Tsai W-H (2007) A new steganographic method for data hiding in microsoft word documents by a change tracking technique. IEEE Trans Inf Forensics Secur 2(1):24–30MathSciNetCrossRefGoogle Scholar
  18. 18.
    Khairullah M (2011) A novel text steganography system in cricket match scorecard. Int J Comput Appl 21(9):43–47Google Scholar
  19. 19.
    Kabetta H, Dwiandiyanta BY (2011) Suyoto: information hiding in CSS: a secure scheme text steganography using public key cryptosystem. Int J Cryptogr Inf Secur 1(1):13–22Google Scholar
  20. 20.
    Haidari FA, Gutub A, Kahsah KA, Hamodi J (2009) Improving security and capacity for arabic text steganography using “Kashida” extensions. In: 2009 IEEE/ACS international conference on computer systems and applications, pp 396–399Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringPDPM-Indian Institute of Information Technology Design and ManufacturingJabalpurIndia

Personalised recommendations