Development of Crossover and Encryption Based Text Steganography (CEBTS) Technique

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 298)


This paper presents new text steganography approach named as Crossover Encryption Based Text Steganography (CEBTS) approach. This approach is a combination of random character sequence and feature coding method. In this approach in order to hide the secrete message, we first encrypt the message and then mix it in the cover text. Cover text is generated by random character sequence. In this approach the key is generated from the very first three character of the cover text by using crossover technique between these three characters. This generated key will be used to encrypt the plain text and this key will also used to decide that how the encrypted message will hide with cover text. For this approach we have developed two algrithms, one is for key generation using crossover technique and then encrypt the message using this key and hide the encrypted message into cover text using this key and second is used to retrieve the secrete message. We are also presenting comparison of our proposed approach with some of the previous popular text steganographic approaches with execution time and also the length of cover text which will be required to encipher using n bit cover text. At the last in our conclusion section we are showing that how our approaches are performing best in the existing approaches.


Crossover Encryption Feature encoding Steganography Genetic algorithms 


  1. 1.
    Chaudhary S, Mathur P, Kumar T (2013) A capital shape alphabet encoding (CASE) based text steganography. In: Sharma R (ed) Conference on advances in communication and control systems 2013 (CAC2S 2013), IndiaGoogle Scholar
  2. 2.
    Agarwal M (2013) An efficient dual text steganographic approach: hiding data in a list of words. In: Computer networks and communications (NetCom), vol 131. Lecture notes in electrical engineering Springer, New YorkGoogle Scholar
  3. 3.
    Shirali-Shahreza M (2008) Text steganography by changing words spelling. In: 10th IEEE international conference on advanced communication technology, KoreaGoogle Scholar
  4. 4.
    Shirali-Shahreza M, Shirali-Shahreza MH (2007) Text steganography in SMS. In: IEEE international conference on convergence information technologyGoogle Scholar
  5. 5.
    Khan F (2009) Enhanced text steganography in SMS. In: 2nd IEEE international conference on computer, control and communicationGoogle Scholar
  6. 6.
    Shirali-Shahreza M, Shirali-Shahreza MH (2006) A new approach to Persian/Arabic text steganography. In: 5th IEEE/ACIS international conference on computer and information science (ICIS COMSAk’06), pp 310–315Google Scholar
  7. 7.
    Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3 & 4):313–336CrossRefGoogle Scholar
  8. 8.
    Alla K, Shivramprasad R (2009) An evolution of Hindi text steganography. In: 6th IEEE international conference on information technologyGoogle Scholar
  9. 9.
    Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Security & Privacy, pp. 32-44, May/June 2003Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  1. 1.Department of Computer EngineeringGovernment Engineering College BikanerBikanerIndia

Personalised recommendations