A Novel Approach to Text Steganography Using Font Size of Invisible Space Characters in Microsoft Word Document

  • Susmita Mahato
  • Dilip Kumar Yadav
  • Danish Ali Khan
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 243)

Abstract

Steganography is the hidden way of communication, where one individual communicates with another through cover medium without giving any doubt about the secret communication to the intermediary. In this paper, we propose a novel approach to text steganography in Microsoft Word document. The idea behind this technique is that slight variation in font size of invisible character space from other characters is not reflected in the document and in the required disk size for the document. Thus, steganography can be intelligently achieved. The embedding rate is very high in this technique, which increases with the increase in blank space character between words. The secret data hiding and revealing technique is presented.

Keywords

Microsoft Word Font size Cryptography Steganography 

References

  1. 1.
    Low, S.H., Maxemchuk, N.F., Brassil, J.T., O’Gorman, L.: Document marking and identification using both line and word shifting. Proceedings of the 14th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM ‘95), vol. 2, pp. 853–860, 2–6 Apr 1995Google Scholar
  2. 2.
    Changder, S., Debnath, N.C.: A new approach to Hindi text steganography by shifting matra. International Conference on Advances in Recent Technologies in Communication and Computing, pp. 199–202 (2009)Google Scholar
  3. 3.
    Shirali-Shahreza, M.H.: Text steganography by changing words spelling. Proceedings of 10th International Conference on Advanced Communication Technology, pp. 1912–1913 (2008)Google Scholar
  4. 4.
    Garg, M.: A novel text steganography technique based on html documents. Int. J. Adv. Sci. Technol. 35, 129–138 (2011)Google Scholar
  5. 5.
    Kabetta, H., Dwiandiyanta, B.Y.: Suyoto, information hiding in CSS: A secure scheme text-steganography using public key cryptosystem. Int. J. Crypt. Inf. Secure (IJCIS) 1(1), 13–22 (2011)Google Scholar
  6. 6.
    Memon, A.G., Khawaja, S., Shah, A.: Steganography: A new horizon for safe communication through XML. J. Theor. Appl. Inf. Technol. 4(3), 187–202 (2008)Google Scholar
  7. 7.
    Khairullah, M.: A novel text steganography system using font color of the invisible characters in Microsoft word documents. Second International Conference on Computer and Electrical Engineering, pp. 482–484 (2009)Google Scholar
  8. 8.
    Huang, D., Yan, H.: Inter word distance changes represented by sine waves for watermarking text images. IEEE Trans. Circuits Syst. Video Technol. 11(12), 1237–1245 (2001)CrossRefMathSciNetGoogle Scholar
  9. 9.
    Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A new synonym text steganography. Proceedings of the 4th IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), pp. 1524–1526, 15–17 Aug 2008Google Scholar
  10. 10.
    Moerland, T.: Steganography and Steganalysis. www.liacs.nl/home/tmoerlan/privtech.pdf. 15 May 2003

Copyright information

© Springer India 2014

Authors and Affiliations

  • Susmita Mahato
    • 1
  • Dilip Kumar Yadav
    • 1
  • Danish Ali Khan
    • 1
  1. 1.Department of Computer ApplicationsNational Institute of TechnologyJamshedpurIndia

Personalised recommendations