While data encryption is an effective means of keeping data private it does not conceal the presence of ‘hidden’ information, rather it serves as an indicator that such data is present. Concealing information and hiding the fact that information is hidden are both desirable traits of a confidential data exchange, especially if that exchange takes place across a public network such as the Internet. In the present paper, we describe an approach to textual steganography in which data is not only hidden, in virtue of its encoding, but the presence of hidden data is also concealed, through use of human-readable carrier texts. Information transmitted in this fashion remains confidential and its confidential nature is also concealed. The approach detailed addresses several shortcomings in previous work in this area. Specifically, we achieve a high rate of accuracy in message decoding and also produce carrier texts which are both coherent and plausible as human-readable plain text messages. These desirable features of textual steganography are accomplished through a system of sentence mapping and a genre-based approach to carrier text selection that produces contextually related content in the carrier messages.


Textual steganography genre data hiding 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Weir, G.R.S., Morran, M.: Hiding the Hidden Message: Approaches to Textual Steganography. International Journal of Electronic Security and Digital Forensics 3(3), 223–233 (2010)CrossRefGoogle Scholar
  2. 2.
    Marwaha, P.: Visual Cryptographic Steganography in Images. In: Proceedings of the 2010 Second International Conference on Computing, Communication and Networking Technologies (ICCCNT 2010), pp. 1–6 (2010)Google Scholar
  3. 3.
    Delina, B.: Information Hiding: A New Approach in Text Steganography. In: Proceedings of the International Conference on Applied Computer and Applied Computational Science, World Scientific and Engineering Academy and Society (WSEAS 2008), pp. 689–695 (2008)Google Scholar
  4. 4.
    Kim, Y., Moon, K., Oh, I.: A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics. In: Proceedings of the Seventh International Conference on Document Analysis and Recognition (ICDAR 2003), pp. 775–779 (2003)Google Scholar
  5. 5.
    Shirali-Shahreza, M.: A New Synonym Text Steganography. In: Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1524–1526 (2008)Google Scholar
  6. 6.
    Mansor, S., Din, R., Samsudin, A.: Analysis of Natural Language Steganography. International Journal of Computer Science and Security (IJCSS) CSC Journals 3(2), 113–125 (2010)Google Scholar
  7. 7.
    Alattar, A., Alattar, O.: Watermarking Electronic Text Documents Containing Justified Paragraphs and Irregular Line Spacing. In: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 685–695 (2004)Google Scholar
  8. 8.
    Whitiak, D.: The Art of Steganography. SANS Institute, as part of GIAC Practical Repository, GSEC Practical (v.1.4b) (2003) Google Scholar
  9. 9.
    Shirali-Shahreza, M.: Text Steganography in SMS. In: Proceedings of the 2007 International Conference on Convergence Information Technology, November 21-23, pp. 2260–2265 (2008)Google Scholar
  10. 10.
    Shirali-Shahreza, M.: Text Steganography by Changing Words Spelling. In: 10th International Conference on Advanced Communication Technology (ICACT 2008), pp. 1912–1913 (2008)Google Scholar
  11. 11.
    Morran, M., Weir, G.: An Approach to Textual Steganography. Global Security, Safety, and Sustainability: Communications in Computer and Information Science 92, 48–54 (2010)CrossRefGoogle Scholar
  12. 12.
    Chapman, M., Davida, G.: Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 333–345. Springer, Heidelberg (1997)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012

Authors and Affiliations

  1. 1.Department of Computer & Information SciencesUniversity of StrathclydeGlasgowUK

Personalised recommendations