Indian Script Encoding Technique (ISET): A Hindi Text Steganography Approach

  • Sunita Chaudhary
  • Meenu Dave
  • Amit Sanghi
  • Hansraj Sidh
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 9)


A prehistoric technique of concealing clandestine information is steganography which takes use of a shelter media as text, audio, video, etc. The most important thing related to same is the capacity of hiding information under the cover. The typical individual in the same concern is linguistic steganography or text steganography due to the fact that text is lacking in terms of redundant data as in audio or video steganography, this property comes in abundance and serves as the basis of stego process. Here we put forward a linguistic text steganography technique. This technique implants secret information into the shelter media for searching novel probabilities for occupying a language Hindi which is apart from English. The proposed approach namely Indian Script Encoding Technique (ISET) will work by implementing the linguistic attributes of Hindi language. In this approach, there is no difference between vowels and consonants. In this new approach, we worked with random and Hindi texts where Hindi text is used as a secret message and random text as a cover medium. Secret message will be hidden in cover medium. Our aim to propose this new ISET method is to increase robustness of the data and also increase in capacity of hidden data.


Linguistic Text Steganography Random Hindi Robustness ISET 


  1. 1.
    Shakir AC, Xuemai G, Min J (2010) Chinese language steganography using the Arabic diacritics as a covered media. Int J Comput Appl 11(1):43–46Google Scholar
  2. 2.
    Nosrati M, Karimi R, Hariri M (2011) An introduction to steganography methods. World Appl Program J 1(3):191–195Google Scholar
  3. 3.
    Wyseur B, Wouters K, Preneel B (2008) Lexical natural language steganographic system with human interactionGoogle Scholar
  4. 4.
    Kaleem MK (2012) An overview of various forms of linguistic steganography and their applications in protecting data. J Glob Res Comput Sci 3:33–38Google Scholar
  5. 5.
    Bennett K (2004) Linguistic steganography: survey, analysis, and robustness concerns for hiding information in text. CERIAS technical reportGoogle Scholar
  6. 6.
    Shirali-Shahreza MH, Shirali-Shahreza M (2008) Steganography in Persian and Arabic unicode texts using pseudo space and pseudo-connection characters. J Theoret Appl Inf Technol 4(8):682–687Google Scholar
  7. 7.
    Alla K, Prasad RSR (2009) An Evolution of Hindi text steganography. In: Sixth international conference on information technology: new generations, Las Vegas, NV, pp 1577–1578Google Scholar
  8. 8.
    Alla K, Prasad RSR (2012) Information hiding using Telugu text steganography. Int J Intell Inf Process 3(3):30–39Google Scholar
  9. 9.
    Changder S, Ghosh D, Debnath NC (2010) Linguistic approach for text steganography through Indian text. In: 2nd international conference on computer technology and development. IEEE, pp 318–322Google Scholar
  10. 10.
    Banerjee I, Bhattacharyya S, Sanyal G (2012) Text steganography using quantum approach in regional language with revised SSCE. Int J Comput Netw Inf Secur 4(12)Google Scholar
  11. 11.
    Changder S, Debnath NC, Ghosh D (2010) Hindi text steganography: an approach to information hiding. J Comput Methods Sci Eng 10(1)Google Scholar
  12. 12.
    Pathak M (2010) A new approach for text steganography using Hindi numerical code. Int J Comput Appl 1(8)Google Scholar
  13. 13.
    Changder S, Debnath NC, Ghosh D (2009) A new approach to Hindi text steganography by shifting Matra. In: International conference on advances in recent technologies in communication and computing. IEEE, pp 199–202Google Scholar
  14. 14.
    Banerjee I, Bhattacharyya S, Sanyal G (2012) A procedure of text steganography using Indian regional language. Int J Comput Netw Inf Secur 8:65–73Google Scholar
  15. 15.
    Banerjee I, Bhattacharyya S, Sanyal G (2007) Text steganography using one Indian language. CSI J ComputGoogle Scholar
  16. 16.
    Prasad RSR, Alla K (2011) A new approach to Telugu text steganography. In: IEEE symposium on wireless technology and applications, pp 60–65Google Scholar
  17. 17.
    Chaudhary S, Mathur P, Kumar T, Sharma R (2013) A capital alphabet shape encoding(CASE) based text steganography. In: Conference on advances in communication and control systems, Atlantis Press, pp 120–124Google Scholar
  18. 18.
    Chaudhary S, Dave M, Sanghi A (2016) An elucidation on steganography and cryptography. In: Second international conference on information and communication technology for competitive strategies, Mar 2016. ACM, Udaipur, IndiaGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Sunita Chaudhary
    • 1
  • Meenu Dave
    • 1
  • Amit Sanghi
    • 2
  • Hansraj Sidh
    • 2
  1. 1.Department of Computer Science and Information TechnologyJagannath UniversityJaipurIndia
  2. 2.Department of Computer Science and EngineeringMarudhar Engineering CollegeBikanerIndia

Personalised recommendations