Secure Text Steganography

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 216)

Abstract

Steganography is an art in which the data can be hidden in other data as cover, the text files are commonly used for hiding data. The main aspects of steganography are the capacity and security, where the capacity refers to how much data can be hidden in the cover carrier, while the security concerns with the ability of disclosing or altering the data by unauthorized party. The aim of this project is to implement an algorithm to reduce the size of objects created using steganography. In addition, the security level of each approach is made more secured. This project presents an overview of text steganography and various existing text-based steganography techniques. Highlighted are some of the problems inherent in text steganography as well as issues with existing solutions. A new approach is proposed in information hiding using interword spacing which reduces the amount of information to hide. This method offers generated stego text of maximum capacity according to the length of the secret message.

Keywords

Cover Security Interword spacing Stego text Capacity 

References

  1. 1.
    Por, L.Y., Delina, B.: Information hiding: a new Approach in text steganography. Paper presented at the 7th WSEAS international conference on applied computer & applied computational science’08, Hangzhou, China, 6–8 April 2008Google Scholar
  2. 2.
    Chapman, M., Davida, G., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Proceedings of the Information Security Conference, October 2001, pp. 156–165. Malaga, Spain, October 1-3 Google Scholar
  3. 3.
    Johnson, N.F.: Steganography. http://www.jjtc.com/stegdoc/index2.html. Accessed November 1995
  4. 4.
    Bennett, K.: Linguistic steganography: survey, analysis, and robustness concerns for hiding information in text. Purdue University, CERIAS Technical Report, 2004Google Scholar
  5. 5.
    Wayner, P.: Disappearing Cryptography: Being and Nothingness on the Net. Academic Press Inc., New York (1996)Google Scholar
  6. 6.
    Brassil, J., Low, S., Maxemchuk, N.F., O’Garman, L.: Electronic marking and identification techniques to discourage document copying. IEEE J. Sel. Areas Comm. 13, 1495–1504 (1995)CrossRefGoogle Scholar
  7. 7.
    Spammimic. http://www.spammimic.com (2000). Accessed 1 July 2009
  8. 8.
    Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35, 313–336 (1996)CrossRefGoogle Scholar
  9. 9.
    Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. Security & Privacy, IEEE 1(2), 32–44 (2003) Google Scholar
  10. 10.
    Mohammed Al-Mualla and Hussain Al-Ahmad.: Information hiding: steganography and watermarking. http://www.emirates.org/ieee/information_hiding.pdf (2009). Accessed 1 July 2009

Copyright information

© Springer India 2014

Authors and Affiliations

  1. 1.Department of Computer ScienceSRM UniversityChennaiIndia

Personalised recommendations