Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 216))

Abstract

Steganography is an art in which the data can be hidden in other data as cover, the text files are commonly used for hiding data. The main aspects of steganography are the capacity and security, where the capacity refers to how much data can be hidden in the cover carrier, while the security concerns with the ability of disclosing or altering the data by unauthorized party. The aim of this project is to implement an algorithm to reduce the size of objects created using steganography. In addition, the security level of each approach is made more secured. This project presents an overview of text steganography and various existing text-based steganography techniques. Highlighted are some of the problems inherent in text steganography as well as issues with existing solutions. A new approach is proposed in information hiding using interword spacing which reduces the amount of information to hide. This method offers generated stego text of maximum capacity according to the length of the secret message.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Por, L.Y., Delina, B.: Information hiding: a new Approach in text steganography. Paper presented at the 7th WSEAS international conference on applied computer & applied computational science’08, Hangzhou, China, 6–8 April 2008

    Google Scholar 

  2. Chapman, M., Davida, G., Rennhard, M.: A practical and effective approach to large-scale automated linguistic steganography. In: Proceedings of the Information Security Conference, October 2001, pp. 156–165. Malaga, Spain, October 1-3

    Google Scholar 

  3. Johnson, N.F.: Steganography. http://www.jjtc.com/stegdoc/index2.html. Accessed November 1995

  4. Bennett, K.: Linguistic steganography: survey, analysis, and robustness concerns for hiding information in text. Purdue University, CERIAS Technical Report, 2004

    Google Scholar 

  5. Wayner, P.: Disappearing Cryptography: Being and Nothingness on the Net. Academic Press Inc., New York (1996)

    Google Scholar 

  6. Brassil, J., Low, S., Maxemchuk, N.F., O’Garman, L.: Electronic marking and identification techniques to discourage document copying. IEEE J. Sel. Areas Comm. 13, 1495–1504 (1995)

    Article  Google Scholar 

  7. Spammimic. http://www.spammimic.com (2000). Accessed 1 July 2009

  8. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35, 313–336 (1996)

    Article  Google Scholar 

  9. Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. Security & Privacy, IEEE 1(2), 32–44 (2003)

    Google Scholar 

  10. Mohammed Al-Mualla and Hussain Al-Ahmad.: Information hiding: steganography and watermarking. http://www.emirates.org/ieee/information_hiding.pdf (2009). Accessed 1 July 2009

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Akhilandeswari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Akhilandeswari, P., George, J.G. (2014). Secure Text Steganography. In: Sathiakumar, S., Awasthi, L., Masillamani, M., Sridhar, S. (eds) Proceedings of International Conference on Internet Computing and Information Communications. Advances in Intelligent Systems and Computing, vol 216. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1299-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1299-7_1

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1298-0

  • Online ISBN: 978-81-322-1299-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics